Analysis
-
max time kernel
1199s -
max time network
1177s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
11/01/2024, 13:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://sakura.ad.jp
Resource
win11-20231215-en
General
-
Target
http://sakura.ad.jp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133494546558608739" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5788 chrome.exe 5788 chrome.exe 3572 chrome.exe 3572 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe Token: SeShutdownPrivilege 5788 chrome.exe Token: SeCreatePagefilePrivilege 5788 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe 5788 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5788 wrote to memory of 5548 5788 chrome.exe 77 PID 5788 wrote to memory of 5548 5788 chrome.exe 77 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 3212 5788 chrome.exe 79 PID 5788 wrote to memory of 4620 5788 chrome.exe 80 PID 5788 wrote to memory of 4620 5788 chrome.exe 80 PID 5788 wrote to memory of 2204 5788 chrome.exe 81 PID 5788 wrote to memory of 2204 5788 chrome.exe 81 PID 5788 wrote to memory of 2204 5788 chrome.exe 81 PID 5788 wrote to memory of 2204 5788 chrome.exe 81 PID 5788 wrote to memory of 2204 5788 chrome.exe 81 PID 5788 wrote to memory of 2204 5788 chrome.exe 81 PID 5788 wrote to memory of 2204 5788 chrome.exe 81 PID 5788 wrote to memory of 2204 5788 chrome.exe 81 PID 5788 wrote to memory of 2204 5788 chrome.exe 81 PID 5788 wrote to memory of 2204 5788 chrome.exe 81 PID 5788 wrote to memory of 2204 5788 chrome.exe 81 PID 5788 wrote to memory of 2204 5788 chrome.exe 81 PID 5788 wrote to memory of 2204 5788 chrome.exe 81 PID 5788 wrote to memory of 2204 5788 chrome.exe 81 PID 5788 wrote to memory of 2204 5788 chrome.exe 81 PID 5788 wrote to memory of 2204 5788 chrome.exe 81 PID 5788 wrote to memory of 2204 5788 chrome.exe 81 PID 5788 wrote to memory of 2204 5788 chrome.exe 81 PID 5788 wrote to memory of 2204 5788 chrome.exe 81 PID 5788 wrote to memory of 2204 5788 chrome.exe 81 PID 5788 wrote to memory of 2204 5788 chrome.exe 81 PID 5788 wrote to memory of 2204 5788 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://sakura.ad.jp1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5788 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa54a79758,0x7ffa54a79768,0x7ffa54a797782⤵PID:5548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1772,i,1186994526684115077,14658663014916680039,131072 /prefetch:22⤵PID:3212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1772,i,1186994526684115077,14658663014916680039,131072 /prefetch:82⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2160 --field-trial-handle=1772,i,1186994526684115077,14658663014916680039,131072 /prefetch:82⤵PID:2204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3116 --field-trial-handle=1772,i,1186994526684115077,14658663014916680039,131072 /prefetch:12⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=1772,i,1186994526684115077,14658663014916680039,131072 /prefetch:12⤵PID:1640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4640 --field-trial-handle=1772,i,1186994526684115077,14658663014916680039,131072 /prefetch:12⤵PID:1828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 --field-trial-handle=1772,i,1186994526684115077,14658663014916680039,131072 /prefetch:82⤵PID:4660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 --field-trial-handle=1772,i,1186994526684115077,14658663014916680039,131072 /prefetch:82⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2508 --field-trial-handle=1772,i,1186994526684115077,14658663014916680039,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3572
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456B
MD556572f86205c1924e6f918a14749a28b
SHA137161ee800b18a363a961ac6155a6b2e8bf77427
SHA2567a886d804f9b24adba6ce00c17ed5209a95e3d5a1a85c802b2dce4747e6f729e
SHA5122f67ae05323ffe2b273fc3b01ffa06a6541d4c80ef7130f4d615133a3b40b588ec83110e045fba0e30a15d1c9ef2e51a7a69699c2c47f598c71cd7769d180f92
-
Filesize
1KB
MD55ec1b7496cb20c5971908e24d39ae2f8
SHA15901feb99c5ac4523e8dbf64a9f024336c607128
SHA256c36917477cabbff2d61ffd851df3fc96a24b299ff5304c01271b361c8d3b982f
SHA5126b9c70671247fdc958ec804e2d3d65af9c6bcdfe3e82ae3496d2441cb801195a3802a7da7fc095cb57b096e7fca1b49f8ea4655361cb9181e0645126040733a5
-
Filesize
3KB
MD5727c73301c20e801dae8cf9575f8b231
SHA1e8b7012052c9c6c6744376e6c7299892952f1789
SHA256a7af3ff808416f8624c5fd5c3549074d9b01e4c5b0bdacdb3d71650b5408a429
SHA5126ee3527aa87eb8afc2b12c9b39fa42bf230260417deeb877c7c17b89dfd68b497a35652a8ec61d9d8d9ddf530195bfa0f632cb2c944f2a225b8fd312973e589f
-
Filesize
3KB
MD5ff7a0d8fd9b7d9a5cc54d33d058b2e86
SHA1f4ce5856adb89687b290700dad57de981d692016
SHA256fc0e639181fbafd649f8d3f40cebddd913b72abad94ea9b3008706ea6a20eca5
SHA51255bc7f8c49485448b742ebee0d4d7e880dd593b7ed658d7d87fd8d10c27a92eb53dd5ee7486a22af13219014da6d855359353ad13e612987e9322ad152b7b093
-
Filesize
1KB
MD51bfae492068ddeb757b56ce79931efd6
SHA14c27ce2df0a56879fa09fd0a024b047ca01d7f02
SHA25610cc226f9a3553f5762b435eee2fb219f269e5e9cb193c81365d95c82f6e322d
SHA5123370b11f1717421ec73e19230a878042a2278cf2dadea2bb4e86592d0b2e64920920f484cb1145fd27197af00c307e01c78c382cae78e89786866042483308a1
-
Filesize
1KB
MD5a57bbfcdf227aa6b9d3acd984b8acc74
SHA153294d3c952eca7a600e2e467eebe09aa5563699
SHA256b7ea8555be5856f8faed03d29394b18ebffd87f03d748fe20381c10552b84c4c
SHA5124a94463f64fefc37ccec95ab795ca4e662212fee522a85f157c510cc356208643757b275e59f6401e74b5c1f935d15e6f0b5bea06368b8f21f2bbe3b4ddc7454
-
Filesize
6KB
MD5518277b2c80a0737cacb96f7268a22b4
SHA1d517f3bcea9476272c587e386a36b8e667956eac
SHA2569819ea40b925101899a06175654906f50c8cd196f44d3d82ab760bab4edc1680
SHA512f519e6e962e8c838542e426991fb06bf47d5df7fb408a5e169e7a14df7fe71443297377172cf5005c460023d43b422aff9b9d77ead4981a296bd8d762ac7202e
-
Filesize
114KB
MD593fa633c2afa69a986197cac933c7642
SHA1307cea49e186397938d3ff4978b3d393ae61f1ab
SHA256e63e0df9f977a457b7ca835556fc0f596084775dce3f08aa409248b9ba6babbc
SHA5120c99711d4b2b6c12853d320d1b160e21c7e6e8c183fa565f800b933a388f035222a9c42109e74f47e3d9ff6bafe1707d6224a5d2a772053dfaafe921718d7f29
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd