Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 21:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://hanspecs.xyz
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
https://hanspecs.xyz
Resource
win10v2004-20231215-en
General
-
Target
https://hanspecs.xyz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133495689576936603" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3128 chrome.exe 3128 chrome.exe 4340 chrome.exe 4340 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3128 wrote to memory of 448 3128 chrome.exe 89 PID 3128 wrote to memory of 448 3128 chrome.exe 89 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 2296 3128 chrome.exe 92 PID 3128 wrote to memory of 464 3128 chrome.exe 93 PID 3128 wrote to memory of 464 3128 chrome.exe 93 PID 3128 wrote to memory of 3440 3128 chrome.exe 94 PID 3128 wrote to memory of 3440 3128 chrome.exe 94 PID 3128 wrote to memory of 3440 3128 chrome.exe 94 PID 3128 wrote to memory of 3440 3128 chrome.exe 94 PID 3128 wrote to memory of 3440 3128 chrome.exe 94 PID 3128 wrote to memory of 3440 3128 chrome.exe 94 PID 3128 wrote to memory of 3440 3128 chrome.exe 94 PID 3128 wrote to memory of 3440 3128 chrome.exe 94 PID 3128 wrote to memory of 3440 3128 chrome.exe 94 PID 3128 wrote to memory of 3440 3128 chrome.exe 94 PID 3128 wrote to memory of 3440 3128 chrome.exe 94 PID 3128 wrote to memory of 3440 3128 chrome.exe 94 PID 3128 wrote to memory of 3440 3128 chrome.exe 94 PID 3128 wrote to memory of 3440 3128 chrome.exe 94 PID 3128 wrote to memory of 3440 3128 chrome.exe 94 PID 3128 wrote to memory of 3440 3128 chrome.exe 94 PID 3128 wrote to memory of 3440 3128 chrome.exe 94 PID 3128 wrote to memory of 3440 3128 chrome.exe 94 PID 3128 wrote to memory of 3440 3128 chrome.exe 94 PID 3128 wrote to memory of 3440 3128 chrome.exe 94 PID 3128 wrote to memory of 3440 3128 chrome.exe 94 PID 3128 wrote to memory of 3440 3128 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://hanspecs.xyz1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b20f9758,0x7ff9b20f9768,0x7ff9b20f97782⤵PID:448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1876,i,2640757293547100831,1462188348468021606,131072 /prefetch:22⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1876,i,2640757293547100831,1462188348468021606,131072 /prefetch:82⤵PID:464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1876,i,2640757293547100831,1462188348468021606,131072 /prefetch:82⤵PID:3440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1876,i,2640757293547100831,1462188348468021606,131072 /prefetch:12⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3076 --field-trial-handle=1876,i,2640757293547100831,1462188348468021606,131072 /prefetch:12⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3760 --field-trial-handle=1876,i,2640757293547100831,1462188348468021606,131072 /prefetch:12⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4712 --field-trial-handle=1876,i,2640757293547100831,1462188348468021606,131072 /prefetch:12⤵PID:924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4720 --field-trial-handle=1876,i,2640757293547100831,1462188348468021606,131072 /prefetch:12⤵PID:940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4664 --field-trial-handle=1876,i,2640757293547100831,1462188348468021606,131072 /prefetch:82⤵PID:2496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3432 --field-trial-handle=1876,i,2640757293547100831,1462188348468021606,131072 /prefetch:82⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5052 --field-trial-handle=1876,i,2640757293547100831,1462188348468021606,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5348 --field-trial-handle=1876,i,2640757293547100831,1462188348468021606,131072 /prefetch:12⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD5add21a3ddcca193e467c3e87cfb3ca55
SHA1215259f1ac588a3a3b2a5417df2f89f1bbd968d2
SHA2564a6f7f07114b9f8e12d931865e6f4531c47329685db085c63f8958982ff7954f
SHA512256e8e4164e44319de8cad50f72b23ea114f285b9ddab888af5076fa7287050420f34c00f7412e071cc70c090d3eaa9aaa47e3374a63e0111cbaf8104476b132
-
Filesize
120B
MD5c912ba8bf5f57d02a401c09a6c0712c0
SHA1c99acbbd5f96d8dd1836811a88dfa1993226fd15
SHA2562a46509657a1ad30959dd1d929f350e634291c893d9472cdfc77dd24f6a0ad7a
SHA51256a4dd89a3853d8002205cd4d9b9122f1c52d735dbdc37351f7db9af2ba57ac460d961078d4ea397db14d3d4bd9d1ee5633312013162005a6f7ecb1b2c99103c
-
Filesize
1KB
MD5b9cdd05140a0c27130c7950dadc1f38f
SHA177d3dafebf38c3f4372702a5e2179609008c36ae
SHA256ca4aafaac714477d8aea8f5089dd7fbb78b3fe848838d68798291146ea8a6e08
SHA51234b15fcb4dfce7da4c16ad627d85cf022ac9057d710818b53e63c0d22e678143238b560e712735ef7189b4f0fc9bd0501d12fb7edcb3c5aae3b4154b2a6d4bfe
-
Filesize
6KB
MD5ca7724f96880d464736ba227cded4d84
SHA129fe37e6da0ff171a965d458e76ddf46dde8e619
SHA2569684764e3e66a017fd96f5f8f7d5dc6c2bf36ae8979953201d4751d4ffd389fa
SHA512215c6ab228c01ca8611d34d1ff49a015e85d9414391b4d17ee08f95b77f644264d41e706ce12a038b308d934f2e41a6a4f74a73f566e41348a8f9cc960a714fa
-
Filesize
6KB
MD58451a798f04861c14fe21e4f76af06b2
SHA108b0126e6d55d4aff39f583ad9777827abd3f3a4
SHA2561104e0c8e8b6722dfefab8ca2202577a3a0ce1d17e09c0d8dd48b3075e31c3c4
SHA512cc3016fa5f313c0f57d4746e666bb4ac30d01509063b265ad8c1d4033c0293291c11693b01a62c83bd4f9484a5fe6e7afde9f03f12a125a2ab2a80ddb242597f
-
Filesize
5KB
MD5e026f8115bd090d80cd4237af350f629
SHA1c982dd53276d911a29827dcddff635dc0624e913
SHA25676f2c4e023f6a61d6a15cd22c46b850c8e8f8daa4c138b9c67e5ada282589e0f
SHA512e4ffc661671958ed8c9dadcf5e975664a60deb598272ba00b719d52565be5b7cf4c27a335c7c4dac66d01caf0c120c6aa7ba6faa19ba1c2ed5d39a5776c3ef72
-
Filesize
114KB
MD5b12b828a2de55d68b95aa785946a958d
SHA1b89f97e23900282a2c884bf57890ae61509f3ab1
SHA256375a2ddf2c82bade75cc58f91164c2f3c8bf5a412ae36c9d21bbe436925d34da
SHA512b1802ac681cc40acf369ae57310a3f05645ae671f76411c583bf5d8e75d5b56bcd59bd568734164a5f7b75ff8ab9216210f08ad17ee5fb222808a58fdfbdf479
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd