Analysis
-
max time kernel
1817s -
max time network
1826s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 20:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://media.discordapp.net/attachments/1158071963764404295/1190744173855383643/2023_12_30_21.57.392.jpg?ex=65a2e9ee&is=659074ee&hm=f94480a2a4809d3e785e40feeaac6e995dae53044eaef4dbec67c7ba7d561bf6&=&format=webp
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://media.discordapp.net/attachments/1158071963764404295/1190744173855383643/2023_12_30_21.57.392.jpg?ex=65a2e9ee&is=659074ee&hm=f94480a2a4809d3e785e40feeaac6e995dae53044eaef4dbec67c7ba7d561bf6&=&format=webp
Resource
win10v2004-20231215-en
General
-
Target
https://media.discordapp.net/attachments/1158071963764404295/1190744173855383643/2023_12_30_21.57.392.jpg?ex=65a2e9ee&is=659074ee&hm=f94480a2a4809d3e785e40feeaac6e995dae53044eaef4dbec67c7ba7d561bf6&=&format=webp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133485287346106133" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3528 chrome.exe 3528 chrome.exe 2572 chrome.exe 2572 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3528 chrome.exe 3528 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3528 wrote to memory of 1544 3528 chrome.exe 18 PID 3528 wrote to memory of 1544 3528 chrome.exe 18 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 4292 3528 chrome.exe 91 PID 3528 wrote to memory of 2568 3528 chrome.exe 90 PID 3528 wrote to memory of 2568 3528 chrome.exe 90 PID 3528 wrote to memory of 2580 3528 chrome.exe 94 PID 3528 wrote to memory of 2580 3528 chrome.exe 94 PID 3528 wrote to memory of 2580 3528 chrome.exe 94 PID 3528 wrote to memory of 2580 3528 chrome.exe 94 PID 3528 wrote to memory of 2580 3528 chrome.exe 94 PID 3528 wrote to memory of 2580 3528 chrome.exe 94 PID 3528 wrote to memory of 2580 3528 chrome.exe 94 PID 3528 wrote to memory of 2580 3528 chrome.exe 94 PID 3528 wrote to memory of 2580 3528 chrome.exe 94 PID 3528 wrote to memory of 2580 3528 chrome.exe 94 PID 3528 wrote to memory of 2580 3528 chrome.exe 94 PID 3528 wrote to memory of 2580 3528 chrome.exe 94 PID 3528 wrote to memory of 2580 3528 chrome.exe 94 PID 3528 wrote to memory of 2580 3528 chrome.exe 94 PID 3528 wrote to memory of 2580 3528 chrome.exe 94 PID 3528 wrote to memory of 2580 3528 chrome.exe 94 PID 3528 wrote to memory of 2580 3528 chrome.exe 94 PID 3528 wrote to memory of 2580 3528 chrome.exe 94 PID 3528 wrote to memory of 2580 3528 chrome.exe 94 PID 3528 wrote to memory of 2580 3528 chrome.exe 94 PID 3528 wrote to memory of 2580 3528 chrome.exe 94 PID 3528 wrote to memory of 2580 3528 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://media.discordapp.net/attachments/1158071963764404295/1190744173855383643/2023_12_30_21.57.392.jpg?ex=65a2e9ee&is=659074ee&hm=f94480a2a4809d3e785e40feeaac6e995dae53044eaef4dbec67c7ba7d561bf6&=&format=webp1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa5f829758,0x7ffa5f829768,0x7ffa5f8297782⤵PID:1544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1888 --field-trial-handle=1988,i,5558622186611914041,16901124960270155815,131072 /prefetch:82⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1988,i,5558622186611914041,16901124960270155815,131072 /prefetch:22⤵PID:4292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2968 --field-trial-handle=1988,i,5558622186611914041,16901124960270155815,131072 /prefetch:12⤵PID:3820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=1988,i,5558622186611914041,16901124960270155815,131072 /prefetch:12⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2032 --field-trial-handle=1988,i,5558622186611914041,16901124960270155815,131072 /prefetch:82⤵PID:2580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 --field-trial-handle=1988,i,5558622186611914041,16901124960270155815,131072 /prefetch:82⤵PID:3812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 --field-trial-handle=1988,i,5558622186611914041,16901124960270155815,131072 /prefetch:82⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4740 --field-trial-handle=1988,i,5558622186611914041,16901124960270155815,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2572
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59950e8d65efefb39d7982ccf57187145
SHA11fb95815e724d72e6d8229f4ebb5e80a2c7b057d
SHA25639d7fcf8d3b811101e96749c57009a87f57f0b70e01e0b698e02a23a38a39b25
SHA512efa5342ce0f514a5aab9dcecd9fa2442720a55bdd1c3699992155f10413359db0007d7fa511eeaa584d397b8d82c37ed4389ecbd08db3760fddfaf3ad8ecb75b
-
Filesize
6KB
MD5ff9e1305b0365db57f8517e24a6ec682
SHA1ded33d8fac12ab048ad2ef01c6687245adafce47
SHA25679197a9bf502ac9263d0002f7dd57f42a7717e7cb372ba0f97f77b877d443beb
SHA512618fc9960d2ddd8a5079ecba00afd12228317154fd536cb207cd86074be9ce39979ae3d47254c27ded12d835c2388a66c40b2d080642675139d794e1ae571eed
-
Filesize
114KB
MD5bb50b21fe83e1aa98035a5adbe302aa9
SHA16104c2814daa52beb2e0ed4a8285c4e92c8b4022
SHA25636361d52c7e35652b6aaea2cc3a8e755f97790020358201659f1832d71eb5dec
SHA51281dcfbef2384aff4c9f57210c7856716008c7190b616fbf79266203826c341a36698f5a5e948e2baddce21dca2f65186840fb63bec2569a4d74ce8e989e4de7a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd