Analysis
-
max time kernel
111s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-es -
resource tags
arch:x64arch:x86image:win10v2004-20231215-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
12/01/2024, 17:22
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cloudflare-ipfs.com/ipfs/bafybeiedr4g3hgfusf3u5dtowlkuh6me5w6fp2pwayser54ctxyhopgxoa/#[email protected]
Resource
win10v2004-20231215-es
General
-
Target
https://cloudflare-ipfs.com/ipfs/bafybeiedr4g3hgfusf3u5dtowlkuh6me5w6fp2pwayser54ctxyhopgxoa/#[email protected]
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133495537590206994" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 228 chrome.exe 228 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 228 chrome.exe 228 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 228 wrote to memory of 5088 228 chrome.exe 40 PID 228 wrote to memory of 5088 228 chrome.exe 40 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 1952 228 chrome.exe 93 PID 228 wrote to memory of 2312 228 chrome.exe 92 PID 228 wrote to memory of 2312 228 chrome.exe 92 PID 228 wrote to memory of 804 228 chrome.exe 94 PID 228 wrote to memory of 804 228 chrome.exe 94 PID 228 wrote to memory of 804 228 chrome.exe 94 PID 228 wrote to memory of 804 228 chrome.exe 94 PID 228 wrote to memory of 804 228 chrome.exe 94 PID 228 wrote to memory of 804 228 chrome.exe 94 PID 228 wrote to memory of 804 228 chrome.exe 94 PID 228 wrote to memory of 804 228 chrome.exe 94 PID 228 wrote to memory of 804 228 chrome.exe 94 PID 228 wrote to memory of 804 228 chrome.exe 94 PID 228 wrote to memory of 804 228 chrome.exe 94 PID 228 wrote to memory of 804 228 chrome.exe 94 PID 228 wrote to memory of 804 228 chrome.exe 94 PID 228 wrote to memory of 804 228 chrome.exe 94 PID 228 wrote to memory of 804 228 chrome.exe 94 PID 228 wrote to memory of 804 228 chrome.exe 94 PID 228 wrote to memory of 804 228 chrome.exe 94 PID 228 wrote to memory of 804 228 chrome.exe 94 PID 228 wrote to memory of 804 228 chrome.exe 94 PID 228 wrote to memory of 804 228 chrome.exe 94 PID 228 wrote to memory of 804 228 chrome.exe 94 PID 228 wrote to memory of 804 228 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cloudflare-ipfs.com/ipfs/bafybeiedr4g3hgfusf3u5dtowlkuh6me5w6fp2pwayser54ctxyhopgxoa/#[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9aac89758,0x7ff9aac89768,0x7ff9aac897782⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2024 --field-trial-handle=1888,i,6086491674385800244,3911884421077399057,131072 /prefetch:82⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1888,i,6086491674385800244,3911884421077399057,131072 /prefetch:22⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1888,i,6086491674385800244,3911884421077399057,131072 /prefetch:82⤵PID:804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2928 --field-trial-handle=1888,i,6086491674385800244,3911884421077399057,131072 /prefetch:12⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2920 --field-trial-handle=1888,i,6086491674385800244,3911884421077399057,131072 /prefetch:12⤵PID:1600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 --field-trial-handle=1888,i,6086491674385800244,3911884421077399057,131072 /prefetch:82⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 --field-trial-handle=1888,i,6086491674385800244,3911884421077399057,131072 /prefetch:82⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD509b8afd6426d5cac32c36ea204589635
SHA19e87def026c66dfd929eac0436253f3887daf29c
SHA256f990026e42a2572252d8e22f38389eca6c01427f95fba688b64ec438d3f4d1b1
SHA5120e2e70204c61ade9b0a14262e758f51bb6a4aa1535dd70b9016982d395a986a75479a0f703f49f45d7dab52a1f5a3bebd9a02e89d5b12f7624f4fcb2def80172
-
Filesize
2KB
MD56e98f5dd09d1c600589ccfa39bbc60a4
SHA1df1d91b69cd3228c5cfdb236f9b46b35ffbb8ad5
SHA256a78de1974fc054451dea8f51f7dad5b81558c600f20d345c9d8f8f4b1b5004f0
SHA512901971f625d752b6f08194384922ee8060b58f2071d46cc2835675ade1ea6a8465901b3f14787780ef2fba2be3a550693776cdbdb79836cef3cae8c171f03e0b
-
Filesize
872B
MD5b2f795c4c1215139defdb788d8765d45
SHA1a5f5fd5af003adffb428a8e89577945539a27c0f
SHA2562d7b72462dcc965dd21658cde72d3855e00b84df33d8f87b301f45427d7861b9
SHA51293de0e72ea551152dc0ee8001ad378b586696bb8209c1dc7a0703f5fdcfb90ae9438a930ab81843bd7a671995d1e43ce3c9583bcf52a0fd98f2db6081f87769a
-
Filesize
6KB
MD5d5bb89a20a8419c6403057974ad11c29
SHA13306797a18c0153aeb1a39bab799d6303e5d9550
SHA25684731ba05a0b4a9cd95faac219a941c1d49f81b688939d3516a73ac0b97914fa
SHA5129ede7e8dfbfc32365155727c6e539cebac848d5fa2833c39b0225e3b4f92dac3ae0aad7c8f3512304b7f7aff441d7769e1686a90f82176a5b8c036d63573f7fa
-
Filesize
114KB
MD57f29587f46e33352744650b0899def90
SHA1a8b298594bcc591398ac28d605754b0135547371
SHA256f1f480af079056bd3d552f6252fba13bcd30aa6e0c2f4d760a3cf5c1d518816f
SHA5123c4009de0cffb1eefd71680cd380879991f64e21980490b40a01664e481b386813b2e4a34749243adfe8d638758e28960f573e47dfe67ca2c44e7e4e13b83afb
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd