Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 14:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://SANITASLIFE.RU
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
http://SANITASLIFE.RU
Resource
android-33-x64-arm64-20231215-en
General
-
Target
http://SANITASLIFE.RU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133494554722449125" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4164 chrome.exe 4164 chrome.exe 4344 chrome.exe 4344 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4164 chrome.exe 4164 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe Token: SeShutdownPrivilege 4164 chrome.exe Token: SeCreatePagefilePrivilege 4164 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe 4164 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4164 wrote to memory of 4852 4164 chrome.exe 88 PID 4164 wrote to memory of 4852 4164 chrome.exe 88 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 2292 4164 chrome.exe 91 PID 4164 wrote to memory of 1464 4164 chrome.exe 93 PID 4164 wrote to memory of 1464 4164 chrome.exe 93 PID 4164 wrote to memory of 4560 4164 chrome.exe 92 PID 4164 wrote to memory of 4560 4164 chrome.exe 92 PID 4164 wrote to memory of 4560 4164 chrome.exe 92 PID 4164 wrote to memory of 4560 4164 chrome.exe 92 PID 4164 wrote to memory of 4560 4164 chrome.exe 92 PID 4164 wrote to memory of 4560 4164 chrome.exe 92 PID 4164 wrote to memory of 4560 4164 chrome.exe 92 PID 4164 wrote to memory of 4560 4164 chrome.exe 92 PID 4164 wrote to memory of 4560 4164 chrome.exe 92 PID 4164 wrote to memory of 4560 4164 chrome.exe 92 PID 4164 wrote to memory of 4560 4164 chrome.exe 92 PID 4164 wrote to memory of 4560 4164 chrome.exe 92 PID 4164 wrote to memory of 4560 4164 chrome.exe 92 PID 4164 wrote to memory of 4560 4164 chrome.exe 92 PID 4164 wrote to memory of 4560 4164 chrome.exe 92 PID 4164 wrote to memory of 4560 4164 chrome.exe 92 PID 4164 wrote to memory of 4560 4164 chrome.exe 92 PID 4164 wrote to memory of 4560 4164 chrome.exe 92 PID 4164 wrote to memory of 4560 4164 chrome.exe 92 PID 4164 wrote to memory of 4560 4164 chrome.exe 92 PID 4164 wrote to memory of 4560 4164 chrome.exe 92 PID 4164 wrote to memory of 4560 4164 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://SANITASLIFE.RU1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeac089758,0x7ffeac089768,0x7ffeac0897782⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1868,i,5050225978349399333,7918974932216117692,131072 /prefetch:22⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1868,i,5050225978349399333,7918974932216117692,131072 /prefetch:82⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1868,i,5050225978349399333,7918974932216117692,131072 /prefetch:82⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2852 --field-trial-handle=1868,i,5050225978349399333,7918974932216117692,131072 /prefetch:12⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2844 --field-trial-handle=1868,i,5050225978349399333,7918974932216117692,131072 /prefetch:12⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4708 --field-trial-handle=1868,i,5050225978349399333,7918974932216117692,131072 /prefetch:82⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 --field-trial-handle=1868,i,5050225978349399333,7918974932216117692,131072 /prefetch:82⤵PID:1704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5396 --field-trial-handle=1868,i,5050225978349399333,7918974932216117692,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD52566dddcf1b80b17cb0b478740ae5be4
SHA10fec2d983eb4574f2ac482896a1842873a33d43b
SHA2565547e0af286f9b2f447862bdb8246aff3b82e1dabd73b2cdf777285a3c8adcf7
SHA5127ce039fd09d9dd5cfae886b8f347886b9e80b95e6496b85fb9f89affc7a04694c910ac46f4e5fa86f95396f5d2706bbe2e41448ed208bc2751ab83b25b985dae
-
Filesize
2KB
MD5487be1cc32b81aa5e1b3ec638fc72c89
SHA17f61562fbfd46545cd681093485aeaa27670f647
SHA256bd3ac347ea43679aee9ebbb99500b33ce3fe839e021138e08e40ef58bda18fdb
SHA512a756991dfa1a872655c1e980d538b8d0535a165205397d1b1cf518eb04bf2360c6759855bc7494a81208e10c1a9aabcaa9f888faaae61f3abb06e2be12a99375
-
Filesize
539B
MD5529610e940cf932ce708770fd2b61dc6
SHA167d23eee4471c2d65c465acc2315bf4474f6fe18
SHA256829830d37e021be8d042ea105c83abe261c1ed9eca39f8d7aebd1dd60f747efd
SHA512796bbd44cb65d6af4bf22a3b242a06727166fa2330144a08e7f71367ffe8559166a01663425e2b86d0d433980b7e848ed07daf0a026bd9933ec413ba1849f8cb
-
Filesize
6KB
MD5d71bd4abae83e9bc76b1b119187d270c
SHA175fd9c9b98d419639078f45f67186c536a886005
SHA256322283a376ecbf48644b582ce513e9e5c9e1e3f906ebd1a644b5810bd6616d96
SHA512428139b208e3b7c9d5b27f003e3e23e2e46abed8b5d618545099615418a2c6d695c485d1162c24d4a7486758b3524b0837216802e7b4a4966a39183f60264e12
-
Filesize
114KB
MD5342270c01def03be68167d9064569ace
SHA1c661c7f8313b8e408dec207e231b8c615442922d
SHA256d2af06d88db3a002ce741e62f8c7ca52c362c493247011f328512d837cfa42cd
SHA512627c659ab631a0a73cee71b6c0fd819d5146abfd4c68220dbcb6583f9dcb4cf9584a5ae951b027b2ffeb59235e1aef57b8901c2534f6f59b16d433c116108a7c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd