Analysis
-
max time kernel
596s -
max time network
485s -
platform
windows11-21h2_x64 -
resource
win11-20231222-en -
resource tags
arch:x64arch:x86image:win11-20231222-enlocale:en-usos:windows11-21h2-x64system -
submitted
04-01-2024 00:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://myato-records.com
Resource
win11-20231222-en
Behavioral task
behavioral2
Sample
http://myato-records.com
Resource
android-x64-20231215-en
General
-
Target
http://myato-records.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133488031066840955" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 996 chrome.exe 996 chrome.exe 3000 chrome.exe 3000 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 996 wrote to memory of 3040 996 chrome.exe 77 PID 996 wrote to memory of 3040 996 chrome.exe 77 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 4428 996 chrome.exe 79 PID 996 wrote to memory of 3760 996 chrome.exe 80 PID 996 wrote to memory of 3760 996 chrome.exe 80 PID 996 wrote to memory of 3192 996 chrome.exe 83 PID 996 wrote to memory of 3192 996 chrome.exe 83 PID 996 wrote to memory of 3192 996 chrome.exe 83 PID 996 wrote to memory of 3192 996 chrome.exe 83 PID 996 wrote to memory of 3192 996 chrome.exe 83 PID 996 wrote to memory of 3192 996 chrome.exe 83 PID 996 wrote to memory of 3192 996 chrome.exe 83 PID 996 wrote to memory of 3192 996 chrome.exe 83 PID 996 wrote to memory of 3192 996 chrome.exe 83 PID 996 wrote to memory of 3192 996 chrome.exe 83 PID 996 wrote to memory of 3192 996 chrome.exe 83 PID 996 wrote to memory of 3192 996 chrome.exe 83 PID 996 wrote to memory of 3192 996 chrome.exe 83 PID 996 wrote to memory of 3192 996 chrome.exe 83 PID 996 wrote to memory of 3192 996 chrome.exe 83 PID 996 wrote to memory of 3192 996 chrome.exe 83 PID 996 wrote to memory of 3192 996 chrome.exe 83 PID 996 wrote to memory of 3192 996 chrome.exe 83 PID 996 wrote to memory of 3192 996 chrome.exe 83 PID 996 wrote to memory of 3192 996 chrome.exe 83 PID 996 wrote to memory of 3192 996 chrome.exe 83 PID 996 wrote to memory of 3192 996 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://myato-records.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff971459758,0x7ff971459768,0x7ff9714597782⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=312 --field-trial-handle=1816,i,8142218731040633414,15583384886777050054,131072 /prefetch:22⤵PID:4428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=1816,i,8142218731040633414,15583384886777050054,131072 /prefetch:82⤵PID:3760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2900 --field-trial-handle=1816,i,8142218731040633414,15583384886777050054,131072 /prefetch:12⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2908 --field-trial-handle=1816,i,8142218731040633414,15583384886777050054,131072 /prefetch:12⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2168 --field-trial-handle=1816,i,8142218731040633414,15583384886777050054,131072 /prefetch:82⤵PID:3192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4760 --field-trial-handle=1816,i,8142218731040633414,15583384886777050054,131072 /prefetch:82⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4868 --field-trial-handle=1816,i,8142218731040633414,15583384886777050054,131072 /prefetch:82⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4780 --field-trial-handle=1816,i,8142218731040633414,15583384886777050054,131072 /prefetch:12⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3264 --field-trial-handle=1816,i,8142218731040633414,15583384886777050054,131072 /prefetch:12⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4956 --field-trial-handle=1816,i,8142218731040633414,15583384886777050054,131072 /prefetch:12⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4544 --field-trial-handle=1816,i,8142218731040633414,15583384886777050054,131072 /prefetch:12⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3844 --field-trial-handle=1816,i,8142218731040633414,15583384886777050054,131072 /prefetch:12⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1816,i,8142218731040633414,15583384886777050054,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1432 --field-trial-handle=1816,i,8142218731040633414,15583384886777050054,131072 /prefetch:12⤵PID:1088
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5f3690d76ea7a74f93a422717efddf076
SHA11d45844d64047f08e4520bed037503879c16e470
SHA256ccb349f3a3327ba5f14f2c3def7b970254b90cbf80f34a417147c4f83197b20f
SHA5127a65c8b77e544166053ed8e9f6970f2bb0d6f71dfeb1b346d0645858ade1e7186c4fa8843a30dc167847ac76c0d45d566097ad2a2480ca86bf97345d746974dc
-
Filesize
6KB
MD596241bdc91ae8816fc9c5b945c21f8a5
SHA1a2e74e9e63cbf98c2321d10a0d4ad98a6cabf06a
SHA2566867dc9b2ddf3e5888649bd4d51c60956522e6e12061a2e04a58ad59ff53d023
SHA512660cb0380d58f58c733ea6f1fcd563b2a24fa9659ae4982c1fc90bcd14bccc62c85e7b6147925579b98e7991aede86df98f0a1ea56c0fa42423b771491adc0fe
-
Filesize
114KB
MD50398feca47fa1957be0f9b82e00e2208
SHA108830d8bf5aa37da654a2115362f951def5917d8
SHA25659c2ba7d30fc29ffd032e20cbbf3b1585fd6f2dc2c9d012f6345225a6eeed3c1
SHA5125ccc75452aa58d01329525d019e8f1d899aadd5c825ec31a6caa9cf0873fe09573a14938caf0bc9594a40e1d2e8d626ebfa9ac2e1a0cedb6756e30619dc05b66
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd