Analysis
-
max time kernel
308s -
max time network
312s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 07:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://LEXMANZ.COM
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
http://LEXMANZ.COM
Resource
android-33-x64-arm64-20231215-en
General
-
Target
http://LEXMANZ.COM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133489121987204799" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3012 chrome.exe 3012 chrome.exe 4692 chrome.exe 4692 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2188 3012 chrome.exe 88 PID 3012 wrote to memory of 2188 3012 chrome.exe 88 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2884 3012 chrome.exe 91 PID 3012 wrote to memory of 2792 3012 chrome.exe 92 PID 3012 wrote to memory of 2792 3012 chrome.exe 92 PID 3012 wrote to memory of 4976 3012 chrome.exe 93 PID 3012 wrote to memory of 4976 3012 chrome.exe 93 PID 3012 wrote to memory of 4976 3012 chrome.exe 93 PID 3012 wrote to memory of 4976 3012 chrome.exe 93 PID 3012 wrote to memory of 4976 3012 chrome.exe 93 PID 3012 wrote to memory of 4976 3012 chrome.exe 93 PID 3012 wrote to memory of 4976 3012 chrome.exe 93 PID 3012 wrote to memory of 4976 3012 chrome.exe 93 PID 3012 wrote to memory of 4976 3012 chrome.exe 93 PID 3012 wrote to memory of 4976 3012 chrome.exe 93 PID 3012 wrote to memory of 4976 3012 chrome.exe 93 PID 3012 wrote to memory of 4976 3012 chrome.exe 93 PID 3012 wrote to memory of 4976 3012 chrome.exe 93 PID 3012 wrote to memory of 4976 3012 chrome.exe 93 PID 3012 wrote to memory of 4976 3012 chrome.exe 93 PID 3012 wrote to memory of 4976 3012 chrome.exe 93 PID 3012 wrote to memory of 4976 3012 chrome.exe 93 PID 3012 wrote to memory of 4976 3012 chrome.exe 93 PID 3012 wrote to memory of 4976 3012 chrome.exe 93 PID 3012 wrote to memory of 4976 3012 chrome.exe 93 PID 3012 wrote to memory of 4976 3012 chrome.exe 93 PID 3012 wrote to memory of 4976 3012 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://LEXMANZ.COM1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb5a829758,0x7ffb5a829768,0x7ffb5a8297782⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1884,i,4486657095083690372,15906231443940056255,131072 /prefetch:22⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2028 --field-trial-handle=1884,i,4486657095083690372,15906231443940056255,131072 /prefetch:82⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1884,i,4486657095083690372,15906231443940056255,131072 /prefetch:82⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3100 --field-trial-handle=1884,i,4486657095083690372,15906231443940056255,131072 /prefetch:12⤵PID:2712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3076 --field-trial-handle=1884,i,4486657095083690372,15906231443940056255,131072 /prefetch:12⤵PID:4932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4756 --field-trial-handle=1884,i,4486657095083690372,15906231443940056255,131072 /prefetch:12⤵PID:4152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 --field-trial-handle=1884,i,4486657095083690372,15906231443940056255,131072 /prefetch:82⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 --field-trial-handle=1884,i,4486657095083690372,15906231443940056255,131072 /prefetch:82⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2896 --field-trial-handle=1884,i,4486657095083690372,15906231443940056255,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4692
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD54d72760037cabc7f07beb8ebbaa1ffeb
SHA14be0446b3449fe6c6767a4e21f4b3f1679dbf8d4
SHA256eb70464e5722498889e610dd24b84a39cb6f3109398e75c6a0d578bad0df476b
SHA51281ace5c637a712e8c307862fe0bb3757718b8df3b045d8b43cc4bb52ea8187aab8c98d30767b32aaa4fd5109428bc5518cb05241086f2c938452dbbddf45ec4d
-
Filesize
120B
MD57935db81c56343e99bd5d023c4beb430
SHA18f0f37893ae3a332d0347d466c4e52f964f78b75
SHA25630977db922f780c49804809271fbcd907d3463d1ee2f91b29a7dcb04feca7e63
SHA512da78c1190f1ad136780c60139dc43c5f32d83fa7deff12331728b40211901800cd84dde3f0255c691aa05ad81fcfe9965d9101e99de9905ab3c0a64764057ab0
-
Filesize
1KB
MD5e07149dade7931ea8e5be222de547ef5
SHA1e6e57b1cf989f2833f6783be3944339bca384576
SHA256bcf193dcc6987d5b2cca8c66a57b424e492629904ec8248dc2190b5261df4697
SHA51274d52bdcf266d610d65005144fa3b3593404c0c8cc5fc1ff0e175da2e895366d8c72b5b70cc89d75caeae79deea83a03aed4b4d768566c193e33789d8c9b2a0a
-
Filesize
5KB
MD5bf11d746db7b07c05c424cb0543135d0
SHA1e3374e913d00f03c8bfee232ccbbf1457c0b29f1
SHA256a80d1f82ed0ce0f73cbc4adac36e0d9c69088e52dcb38763f5e79c0f74c80869
SHA5120d91861a0116c3974712c7869114df26c1ca5b5689466b3b1486156d6223ba0beed28694b4cc909346e5f131deb7889d18479828a083b4b83a49f4eed1c5fa61
-
Filesize
5KB
MD51482ceffb6c66f3ed3cdc03ff9078779
SHA18e865d873c4e1af551dec253ba57018358fcdb19
SHA2564c093c737c6ba39750a204cf4d9c3600688f9bdb03b4da2340d8a60e5ea2f85c
SHA51228c5a780c01fb22c767f8ea54b0e8d3608055f45437eb92a99bd7fc34893ded64a38af69c72cbd8952cd1f6409e7326207d359121505d5486f83485baf85e623
-
Filesize
6KB
MD51ec587b4cd5f7897930e2d154006080f
SHA150eb15221636b7f130820086d7d8be36308c0e0a
SHA256f0353b035a1e9d13b417b1712a3f30f3d9326e325111d12a241c41215b7ec55b
SHA5125c0fa2568578c0a614144f35dc2c4f3a7082863d7c0d65b914995e34a01cd0e05b9f11fc35d8cabf6c61b71bcc32be550d3d3b12f54b86e253488376e20b6aad
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd