Analysis
-
max time kernel
29s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2024 20:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://myvipflirt4you.life/?u=4uap80x&o=8edk2hb&t=Bikki
Resource
win10v2004-20231215-en
General
-
Target
https://myvipflirt4you.life/?u=4uap80x&o=8edk2hb&t=Bikki
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 3568 chrome.exe 3568 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 3568 chrome.exe 3568 chrome.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe Token: SeShutdownPrivilege 3568 chrome.exe Token: SeCreatePagefilePrivilege 3568 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
Processes:
chrome.exepid process 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe 3568 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3568 wrote to memory of 1056 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 1056 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 2244 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 3592 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 3592 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 4908 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 4908 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 4908 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 4908 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 4908 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 4908 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 4908 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 4908 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 4908 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 4908 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 4908 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 4908 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 4908 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 4908 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 4908 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 4908 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 4908 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 4908 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 4908 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 4908 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 4908 3568 chrome.exe chrome.exe PID 3568 wrote to memory of 4908 3568 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://myvipflirt4you.life/?u=4uap80x&o=8edk2hb&t=Bikki1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa1a849758,0x7ffa1a849768,0x7ffa1a8497782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1892,i,8165491257616827800,6619947461308942269,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1892,i,8165491257616827800,6619947461308942269,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1892,i,8165491257616827800,6619947461308942269,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3104 --field-trial-handle=1892,i,8165491257616827800,6619947461308942269,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3108 --field-trial-handle=1892,i,8165491257616827800,6619947461308942269,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
192B
MD53f7cd1c4894d620dbddbeb2ac55ce4fe
SHA119463b3ffeafa7af4eae2113a15da18fa88ebec7
SHA256eaddc32fe146b2677ae7a803cd032ff9124040edc55eeed97840e37ce4e37ddf
SHA512712119285eaccba1c46b451841cd491096421ff0a3e776cfb8473171ea6d4933a908e01d42a382e8f9025bb67c8375d0ba71b195cee1033e4ccaf1e2291aedec
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD59ecb1c70a2fd1df30fc9cdef7f719662
SHA1a2eab5698f6a6e80a9308ccd832e282f38be8cfe
SHA25609b7413ede28a2adb629f8d82f0fd76a0962237468ce1044b0aa2db43a7a333a
SHA51220286ea8576ae6a7be7fa685ff0b828b628ca9b2bd83ccb4ec9d6fea269a8aa216f25219ed4f51bd2081df55d6e140df59a23fb905f5b955d4d985bc935ba6ec
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
706B
MD5f47a836dc5e9b42e8d6a388061857f06
SHA194756f15dbc2f1411904838a88003948e1509bc5
SHA256a6b28f8d04760720e6f3591d2fa1149361d28eaf6ac94ef68c8268a9a5492a0e
SHA512ea6a134160829c0a21b9a7a07b1a8995afc834fe63f7a5359e6a67c840012117957cb0fe7e9016515f75993d3f53395245cb238b36d334a3f80026af0e1bcdf7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
706B
MD5b3205af83802e33c0911a6b4f0589e8e
SHA167a030fcce7c6a7cf9c3369e82008ec66041d5e7
SHA2566afe94304051ce0b9580f27b4e652c5dd2b273c27b59ee72efc9ac6e1bd5057c
SHA512ae14a5a3371be98248fd09b9c78b09b3a053f102702dc3302472a77377b79618e3e2e3235162384e203802b6a8741c3c8916beea8b51e4e835e53c1de370e0d3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5725f3ee96ad36f210c03291ab92d596b
SHA19af600f6980a863a70c6fb1967dff5fd1f7d5492
SHA256ed80efc4e769bebb55446a2b83d7bd7d1e33917cbdfe6f628d92fae20964a610
SHA51241894780ae2632e8ff958e3412492f399b5b8144c34203108d2e55ab0ab7ff20d0ace83ae0acfb1d9d6cc95ab87affd2c03f94c04fcc81f10dcfd61a242d8d63
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5248de70822da7db072524864c77d3b6e
SHA18deeae65c33c8a55898346a21e44178ac5ee0149
SHA2568873579139d943cd7d4ae84f6677a407c382381c4a0f27debe36678690a33031
SHA5125a38c3f24a27d258b4605030ccc59e11856621868a3035e899e3f8945eab42e2096b277b12b41bf41e0593332882766b6edac69589d8ed1632de22295cb48de2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
114KB
MD5df61d27fe58ac36a98b099062279a800
SHA1f7558b077e46b7e984a7ef769bedbee8d9432b27
SHA2564190c68a308f9b3105e5f2325f3a94c287cd9068c4e533ce65426eb07e7dc500
SHA512a062123f95acc19ca4183b18b1e6edbf9bef22c831022dfd3a980778bf17851f410c985d2dfeaeb8e57625e3a48a0c77ef6730196a4169fda85c329a0f50b5b3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
114KB
MD543ecd3fa907cd4acf8f6cafff01fd62b
SHA1422499f94606d77142a592764b3342671de02312
SHA256524f055a9035ae0ab06bc3b792ebae506952275340289fcfc6274e6da619250f
SHA5123ba2b8258eef62f529fec3f1ea19778503b7c4f037b27547d48fe5e13d510becfbdb376574cd98780a5f7ce3610a452079201895e55d226f0274757e7d6c7907
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
\??\pipe\crashpad_3568_ZWQZUIURPLUHEZAVMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e