Analysis
-
max time kernel
1199s -
max time network
1171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/01/2024, 17:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.salwyrr.com/download/
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://www.salwyrr.com/download/
Resource
win10v2004-20231215-en
General
-
Target
https://www.salwyrr.com/download/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133486889081917026" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 2160 chrome.exe 2160 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5044 chrome.exe 5044 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe Token: SeShutdownPrivilege 5044 chrome.exe Token: SeCreatePagefilePrivilege 5044 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe 5044 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5044 wrote to memory of 5268 5044 chrome.exe 14 PID 5044 wrote to memory of 5268 5044 chrome.exe 14 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 4316 5044 chrome.exe 23 PID 5044 wrote to memory of 6104 5044 chrome.exe 27 PID 5044 wrote to memory of 6104 5044 chrome.exe 27 PID 5044 wrote to memory of 1504 5044 chrome.exe 26 PID 5044 wrote to memory of 1504 5044 chrome.exe 26 PID 5044 wrote to memory of 1504 5044 chrome.exe 26 PID 5044 wrote to memory of 1504 5044 chrome.exe 26 PID 5044 wrote to memory of 1504 5044 chrome.exe 26 PID 5044 wrote to memory of 1504 5044 chrome.exe 26 PID 5044 wrote to memory of 1504 5044 chrome.exe 26 PID 5044 wrote to memory of 1504 5044 chrome.exe 26 PID 5044 wrote to memory of 1504 5044 chrome.exe 26 PID 5044 wrote to memory of 1504 5044 chrome.exe 26 PID 5044 wrote to memory of 1504 5044 chrome.exe 26 PID 5044 wrote to memory of 1504 5044 chrome.exe 26 PID 5044 wrote to memory of 1504 5044 chrome.exe 26 PID 5044 wrote to memory of 1504 5044 chrome.exe 26 PID 5044 wrote to memory of 1504 5044 chrome.exe 26 PID 5044 wrote to memory of 1504 5044 chrome.exe 26 PID 5044 wrote to memory of 1504 5044 chrome.exe 26 PID 5044 wrote to memory of 1504 5044 chrome.exe 26 PID 5044 wrote to memory of 1504 5044 chrome.exe 26 PID 5044 wrote to memory of 1504 5044 chrome.exe 26 PID 5044 wrote to memory of 1504 5044 chrome.exe 26 PID 5044 wrote to memory of 1504 5044 chrome.exe 26
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd11a29758,0x7ffd11a29768,0x7ffd11a297781⤵PID:5268
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.salwyrr.com/download/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1900,i,5049562212677793366,4466899765362524531,131072 /prefetch:22⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1900,i,5049562212677793366,4466899765362524531,131072 /prefetch:12⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1900,i,5049562212677793366,4466899765362524531,131072 /prefetch:12⤵PID:3740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1848 --field-trial-handle=1900,i,5049562212677793366,4466899765362524531,131072 /prefetch:82⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1900,i,5049562212677793366,4466899765362524531,131072 /prefetch:82⤵PID:6104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 --field-trial-handle=1900,i,5049562212677793366,4466899765362524531,131072 /prefetch:82⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 --field-trial-handle=1900,i,5049562212677793366,4466899765362524531,131072 /prefetch:82⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 --field-trial-handle=1900,i,5049562212677793366,4466899765362524531,131072 /prefetch:82⤵PID:5580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3760 --field-trial-handle=1900,i,5049562212677793366,4466899765362524531,131072 /prefetch:82⤵PID:2912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2008 --field-trial-handle=1900,i,5049562212677793366,4466899765362524531,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD5bde01a6277b813dc20f08cc274a7fd32
SHA178a36cb4b0020c97f6a97277278e6420ca8f1e90
SHA256fe47fdfb600bb6267ef3aab6b9e19b74db6325264c6248db5f3aa58359a9908a
SHA512ef048db2e29514d064f6d120f3ca99c1b166fa4be908af78206ca0b1126267b8dbe721341d14dd3f51474836e1f3cc00bac28623dbec68ca7ba57f5dbe6b0d8a
-
Filesize
2KB
MD51134970c1cc01f784e80e53c60f00e60
SHA1ce90d841928a729d9b963f08bbf69b6586d747e7
SHA2569214a80bc57d2705165cbf8d72c5de979d81d3927d7c74aeb212e1a2febbd0cf
SHA512499d5f7630740cb596571b85fb3393e25b469a1e5238ce921afdc633bbc5328389d65767af96dc1d9f5633c36c542136f161b3bec8884c6c2927514aa609b5ba
-
Filesize
538B
MD547b7093357b090e218acc493cbc23c2f
SHA11f817c234c8023d478781a5341e0aad2f2544cda
SHA2561dd66af0d5d23a976fab55248f9e754d71a958c97e9da44f8856db0c35117839
SHA5126b8aac12cb84c4dc784c0bf1a7dad862508202b467ffbfbf1fc77c2681d4cb757e8127ba4d5b725e5188e7015cdcd01d74c39b1ecbf260641820d3918e417b65
-
Filesize
115KB
MD555707e18a2a2eee1b935d505cb2c85f6
SHA1afe8c22d5f14dd52560e1f82d2528b4a7da8a18f
SHA25664a0cc01d53cd8a5cd7d57babb0c8adb75c5ec16a5f94c2837bb9147beaef3ef
SHA5128a8622d78d5c383e95675a1af27a6ae67ca20c82c6a922309bbeb8f19cef7e1a15db28df6a6f0c9a8c36e304dd1aabe05e53bb2bd5f8cfac52323ccac844858a
-
Filesize
168KB
MD5ae3508302a953852ccf0ddd77b029444
SHA1e196202f47c6a6e04f1f9a3faa3e213eb0232604
SHA256a0844b34211f3c30833b50f9a741cb4b1ba64a75d7ccc70908342efcd2cbc60a
SHA512ddac5716db31f9b2693561d93cff49ff6ec64b4d438680782ddd76459ed6484a6a782622ccda7aa48708f310e61268e956637d9c2895203ca391fea0da62766a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd