Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-01-2024 01:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://myatosincomeseft.info
Resource
win11-20231215-en
Behavioral task
behavioral2
Sample
http://myatosincomeseft.info
Resource
android-33-x64-arm64-20231215-en
General
-
Target
http://myatosincomeseft.info
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133497575681682938" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4984 chrome.exe 4984 chrome.exe 3500 chrome.exe 3500 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe Token: SeShutdownPrivilege 4984 chrome.exe Token: SeCreatePagefilePrivilege 4984 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe 4984 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4984 wrote to memory of 5052 4984 chrome.exe 79 PID 4984 wrote to memory of 5052 4984 chrome.exe 79 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 768 4984 chrome.exe 82 PID 4984 wrote to memory of 1056 4984 chrome.exe 83 PID 4984 wrote to memory of 1056 4984 chrome.exe 83 PID 4984 wrote to memory of 3680 4984 chrome.exe 84 PID 4984 wrote to memory of 3680 4984 chrome.exe 84 PID 4984 wrote to memory of 3680 4984 chrome.exe 84 PID 4984 wrote to memory of 3680 4984 chrome.exe 84 PID 4984 wrote to memory of 3680 4984 chrome.exe 84 PID 4984 wrote to memory of 3680 4984 chrome.exe 84 PID 4984 wrote to memory of 3680 4984 chrome.exe 84 PID 4984 wrote to memory of 3680 4984 chrome.exe 84 PID 4984 wrote to memory of 3680 4984 chrome.exe 84 PID 4984 wrote to memory of 3680 4984 chrome.exe 84 PID 4984 wrote to memory of 3680 4984 chrome.exe 84 PID 4984 wrote to memory of 3680 4984 chrome.exe 84 PID 4984 wrote to memory of 3680 4984 chrome.exe 84 PID 4984 wrote to memory of 3680 4984 chrome.exe 84 PID 4984 wrote to memory of 3680 4984 chrome.exe 84 PID 4984 wrote to memory of 3680 4984 chrome.exe 84 PID 4984 wrote to memory of 3680 4984 chrome.exe 84 PID 4984 wrote to memory of 3680 4984 chrome.exe 84 PID 4984 wrote to memory of 3680 4984 chrome.exe 84 PID 4984 wrote to memory of 3680 4984 chrome.exe 84 PID 4984 wrote to memory of 3680 4984 chrome.exe 84 PID 4984 wrote to memory of 3680 4984 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://myatosincomeseft.info1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa27fe9758,0x7ffa27fe9768,0x7ffa27fe97782⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1768,i,12470790531420343298,7525059501773890940,131072 /prefetch:22⤵PID:768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1768,i,12470790531420343298,7525059501773890940,131072 /prefetch:82⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2184 --field-trial-handle=1768,i,12470790531420343298,7525059501773890940,131072 /prefetch:82⤵PID:3680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3084 --field-trial-handle=1768,i,12470790531420343298,7525059501773890940,131072 /prefetch:12⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2956 --field-trial-handle=1768,i,12470790531420343298,7525059501773890940,131072 /prefetch:12⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3964 --field-trial-handle=1768,i,12470790531420343298,7525059501773890940,131072 /prefetch:12⤵PID:3148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3088 --field-trial-handle=1768,i,12470790531420343298,7525059501773890940,131072 /prefetch:12⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4628 --field-trial-handle=1768,i,12470790531420343298,7525059501773890940,131072 /prefetch:82⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4012 --field-trial-handle=1768,i,12470790531420343298,7525059501773890940,131072 /prefetch:82⤵PID:1900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3648 --field-trial-handle=1768,i,12470790531420343298,7525059501773890940,131072 /prefetch:12⤵PID:776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2244 --field-trial-handle=1768,i,12470790531420343298,7525059501773890940,131072 /prefetch:12⤵PID:3780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4056 --field-trial-handle=1768,i,12470790531420343298,7525059501773890940,131072 /prefetch:12⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 --field-trial-handle=1768,i,12470790531420343298,7525059501773890940,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3500
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824B
MD5743a6eadbeefa1a89194b64cbc4577da
SHA18291b8e0c4b0a82a5b277747ebb01b69c2ffe438
SHA2564149b14da696bcec28859609a959df24765bd8cdcf86fd5466622fc0bd6cece0
SHA51221b48a2c7f58b8939705a8fce3ea9e85a93f6b74c060c1f3d02e13216fc6ff4e7d12267c2eb22f958eeb9e52a4e6c641614f3ba2385c7e67936669599234f5c6
-
Filesize
6KB
MD5466607cea3b64cb56f1a67304a040da7
SHA12a32323b12119d3f19baf0165ced43829a33c698
SHA25625068c347115726233d87a5915c13470f65bcd28d5dbbe3bc48ac993e26804d5
SHA512911a7c157e914b9bbc47883f69415a3d6eac61d3bd8c2dbae404e03b9faa44c5c2603fad724c92e54d208623b3c51583aec44f3260207e2f12cd4a0b15eee34b
-
Filesize
6KB
MD5363f3bc25824097fe6fb5e84e3bfad51
SHA135f7fb212de534a1f09a485b1389ce6e1d8675ad
SHA2561c47dacdaea7863015754d94eb2566eea8c37f2791f1bf036be7f04b6ebd3472
SHA5121e6617ffe145a08c9b1b64f779f3d0ae303c4cfa7ab9ac4e40ec1ddecc088d7c77445bb717fafc8fb78446316996fae13e7c33460fcfe02bb7055aa918229ccb
-
Filesize
114KB
MD5a38bae0f793f44342f7ba22d08bf9b7f
SHA1cb403ed0f8980237935e1e896a665803f243242a
SHA256a3ac10c1020bad8fbb69ea7bd5e0823b32b657980a15b61e0cf781b685ea371b
SHA5123d4f3a8df702fe58060e2874ea47ffd380718b52c5cd9743634c65c2fc54412a6bd08ae570a3f2bed679b0e1aff76cbac88bae7dadb57237f32c5d2c2e0880fe
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd