Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
10-01-2024 15:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://bantrablueprint.in
Resource
win11-20231215-en
General
-
Target
http://bantrablueprint.in
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133493753457750833" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3876 chrome.exe 3876 chrome.exe 3852 chrome.exe 3852 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3876 wrote to memory of 3324 3876 chrome.exe 81 PID 3876 wrote to memory of 3324 3876 chrome.exe 81 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 3504 3876 chrome.exe 84 PID 3876 wrote to memory of 1676 3876 chrome.exe 85 PID 3876 wrote to memory of 1676 3876 chrome.exe 85 PID 3876 wrote to memory of 636 3876 chrome.exe 86 PID 3876 wrote to memory of 636 3876 chrome.exe 86 PID 3876 wrote to memory of 636 3876 chrome.exe 86 PID 3876 wrote to memory of 636 3876 chrome.exe 86 PID 3876 wrote to memory of 636 3876 chrome.exe 86 PID 3876 wrote to memory of 636 3876 chrome.exe 86 PID 3876 wrote to memory of 636 3876 chrome.exe 86 PID 3876 wrote to memory of 636 3876 chrome.exe 86 PID 3876 wrote to memory of 636 3876 chrome.exe 86 PID 3876 wrote to memory of 636 3876 chrome.exe 86 PID 3876 wrote to memory of 636 3876 chrome.exe 86 PID 3876 wrote to memory of 636 3876 chrome.exe 86 PID 3876 wrote to memory of 636 3876 chrome.exe 86 PID 3876 wrote to memory of 636 3876 chrome.exe 86 PID 3876 wrote to memory of 636 3876 chrome.exe 86 PID 3876 wrote to memory of 636 3876 chrome.exe 86 PID 3876 wrote to memory of 636 3876 chrome.exe 86 PID 3876 wrote to memory of 636 3876 chrome.exe 86 PID 3876 wrote to memory of 636 3876 chrome.exe 86 PID 3876 wrote to memory of 636 3876 chrome.exe 86 PID 3876 wrote to memory of 636 3876 chrome.exe 86 PID 3876 wrote to memory of 636 3876 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://bantrablueprint.in1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff3abb9758,0x7fff3abb9768,0x7fff3abb97782⤵PID:3324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1572 --field-trial-handle=1800,i,5737700324352102782,4307950463343520177,131072 /prefetch:22⤵PID:3504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1800,i,5737700324352102782,4307950463343520177,131072 /prefetch:82⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1800,i,5737700324352102782,4307950463343520177,131072 /prefetch:82⤵PID:636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2960 --field-trial-handle=1800,i,5737700324352102782,4307950463343520177,131072 /prefetch:12⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2944 --field-trial-handle=1800,i,5737700324352102782,4307950463343520177,131072 /prefetch:12⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 --field-trial-handle=1800,i,5737700324352102782,4307950463343520177,131072 /prefetch:82⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5028 --field-trial-handle=1800,i,5737700324352102782,4307950463343520177,131072 /prefetch:82⤵PID:980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5180 --field-trial-handle=1800,i,5737700324352102782,4307950463343520177,131072 /prefetch:12⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 --field-trial-handle=1800,i,5737700324352102782,4307950463343520177,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3852
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
576B
MD5ec6bbc7181ccfe8be61adafd0701143d
SHA1dcf050a506b0c759c325e687643b7d7088d4f9d3
SHA256a34f27572bcbe887047c42c39102c9b27819c781fa858993ebde2cf319afc9c7
SHA5126c8a0bf7e9af37b5dbbbaf93d1c45f5531398cabfb6ae2e38f8d7f52f0c50a8100afe408733daf78faee14c1ecfcda6f43eee2741fbac6a5e5c061ac15f9a2fe
-
Filesize
1KB
MD52b03a21fa164df0083d87effe8016ce3
SHA1586c4749d50eee84391dcc0e146c83f8a6812515
SHA256f508dc90242b163354f08b57c465efea59f60a9d47e1aa0967fc0c371f1cdd8d
SHA512b015f921f3b00cb41c72735252511b0b701156c193ee4cdba88315322fcd3586969e2414b675409ab9b47d3a30addb8f22a4b53cd85ac7b186f68a5a2b3c7ccf
-
Filesize
1KB
MD566a4fc7cc3feb0ec47a70fe5aa60df80
SHA154b8232c362357b59284220ed24a894ab0baed3f
SHA256714b6486425007db476531c04ff4aac7a111ca9d1cf6c5a807a757307cf902e4
SHA5126a07ded163d2f2e0e36e5e9e3994ad6bb579018735d1c3324eb4b1529740a4975630e45be6d649115d1a6112e1072ff008612ac863a2861fbaf0a029156982ae
-
Filesize
1KB
MD522d0d5e7cc232b84c12db24064e403a2
SHA19b3ee2c82b90576908416923d626bf51e758586c
SHA256b79e629b7e599afc52400ac3d2ba2921fbee24e500eddec7d9e8a33284f30bf9
SHA51243534b2d1173fa6b7db48c8eecc938adffe4bbfff1fa6020bd1cb91d003270be106092c18f104d92f52567327db1a01473fd762d47d61ea9f9e97c5fa60a7eb3
-
Filesize
6KB
MD5c2b7451b34a7fb48792229e70b43c3a8
SHA1783737251db4ce52d3053768bc83455e6667d9f7
SHA25608b67a274a70518af725318cf35ffc380996465b21eb1fd69263a030aec1927f
SHA51205bc22231ba3da7b1a6affe6b9124eac528637f765ad00f0574d96d6d35e4b65b85e21032f7ce67d05f99c59f132a3ef61dc6c39d1f71ebdebbab90fd0c3d816
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\fa8e923fb2fd825ef5ba8c4b8ca0561f4e0eac59\index.txt
Filesize116B
MD5b5ddd8019d46c91bb35285f5f390efc0
SHA16f8e908e19268d5c62707bc6ef76ebef2411e166
SHA256608768825e922a665c4060f43bf20a8817c263c656aa25600ff66d4fbb825c4f
SHA512fc469aa256f08e77f8d1fdc93476289d4df5537233956875de75257ac9ef27cb910e9941698205415f76e15bc2d48acf3a7201c506bb0f9fc6f13974cc1ff7a8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\fa8e923fb2fd825ef5ba8c4b8ca0561f4e0eac59\index.txt~RFe57f174.TMP
Filesize123B
MD579a1ecf4f2a96c9400ab2b39bc1345b3
SHA1f9bab60d4c4b33d8c72d606308468bc8ca301cb3
SHA2561759edee794320509fa32621534517bc2cbbcf70eb4097433689c149b2b037b9
SHA512ae387f1b5d488045c9d783c007531c5a59c462208b389dda5104d51b270a2e7514d3f98594f1d94266484a79a2262f1b38461b0dffe903803d00f8cc5b7ca50d
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5bcc19a7d5b9a86a013c71d77ea4fbaea
SHA1370b2e58f4a070611d29f30a792ace8b51d4a5aa
SHA2560112912e8cd3de2d2f623d6bc50a554494bc76f9d48962934a144f3da0085d7f
SHA51208715431a969aa8012f7a5543cf7ecbacb3cd456663837ccbbf5c44a5314b218d181d11ad63b6fdfd467e35ffe84ca229e365782250423440f905be92dca219f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57f136.TMP
Filesize48B
MD5954f0e96d267059099507bb67f90d1f5
SHA1f99e08a9e0777ac3bc2cee433751018fccc65568
SHA256340da9f9ffbe1ab9a33da16a166f606863ff0191a9c69d08afc8c5b2edaa37ca
SHA512c93e17d353c34fed266da5e219112cbbbc3ec55a246eba95c03584c4a6bb4bfae272ecc8f2b4bfded8cefc8d9ac63253057b3f28fe82790fc22a7fb306a670de
-
Filesize
114KB
MD52f42c324e0aceb97a26912bb30e2130d
SHA1927b47de82b1d29e3e65ba12807969c388e89109
SHA2564fc4316c426d9614868df4c2544e3696fae01744f5463e2d09a75fec83db237a
SHA512aae030bbf7df4ceb262a85049f53f224ddae68049d68561acc9ba0ee539b15ca5746e94cb722173f69b7e50a9391ce49b225e5599097f39d8d1f93af83f827c0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd