Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 09:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://shankkits.uk/
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://shankkits.uk/
Resource
win10v2004-20231222-en
General
-
Target
https://shankkits.uk/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133490919998609441" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 228 chrome.exe 228 chrome.exe 1036 chrome.exe 1036 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 228 wrote to memory of 3800 228 chrome.exe 16 PID 228 wrote to memory of 3800 228 chrome.exe 16 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 4648 228 chrome.exe 29 PID 228 wrote to memory of 2340 228 chrome.exe 28 PID 228 wrote to memory of 2340 228 chrome.exe 28 PID 228 wrote to memory of 4528 228 chrome.exe 24 PID 228 wrote to memory of 4528 228 chrome.exe 24 PID 228 wrote to memory of 4528 228 chrome.exe 24 PID 228 wrote to memory of 4528 228 chrome.exe 24 PID 228 wrote to memory of 4528 228 chrome.exe 24 PID 228 wrote to memory of 4528 228 chrome.exe 24 PID 228 wrote to memory of 4528 228 chrome.exe 24 PID 228 wrote to memory of 4528 228 chrome.exe 24 PID 228 wrote to memory of 4528 228 chrome.exe 24 PID 228 wrote to memory of 4528 228 chrome.exe 24 PID 228 wrote to memory of 4528 228 chrome.exe 24 PID 228 wrote to memory of 4528 228 chrome.exe 24 PID 228 wrote to memory of 4528 228 chrome.exe 24 PID 228 wrote to memory of 4528 228 chrome.exe 24 PID 228 wrote to memory of 4528 228 chrome.exe 24 PID 228 wrote to memory of 4528 228 chrome.exe 24 PID 228 wrote to memory of 4528 228 chrome.exe 24 PID 228 wrote to memory of 4528 228 chrome.exe 24 PID 228 wrote to memory of 4528 228 chrome.exe 24 PID 228 wrote to memory of 4528 228 chrome.exe 24 PID 228 wrote to memory of 4528 228 chrome.exe 24 PID 228 wrote to memory of 4528 228 chrome.exe 24
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff59739758,0x7fff59739768,0x7fff597397781⤵PID:3800
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://shankkits.uk/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1868,i,11057119817745143499,12835743524262828911,131072 /prefetch:82⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1868,i,11057119817745143499,12835743524262828911,131072 /prefetch:12⤵PID:3660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1868,i,11057119817745143499,12835743524262828911,131072 /prefetch:12⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1868,i,11057119817745143499,12835743524262828911,131072 /prefetch:82⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1688 --field-trial-handle=1868,i,11057119817745143499,12835743524262828911,131072 /prefetch:22⤵PID:4648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 --field-trial-handle=1868,i,11057119817745143499,12835743524262828911,131072 /prefetch:82⤵PID:3432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 --field-trial-handle=1868,i,11057119817745143499,12835743524262828911,131072 /prefetch:82⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4564 --field-trial-handle=1868,i,11057119817745143499,12835743524262828911,131072 /prefetch:12⤵PID:2564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5580 --field-trial-handle=1868,i,11057119817745143499,12835743524262828911,131072 /prefetch:12⤵PID:3560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4048 --field-trial-handle=1868,i,11057119817745143499,12835743524262828911,131072 /prefetch:12⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3120 --field-trial-handle=1868,i,11057119817745143499,12835743524262828911,131072 /prefetch:12⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4712 --field-trial-handle=1868,i,11057119817745143499,12835743524262828911,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1036
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD53f89da04c2e62ea7e592a5cfd954c576
SHA1da8c16f3575c75ee7b571ebd514234f297e391d6
SHA2561acb7afb24c1aa03800be6890ac0c2d076dc4dcb9391beecfcebd001ec190cc1
SHA5128d2b26678e9f83e4614a1d92ebf2e17b0d7ae0a2c0663d6b9c0550e46013fff91cddb326ac775e43638efd1619b4b8c66b1580f6279db8a4573eb1c582fe142a
-
Filesize
2KB
MD554dbe0a7bf8898355ace648a794eda2f
SHA17b7df528185683d49b9925825c53fca6a71b6450
SHA25602042595cc6657d7e5a12afc322bc89c115166300c11790e2b4af444712a0311
SHA512e1bbcd001092d81ff82bc957c0dc903852c32f457210dfa01c40135d82350405d92828bb380c90ed2802c974df446a459ae69744acb83e160f7f09dabfd21a8e
-
Filesize
538B
MD563c9c30ce7d2e4db6678f4ccf2fd5174
SHA136109004b2b35432e59233071cbf94517f9319f8
SHA2564903378c31343bbe621a5dc29350571eba5ee3cd522118176ed606c14d85238d
SHA5123ce4e625df7d36513fe76c99feebe069ad538e3edaf03845f4c84653070e2f2b18546e8ea0f310dabda0bd8860c9d072a6fa4369a32a0cb3e4cc7e09ca896c98