Analysis
-
max time kernel
1802s -
max time network
1720s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
10-01-2024 19:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://canettech.com
Resource
win11-20231215-en
General
-
Target
http://canettech.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133493882636524434" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4788 chrome.exe 4788 chrome.exe 2460 chrome.exe 2460 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe Token: SeShutdownPrivilege 4788 chrome.exe Token: SeCreatePagefilePrivilege 4788 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe 4788 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4788 wrote to memory of 1124 4788 chrome.exe 78 PID 4788 wrote to memory of 1124 4788 chrome.exe 78 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1968 4788 chrome.exe 81 PID 4788 wrote to memory of 1780 4788 chrome.exe 82 PID 4788 wrote to memory of 1780 4788 chrome.exe 82 PID 4788 wrote to memory of 892 4788 chrome.exe 84 PID 4788 wrote to memory of 892 4788 chrome.exe 84 PID 4788 wrote to memory of 892 4788 chrome.exe 84 PID 4788 wrote to memory of 892 4788 chrome.exe 84 PID 4788 wrote to memory of 892 4788 chrome.exe 84 PID 4788 wrote to memory of 892 4788 chrome.exe 84 PID 4788 wrote to memory of 892 4788 chrome.exe 84 PID 4788 wrote to memory of 892 4788 chrome.exe 84 PID 4788 wrote to memory of 892 4788 chrome.exe 84 PID 4788 wrote to memory of 892 4788 chrome.exe 84 PID 4788 wrote to memory of 892 4788 chrome.exe 84 PID 4788 wrote to memory of 892 4788 chrome.exe 84 PID 4788 wrote to memory of 892 4788 chrome.exe 84 PID 4788 wrote to memory of 892 4788 chrome.exe 84 PID 4788 wrote to memory of 892 4788 chrome.exe 84 PID 4788 wrote to memory of 892 4788 chrome.exe 84 PID 4788 wrote to memory of 892 4788 chrome.exe 84 PID 4788 wrote to memory of 892 4788 chrome.exe 84 PID 4788 wrote to memory of 892 4788 chrome.exe 84 PID 4788 wrote to memory of 892 4788 chrome.exe 84 PID 4788 wrote to memory of 892 4788 chrome.exe 84 PID 4788 wrote to memory of 892 4788 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://canettech.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbba049758,0x7ffbba049768,0x7ffbba0497782⤵PID:1124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1552 --field-trial-handle=1736,i,12335892600914370498,2277491279199283254,131072 /prefetch:22⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1736,i,12335892600914370498,2277491279199283254,131072 /prefetch:82⤵PID:1780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2784 --field-trial-handle=1736,i,12335892600914370498,2277491279199283254,131072 /prefetch:12⤵PID:2816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 --field-trial-handle=1736,i,12335892600914370498,2277491279199283254,131072 /prefetch:82⤵PID:892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2792 --field-trial-handle=1736,i,12335892600914370498,2277491279199283254,131072 /prefetch:12⤵PID:800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4672 --field-trial-handle=1736,i,12335892600914370498,2277491279199283254,131072 /prefetch:12⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 --field-trial-handle=1736,i,12335892600914370498,2277491279199283254,131072 /prefetch:82⤵PID:2416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5000 --field-trial-handle=1736,i,12335892600914370498,2277491279199283254,131072 /prefetch:82⤵PID:3344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3688 --field-trial-handle=1736,i,12335892600914370498,2277491279199283254,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2460
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD54b39de87247fbfea88b926fdc6c99324
SHA134a8312db1778633db1b0af74adca78a9eb65f7e
SHA2561bf01979b1a205a54aa2d5c4b09bf552f8ef6be56a59c1fc2fc4be9b458ae205
SHA51299e4b56a5427343102d52360b5a75e01b2a4d2f3104e7b5b18efcea8c6e3f59e45e85ae2116fe6e7648d1a96b8c67715ac2acd0eba55a54f74b4a9dc5ed9cda0
-
Filesize
1KB
MD503e192182d2d9a5d69b12e2e7d18fab3
SHA14846d1ef6aca5437db018c83c0bc62783a774128
SHA256c9859728683baca866268a54206e61eb6f89b119fa38d6b322e12498e0717da7
SHA51269c600dbd748dd8615bcc0ec5fbe1229d84da75dc2dedf6dc634ab36cd8de79738db6a884dbded17dcd82f996bab6f5b31265bf0342c524345d5319665bdf6bd
-
Filesize
1KB
MD55542d3eabaea05bac8e5f7f084849425
SHA13377d2ba3fe17a84acbcaea00ca11b2e8ed2afd6
SHA256c6eb303cfb58f96bf0b7900f3de3e74fb20995d62c2dd874f45e10cffa50a77d
SHA51258e5f0ee4ff5fd2779e7c5624879789fc91431dd0d4c81fa32409364477e8c9b9149416653d442a3612c53015fa77e95983cada8ac852e174a4e32da12e161e5
-
Filesize
1KB
MD5ace06fccf5958d252489cc7fc3f45bb3
SHA18c83bfe5d578c3124ac32548b5209891c2f92642
SHA2568d1c8cd22776f5965f3ed83b5aa76bec85fdda7c8f9251e729bda363c6eebacd
SHA512653b703293a1bbd930e32933564fcf33a166a655ebac0840e4a0ec6a000b345157e590bf6150bd23331e0178badc7cb219f2c184fd9bba4ac6bb2a3ef91bae6c
-
Filesize
1KB
MD5d8282a5d8ed956f5d4bd6de491010e94
SHA110d06967b3647cb3225c2afc615838ffc30defbb
SHA256587cb3362c38d319fc9a2702e0a74d76c21d4301708b91d763f298f501e73d89
SHA51254915e0417111ce8a8ac8fb7cd4af226e6cd56f4ae8e15649d6b807066e462eb5ed7cbebe96f000b674c4c4487900ceb06b5492cd2b0499b88911f82fde6e960
-
Filesize
6KB
MD5a2fc24d69bb0cb57c628aa99531c20fb
SHA18bc6b4a93ff37372485b4fa38a9e408a9977c1c9
SHA2561ffc19a90f473eadcad0fdfd2d868e5b31b75ddaaa03f5f487c465e89ab1004e
SHA51274cb26654467a400248e001605a7ecf3bbe1d987b41e023a29d8c60557ae75c8a264ae4d90e07b3fed6e4cdf572913d950e010db549a2c74b7d820cfaf05bd64
-
Filesize
6KB
MD59f24361f22ae5f1bcab07246873a1467
SHA18d62512d78804f56014d77638168806d7b1fb049
SHA25645db3cb05bf776b91617afc9a7daeb738e4d8f011f9f591407a05a680ea20991
SHA51234377c90222acde329656dc09b5bb96ddb427f9b25add6b128ddd014ca8fb8f0248be7d6dd4f437a67874d4c92a3c16c849c265c79d2296dd50284853a1d41f7
-
Filesize
114KB
MD54f619127098591d035a6d77cd23165fa
SHA198c935cbf1471151e35bd12ae09edd2af9ff3020
SHA256803accda8dc47c55cef16cb00c8e0b28cc2130de496a8cccf19be45f7dd7063e
SHA5123aebd43f7555ee82856813fffe0324b2dd467565518b4df619906c5cb3da0d0f67856a1a733c0abba20ed8c487543ad7aef3b85dcf19277cdac2d1159cb59c2f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd