Analysis
-
max time kernel
1799s -
max time network
1685s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 02:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://order.surfshark.com/checkout?frequency=24&slug=vpn
Resource
win10v2004-20231222-en
General
-
Target
https://order.surfshark.com/checkout?frequency=24&slug=vpn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133495024957381571" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3420 chrome.exe 3420 chrome.exe 2516 chrome.exe 2516 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3420 wrote to memory of 4492 3420 chrome.exe 51 PID 3420 wrote to memory of 4492 3420 chrome.exe 51 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 1672 3420 chrome.exe 92 PID 3420 wrote to memory of 3000 3420 chrome.exe 93 PID 3420 wrote to memory of 3000 3420 chrome.exe 93 PID 3420 wrote to memory of 1004 3420 chrome.exe 96 PID 3420 wrote to memory of 1004 3420 chrome.exe 96 PID 3420 wrote to memory of 1004 3420 chrome.exe 96 PID 3420 wrote to memory of 1004 3420 chrome.exe 96 PID 3420 wrote to memory of 1004 3420 chrome.exe 96 PID 3420 wrote to memory of 1004 3420 chrome.exe 96 PID 3420 wrote to memory of 1004 3420 chrome.exe 96 PID 3420 wrote to memory of 1004 3420 chrome.exe 96 PID 3420 wrote to memory of 1004 3420 chrome.exe 96 PID 3420 wrote to memory of 1004 3420 chrome.exe 96 PID 3420 wrote to memory of 1004 3420 chrome.exe 96 PID 3420 wrote to memory of 1004 3420 chrome.exe 96 PID 3420 wrote to memory of 1004 3420 chrome.exe 96 PID 3420 wrote to memory of 1004 3420 chrome.exe 96 PID 3420 wrote to memory of 1004 3420 chrome.exe 96 PID 3420 wrote to memory of 1004 3420 chrome.exe 96 PID 3420 wrote to memory of 1004 3420 chrome.exe 96 PID 3420 wrote to memory of 1004 3420 chrome.exe 96 PID 3420 wrote to memory of 1004 3420 chrome.exe 96 PID 3420 wrote to memory of 1004 3420 chrome.exe 96 PID 3420 wrote to memory of 1004 3420 chrome.exe 96 PID 3420 wrote to memory of 1004 3420 chrome.exe 96
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://order.surfshark.com/checkout?frequency=24&slug=vpn1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83d489758,0x7ff83d489768,0x7ff83d4897782⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1884,i,3605266407750368534,11548595440528034267,131072 /prefetch:22⤵PID:1672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1884,i,3605266407750368534,11548595440528034267,131072 /prefetch:82⤵PID:3000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2888 --field-trial-handle=1884,i,3605266407750368534,11548595440528034267,131072 /prefetch:12⤵PID:1152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2896 --field-trial-handle=1884,i,3605266407750368534,11548595440528034267,131072 /prefetch:12⤵PID:1620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1884,i,3605266407750368534,11548595440528034267,131072 /prefetch:82⤵PID:1004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4720 --field-trial-handle=1884,i,3605266407750368534,11548595440528034267,131072 /prefetch:12⤵PID:4184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 --field-trial-handle=1884,i,3605266407750368534,11548595440528034267,131072 /prefetch:82⤵PID:4452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 --field-trial-handle=1884,i,3605266407750368534,11548595440528034267,131072 /prefetch:82⤵PID:4648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=1884,i,3605266407750368534,11548595440528034267,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2516
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4692
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4408
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:2172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5123063cfc1afc4c38ff7eff1d8b16b73
SHA1c35bf5a1123b97bd3fea16a1e614b1a43ac0d8f2
SHA25665a3b89882697e2317839df4bd16301a75118d8dce8149bbd2110ec9d973e531
SHA51292055002ec5fee1cbacefe4a6b0dc43be1f4b99989e3ecb7316fb0a26a914dfafa3290347d43814f2bbec8701210769d9fac7aba9804e88caa126e40d948b942
-
Filesize
408B
MD50a0942696f62cb9aed6295485efe7ec6
SHA1707fe26c8758686c890e1a088f0de25df6a5faa2
SHA25672f35c15b6def7bcbc338b538e59fe96e975e7d132d618574b969777fa635b7e
SHA5120c29d46db3f9ffb2d681cd64909a72e83524a106833e4b59422fb77e4cfc8e142a3fcffd3b81c6314ab2c26c14bbfdb74a6671217719b44bd2ae37a208642187
-
Filesize
1KB
MD5f3211bb89c693d932bd3649e19cd4959
SHA1f28549b91d503ee4fbefa602cc7a63b5048d9fb9
SHA256edb8e49181004bfd60a661c6157666ec2f180c6b262b4d49d36be020d7ccdf83
SHA5126bb7f823309e0b414a6f6f080dd49f5c0d43582c6b12dc515ab0c6c6d1c07a90bb980ba8ac0314606fc83cd775217a7c4f9a9fc1165fd1d017e5d9ade022c16c
-
Filesize
4KB
MD557243b3596874168ee4e70abeca1cad5
SHA160ff6796a7722f1d1f4ac701816383051535e50b
SHA256fea3765408a150b5cd0b7c9e1452631f14680328e9614657cdcd80529f8be05b
SHA5128cdc9f569a27402e6fc082e7ad1d03853e5febe46dd0854b9efe1a4ff95042cb7de0684c0529d098d01b30838ae6b7a94fa99715b138d1953123f088c09b35e3
-
Filesize
1KB
MD54064768f1e98c5a1eea37050eef5ec6d
SHA11217e513629e24e24184da59c9227372de166972
SHA256d033a8ac0592eaf6912b8799844b8f63828a489a62efd6d6695cfca4dba9a90a
SHA51229296e14f2805a27b43b45275cb8b7849c856f1223054b3be3f6ce227ac894f6ff7ee8e64f76ac536d47d9a8b6064dc47f298e3f7439841cba82f8f3372c2431
-
Filesize
6KB
MD5b1caf7b2e55cb47c038ed851181d1796
SHA1b5c65b2437fe0fce52bcfbdefe1490c701295ab7
SHA25627150a2ceadbff955512a87f18e3bfff5866c4e53bdb72e16840af0864a00cd9
SHA512615fee3289233b586da28dbfcaa5ab51527a5b3a2d7a8ebfea43b6f0ec0a764237aa721547d4c0af4872833b2ff1637c52bcee22c98a91124210f559ee4c6250
-
Filesize
114KB
MD5aab75049c94d1e73354d234cc0e99f76
SHA1119648f83dcfb2bc3f5171a31ac404e2a8b494e3
SHA256d1d149c22131f7da466dfea2cfbbd97225407ee6a36b088b945b369ebda75ae8
SHA51299344641548bb9e0f17b2d4614312e71e400963495afc65847700be2fd76c8360bacfadfc487fbc34f9ff49231fe0202946d60c8287b8dfaa09fcb2d6a8c2131
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd