Analysis
-
max time kernel
50s -
max time network
56s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 10:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://helmethive.top/nodoBjup?xffy1704709922811
Resource
win10v2004-20231215-en
General
-
Target
https://helmethive.top/nodoBjup?xffy1704709922811
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133491848105900163" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3968 chrome.exe 3968 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3968 wrote to memory of 4344 3968 chrome.exe 45 PID 3968 wrote to memory of 4344 3968 chrome.exe 45 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 3408 3968 chrome.exe 97 PID 3968 wrote to memory of 4820 3968 chrome.exe 96 PID 3968 wrote to memory of 4820 3968 chrome.exe 96 PID 3968 wrote to memory of 3328 3968 chrome.exe 95 PID 3968 wrote to memory of 3328 3968 chrome.exe 95 PID 3968 wrote to memory of 3328 3968 chrome.exe 95 PID 3968 wrote to memory of 3328 3968 chrome.exe 95 PID 3968 wrote to memory of 3328 3968 chrome.exe 95 PID 3968 wrote to memory of 3328 3968 chrome.exe 95 PID 3968 wrote to memory of 3328 3968 chrome.exe 95 PID 3968 wrote to memory of 3328 3968 chrome.exe 95 PID 3968 wrote to memory of 3328 3968 chrome.exe 95 PID 3968 wrote to memory of 3328 3968 chrome.exe 95 PID 3968 wrote to memory of 3328 3968 chrome.exe 95 PID 3968 wrote to memory of 3328 3968 chrome.exe 95 PID 3968 wrote to memory of 3328 3968 chrome.exe 95 PID 3968 wrote to memory of 3328 3968 chrome.exe 95 PID 3968 wrote to memory of 3328 3968 chrome.exe 95 PID 3968 wrote to memory of 3328 3968 chrome.exe 95 PID 3968 wrote to memory of 3328 3968 chrome.exe 95 PID 3968 wrote to memory of 3328 3968 chrome.exe 95 PID 3968 wrote to memory of 3328 3968 chrome.exe 95 PID 3968 wrote to memory of 3328 3968 chrome.exe 95 PID 3968 wrote to memory of 3328 3968 chrome.exe 95 PID 3968 wrote to memory of 3328 3968 chrome.exe 95
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://helmethive.top/nodoBjup?xffy17047099228111⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd184b9758,0x7ffd184b9768,0x7ffd184b97782⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=1956,i,4398926620177389250,17906427885397781504,131072 /prefetch:12⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1956,i,4398926620177389250,17906427885397781504,131072 /prefetch:12⤵PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1956,i,4398926620177389250,17906427885397781504,131072 /prefetch:82⤵PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1916 --field-trial-handle=1956,i,4398926620177389250,17906427885397781504,131072 /prefetch:82⤵PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1956,i,4398926620177389250,17906427885397781504,131072 /prefetch:22⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4508 --field-trial-handle=1956,i,4398926620177389250,17906427885397781504,131072 /prefetch:12⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 --field-trial-handle=1956,i,4398926620177389250,17906427885397781504,131072 /prefetch:82⤵PID:3684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3248 --field-trial-handle=1956,i,4398926620177389250,17906427885397781504,131072 /prefetch:82⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3288 --field-trial-handle=1956,i,4398926620177389250,17906427885397781504,131072 /prefetch:12⤵PID:100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5468 --field-trial-handle=1956,i,4398926620177389250,17906427885397781504,131072 /prefetch:12⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1872 --field-trial-handle=1956,i,4398926620177389250,17906427885397781504,131072 /prefetch:12⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4676 --field-trial-handle=1956,i,4398926620177389250,17906427885397781504,131072 /prefetch:12⤵PID:3196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3908 --field-trial-handle=1956,i,4398926620177389250,17906427885397781504,131072 /prefetch:12⤵PID:1452
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
868B
MD5690ffaa6a7619bef646810ee9a7d0d9f
SHA1ae58d4f39b9ef4064f706e1b3ea5703b247be245
SHA256ed7866f16834284da4bd193e2dd49fdfd9525cbff02a93d421ce041599072b8d
SHA5120c723f9f3b1df164c595cd21b79723502502e21490022f10819970770ac93e65765d4469586341c041aca07cc21ceb375a4d5b8ee278dbfc33c6365bc04fe1a0
-
Filesize
7KB
MD5703f884d5f325b09a0f4f49bc2dd0005
SHA18b1d0584957ec61039917b176c80702bfb8f4738
SHA25678aac44d8f3f4eb6ed9a81847cf413685876f278ce1be5d42f82813e5c30ca10
SHA512531dc0327c79f0524b8825de5f9aa00eb777f6bf104d5a4b556f1e5916bc7b40c4212b18a1e16de42cc79a7c60f647eacb33d596bd1a2e56122522cad2ba61cf
-
Filesize
7KB
MD505fcf0cf0a318bb4d440829a47f24ac1
SHA1872e5ffca2c2aa58e5007f4614b309fa01491a1c
SHA25694524b652822efe9154e85bd229f8ccdf397a2d46831095ad16d20bc5799649e
SHA512dbb98674f8a3ff37f1ba2ba393b92d3fc325e3f95cefdbf7a730e614870c81e753cd9b46bb938cf0b27f5c5afc7cde29dc8ab8cf2be989aec893a188c1f99278
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5351d4404cecfeeed743835d9e3f54bc9
SHA1cdaa9c3e963e398379dd2f6d45c664970f48a932
SHA256f2d88c416e313d3bf5688a20ba0b9614b87be519a075a416842df9c6ce386e0a
SHA512ceec21cf5bcc61a63ce14d1135f0d0fde0759a9d2595dde50015be1993b21a90c26e07fe549724d355361de85f57cdd3b859c48d7e0adb84ad1ced0217e9570e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57d60d.TMP
Filesize48B
MD5002038f27c4e71437ee6c830ded9598c
SHA11bb0e58171323bcc202333490a937488515f0f2e
SHA2569e1a53a602909d2b018cecbe6fa29c5b76b8f268ce911a8d1cd4f03897fe7f43
SHA5120afb60aafa5d62f7f1651801e479a4cb21e05e2f121af030f67cad9b3ce52c6770323b2943a3639914236eb753118898bccbf66021e0ac1c3d7405fce4d0a59b
-
Filesize
114KB
MD536be50a614bf555872a60badccd1b2fa
SHA1ba6983f1956d11e110dce0730b9a6c3bce6899c7
SHA256240e95f833b5a47ab5920386e8e8f656181b5211d13e46df17b72738bb314d3e
SHA5129bedef15d8274eae565b2484b49f2f7c9ed2da9015e90ddb446427569c6a7033e92cd3180b4e07baf07a31d6634f11a2435ac54a4617f45be669b9f5a99527bc
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd