Analysis
-
max time kernel
1s -
max time network
25s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/01/2024, 21:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://yhgtrsds.nyc3.digitaloceanspaces.com/gedu/url130.html#cl/6916_md/3/492/4341/72/330313
Resource
win11-20231215-en
General
-
Target
https://yhgtrsds.nyc3.digitaloceanspaces.com/gedu/url130.html#cl/6916_md/3/492/4341/72/330313
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious use of FindShellTrayWindow 17 IoCs
pid Process 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe 4160 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4160 wrote to memory of 4176 4160 chrome.exe 79 PID 4160 wrote to memory of 4176 4160 chrome.exe 79 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 224 4160 chrome.exe 82 PID 4160 wrote to memory of 1648 4160 chrome.exe 83 PID 4160 wrote to memory of 1648 4160 chrome.exe 83 PID 4160 wrote to memory of 1900 4160 chrome.exe 84 PID 4160 wrote to memory of 1900 4160 chrome.exe 84 PID 4160 wrote to memory of 1900 4160 chrome.exe 84 PID 4160 wrote to memory of 1900 4160 chrome.exe 84 PID 4160 wrote to memory of 1900 4160 chrome.exe 84 PID 4160 wrote to memory of 1900 4160 chrome.exe 84 PID 4160 wrote to memory of 1900 4160 chrome.exe 84 PID 4160 wrote to memory of 1900 4160 chrome.exe 84 PID 4160 wrote to memory of 1900 4160 chrome.exe 84 PID 4160 wrote to memory of 1900 4160 chrome.exe 84 PID 4160 wrote to memory of 1900 4160 chrome.exe 84 PID 4160 wrote to memory of 1900 4160 chrome.exe 84 PID 4160 wrote to memory of 1900 4160 chrome.exe 84 PID 4160 wrote to memory of 1900 4160 chrome.exe 84 PID 4160 wrote to memory of 1900 4160 chrome.exe 84 PID 4160 wrote to memory of 1900 4160 chrome.exe 84 PID 4160 wrote to memory of 1900 4160 chrome.exe 84 PID 4160 wrote to memory of 1900 4160 chrome.exe 84 PID 4160 wrote to memory of 1900 4160 chrome.exe 84 PID 4160 wrote to memory of 1900 4160 chrome.exe 84 PID 4160 wrote to memory of 1900 4160 chrome.exe 84 PID 4160 wrote to memory of 1900 4160 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://yhgtrsds.nyc3.digitaloceanspaces.com/gedu/url130.html#cl/6916_md/3/492/4341/72/3303131⤵
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffae9049758,0x7ffae9049768,0x7ffae90497782⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1804,i,6453170113187195331,16869544493382395892,131072 /prefetch:22⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=1804,i,6453170113187195331,16869544493382395892,131072 /prefetch:82⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2168 --field-trial-handle=1804,i,6453170113187195331,16869544493382395892,131072 /prefetch:82⤵PID:1900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3040 --field-trial-handle=1804,i,6453170113187195331,16869544493382395892,131072 /prefetch:12⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2984 --field-trial-handle=1804,i,6453170113187195331,16869544493382395892,131072 /prefetch:12⤵PID:5160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4452 --field-trial-handle=1804,i,6453170113187195331,16869544493382395892,131072 /prefetch:12⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4780 --field-trial-handle=1804,i,6453170113187195331,16869544493382395892,131072 /prefetch:12⤵PID:3876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4608 --field-trial-handle=1804,i,6453170113187195331,16869544493382395892,131072 /prefetch:12⤵PID:5804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3152 --field-trial-handle=1804,i,6453170113187195331,16869544493382395892,131072 /prefetch:82⤵PID:808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 --field-trial-handle=1804,i,6453170113187195331,16869544493382395892,131072 /prefetch:82⤵PID:5152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5404 --field-trial-handle=1804,i,6453170113187195331,16869544493382395892,131072 /prefetch:12⤵PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5476 --field-trial-handle=1804,i,6453170113187195331,16869544493382395892,131072 /prefetch:12⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5eecaae3f7f132a79020b9c2bac929f34
SHA180843323a2121836f3c5b19b1488b1af601c3e53
SHA256cec9bdeaa248616f001f97e8b4b738721e29c02b4dde24cdfa375714e1f4479b
SHA512c2a631704d7e0f96e0e7a1f320f5373a3a316cbb597188e5494a20ff9ce7d4660cae413d11c0346ef075644f2925bb9fe80b042a9c49efd89e5fd1b9d560e072
-
Filesize
7KB
MD5daf80ec135ea1ecb0af0dd9931533bb2
SHA1c77153e8bc3c7d68693e3c9ba273d9a91bfb60aa
SHA25668349726628100b296f836d0e4816584d94eaf8fb770e5d6c08ce8fe93182d66
SHA5125b9f8476e58c602a4ba188f87bb2e9a85c4087e8e9a5d1cc645d7db4e66e5556b9de46a3e1aa460cf8fb44707a77fb1a87fbd9ce3d08613cbb939155b7bc166d
-
Filesize
114KB
MD55d8ffb5f84e1daa1baa4fa72c112d87b
SHA1cab81661c368f1023f35140e89ab4584a6b8c00d
SHA25697fc604895531a680d3955e669dcf0ab6f27b7483a97118e10185dcbe36244fd
SHA512596bdee743339956d2b9a2de29e38535ad4086a83b8c9dd615c71397ada7bd45471b9672d3c816d43a06181e77764f8fb72949760e976a93bd167019d6db5881
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd