Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
17/01/2024, 21:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://7257.chengbu.shop
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://7257.chengbu.shop
Resource
win10v2004-20231222-en
General
-
Target
https://7257.chengbu.shop
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133499999497062199" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3320 chrome.exe 3320 chrome.exe 2176 chrome.exe 2176 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3320 wrote to memory of 2320 3320 chrome.exe 44 PID 3320 wrote to memory of 2320 3320 chrome.exe 44 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 1320 3320 chrome.exe 91 PID 3320 wrote to memory of 3700 3320 chrome.exe 93 PID 3320 wrote to memory of 3700 3320 chrome.exe 93 PID 3320 wrote to memory of 3688 3320 chrome.exe 92 PID 3320 wrote to memory of 3688 3320 chrome.exe 92 PID 3320 wrote to memory of 3688 3320 chrome.exe 92 PID 3320 wrote to memory of 3688 3320 chrome.exe 92 PID 3320 wrote to memory of 3688 3320 chrome.exe 92 PID 3320 wrote to memory of 3688 3320 chrome.exe 92 PID 3320 wrote to memory of 3688 3320 chrome.exe 92 PID 3320 wrote to memory of 3688 3320 chrome.exe 92 PID 3320 wrote to memory of 3688 3320 chrome.exe 92 PID 3320 wrote to memory of 3688 3320 chrome.exe 92 PID 3320 wrote to memory of 3688 3320 chrome.exe 92 PID 3320 wrote to memory of 3688 3320 chrome.exe 92 PID 3320 wrote to memory of 3688 3320 chrome.exe 92 PID 3320 wrote to memory of 3688 3320 chrome.exe 92 PID 3320 wrote to memory of 3688 3320 chrome.exe 92 PID 3320 wrote to memory of 3688 3320 chrome.exe 92 PID 3320 wrote to memory of 3688 3320 chrome.exe 92 PID 3320 wrote to memory of 3688 3320 chrome.exe 92 PID 3320 wrote to memory of 3688 3320 chrome.exe 92 PID 3320 wrote to memory of 3688 3320 chrome.exe 92 PID 3320 wrote to memory of 3688 3320 chrome.exe 92 PID 3320 wrote to memory of 3688 3320 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://7257.chengbu.shop1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd2f959758,0x7ffd2f959768,0x7ffd2f9597782⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1884,i,11388294798079556902,6784421392820092518,131072 /prefetch:22⤵PID:1320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1884,i,11388294798079556902,6784421392820092518,131072 /prefetch:82⤵PID:3688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1884,i,11388294798079556902,6784421392820092518,131072 /prefetch:82⤵PID:3700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3012 --field-trial-handle=1884,i,11388294798079556902,6784421392820092518,131072 /prefetch:12⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3020 --field-trial-handle=1884,i,11388294798079556902,6784421392820092518,131072 /prefetch:12⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 --field-trial-handle=1884,i,11388294798079556902,6784421392820092518,131072 /prefetch:82⤵PID:4076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4704 --field-trial-handle=1884,i,11388294798079556902,6784421392820092518,131072 /prefetch:82⤵PID:748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4716 --field-trial-handle=1884,i,11388294798079556902,6784421392820092518,131072 /prefetch:12⤵PID:3388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3924 --field-trial-handle=1884,i,11388294798079556902,6784421392820092518,131072 /prefetch:12⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3688 --field-trial-handle=1884,i,11388294798079556902,6784421392820092518,131072 /prefetch:12⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=212 --field-trial-handle=1884,i,11388294798079556902,6784421392820092518,131072 /prefetch:12⤵PID:620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5040 --field-trial-handle=1884,i,11388294798079556902,6784421392820092518,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2176
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ef26de070b99ecb0bae565da36c06976
SHA1356307a6a7d5ec80eb7185d8368c47c1e0e1c339
SHA256ee780cb0313fb01ab5083108303f57f0da686e9e274486238292c605a80acd4a
SHA512efd51cda6ef509b9ba8c9bfd5ccb02b858607c5b19a4e26c94c6b13a8a7490f7a73c9bb8e1afd5956527191bd6f01465e47945fcf2ebe67360911f634aa86431
-
Filesize
6KB
MD5109f84146dd4febda170d45fb13a9e16
SHA1c7f2fdbde5631d6230153483e3beb1ab5b56c7e6
SHA256ffc189a2334572d1b607f5ddb9e41eaf15793595bc6c05378557206c3c6c33f7
SHA5120b98d3868119b331e93206fe50eb24b3ba42bf470be91706507ef971b3b7010d2afb7f9f5813fd620c9be31c3717dad121664fd38f370fad4afd08ec6e7ace4a
-
Filesize
6KB
MD5d29b2e6fc3d411510c83cd9d78f1c7d3
SHA11a5bfb4a7621332348998c72bf2646de5be5c4f0
SHA2563de8369e4bfb4ceaec976b27ccb4190575529978dabe88c1800932e94a10cd1b
SHA51241d7f2ddc311394599a2f1a9349e679297f0324f026c723877ad4a3c96bab83c0c9fa78646f8850a2d08851bfc8fceade669f833b16c862220bb182db955abb0
-
Filesize
114KB
MD507537cf1b0a45edaeb47ec99aca7038b
SHA19e9942fc6f896223befde6eded1f54cdedc5d86b
SHA256a90142ad3cb90deee3f8ada38328405307da5469c7737b866c0bd025613368c2
SHA5124cb9b90888100d66e67c1ee38e0c55ce112080dae7cb499cf0b5db5d69555d5e3f5db2a40df706d8737a1dc52390e5abcc66b0b10d4e3fc390b2ea65c9e08bb8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd