Analysis
-
max time kernel
301s -
max time network
307s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2024 21:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://thegivingmachine.co.uk
Resource
win10v2004-20231215-en
General
-
Target
http://thegivingmachine.co.uk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133499992536048157" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3400 chrome.exe 3400 chrome.exe 836 chrome.exe 836 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3400 wrote to memory of 1940 3400 chrome.exe 86 PID 3400 wrote to memory of 1940 3400 chrome.exe 86 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 2880 3400 chrome.exe 89 PID 3400 wrote to memory of 4424 3400 chrome.exe 90 PID 3400 wrote to memory of 4424 3400 chrome.exe 90 PID 3400 wrote to memory of 1552 3400 chrome.exe 91 PID 3400 wrote to memory of 1552 3400 chrome.exe 91 PID 3400 wrote to memory of 1552 3400 chrome.exe 91 PID 3400 wrote to memory of 1552 3400 chrome.exe 91 PID 3400 wrote to memory of 1552 3400 chrome.exe 91 PID 3400 wrote to memory of 1552 3400 chrome.exe 91 PID 3400 wrote to memory of 1552 3400 chrome.exe 91 PID 3400 wrote to memory of 1552 3400 chrome.exe 91 PID 3400 wrote to memory of 1552 3400 chrome.exe 91 PID 3400 wrote to memory of 1552 3400 chrome.exe 91 PID 3400 wrote to memory of 1552 3400 chrome.exe 91 PID 3400 wrote to memory of 1552 3400 chrome.exe 91 PID 3400 wrote to memory of 1552 3400 chrome.exe 91 PID 3400 wrote to memory of 1552 3400 chrome.exe 91 PID 3400 wrote to memory of 1552 3400 chrome.exe 91 PID 3400 wrote to memory of 1552 3400 chrome.exe 91 PID 3400 wrote to memory of 1552 3400 chrome.exe 91 PID 3400 wrote to memory of 1552 3400 chrome.exe 91 PID 3400 wrote to memory of 1552 3400 chrome.exe 91 PID 3400 wrote to memory of 1552 3400 chrome.exe 91 PID 3400 wrote to memory of 1552 3400 chrome.exe 91 PID 3400 wrote to memory of 1552 3400 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://thegivingmachine.co.uk1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbf7749758,0x7ffbf7749768,0x7ffbf77497782⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1912,i,7866428448189005971,17812900358572147672,131072 /prefetch:22⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1912,i,7866428448189005971,17812900358572147672,131072 /prefetch:82⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1832 --field-trial-handle=1912,i,7866428448189005971,17812900358572147672,131072 /prefetch:82⤵PID:1552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2956 --field-trial-handle=1912,i,7866428448189005971,17812900358572147672,131072 /prefetch:12⤵PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1912,i,7866428448189005971,17812900358572147672,131072 /prefetch:12⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 --field-trial-handle=1912,i,7866428448189005971,17812900358572147672,131072 /prefetch:82⤵PID:4076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5228 --field-trial-handle=1912,i,7866428448189005971,17812900358572147672,131072 /prefetch:12⤵PID:3640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 --field-trial-handle=1912,i,7866428448189005971,17812900358572147672,131072 /prefetch:82⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4860 --field-trial-handle=1912,i,7866428448189005971,17812900358572147672,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:836
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD51e78c989568e23b0f1c28ec19d96381a
SHA1ae12a88d4d1e494668ff1a827d6682e7d8312f2b
SHA256f555a8bfe4c125de10a65dcc9a6934f71cd1f349668f34426c755594539843ba
SHA5123df616649f3165ae18977573f884797a3da4fc25633608fdd7a68c28bfc47e5a8120fe200f35fcd1c5a8cd251186b6757b1bfa74a99376cb12da51a793a4bc44
-
Filesize
1KB
MD50e4d866d3b4f9427cd8e27fa8b48c10f
SHA189d57f2da3b26032a71624a34ee5e298f11138ce
SHA2560bb418f384cde85633bb3a2b3e4a0139ffd30dcab76d02c652169ec66b6312c1
SHA5122b765d81e07a5e4ffce98863c6dbcdac821dc4d813c1a345b86e5e28158f149de2fb9ac1ba75e43816057ab18ed10ce22eeac979c3b3beea568c02a7c35aaed5
-
Filesize
1KB
MD54df83739caeb401efc9e29792478b85e
SHA1f9de61332d3e4b96ee7d75a56ac1efbb13c71564
SHA2562962fd889bfe153fb6aefd92de1539b28a38db1615cb192c6dd2f1dd4ea25db2
SHA512ff164ea5adf27a6a7f950cd64af357fe3298a0f2f9878608ef7a2e2d7178cd2e86978a0a74ef179a51d20e4735d2b3272dcaaad01a2353f8bb6482205fa37aab
-
Filesize
1KB
MD5c98c65edf93107522145fdbc52627609
SHA13cb36be74259accb25f482c50a95c9d3b1f12526
SHA256b5dc16470cd379ef8de0c40fed766988d372f31d4527e2e54bc24ca7681aead2
SHA51212ab8cac1b83d1806f2c323e96cdeee9bb3f35d480664161da4741d81c33b78ae356f8c66290c39bfe56506db831ae42c9a3641d5758873ae78fa6f4a18592b4
-
Filesize
1KB
MD5ea131b24d537d4bc3a790f8d81285c9a
SHA1f391387f927e59cbe489cbe153ffef2396098185
SHA25685906924a4aa6b36318e8c5bee7b74aab95b668e2bb31cb6d4888875680ea4d6
SHA5120d5310a0ace5ac1c2382edb8855244d1c58b5cb0e75efeb30c23b368528cf52b31e83490f7b375524cfd2bb160b264bf9452c78d2c17b4bc285615e7476d774b
-
Filesize
1KB
MD5a598fffbae74ba7fbcc5d6878ea25e40
SHA107a278aac48cba7d9e7608f5a0f7836130ca593a
SHA25636e3460f340dcb46dc7111f6007db1630a277596e04e176fc865fe1b339e78d3
SHA5128816807fb4b48ba780d8d0167a2d7d0ad1d2ea87c32b0ec34146a1dc095654fc83aaebfa2f1dff1490e43b1e28865d196b3ad0559a03781350b388c4e915f949
-
Filesize
6KB
MD512d374c6c80cb1aae8c8c2f731f5c96c
SHA146a230219a376bc2afb88e32337aff59f9cdd41e
SHA2560bd117ccb84960e49e9d6ace1a72e0b27721c936e157a7316e9dbfc131f1b54d
SHA512cb9ed8b8301c19d1d4ab9654289972008660844a9803c3f97ef7419690ecb2bbb4e03860ae92148509a54d0d2e95501948b818dc296b75d362a60543afda0b9a
-
Filesize
6KB
MD523a9cc055ef540af5608994a7b45bf5b
SHA1285be0650d189fcd659092bbbd7da66c468ddcfc
SHA256ae7cd4708a5117380da0105f2c626bd93297c28c16e8b6faf417a3d7857c18b5
SHA51282a9786a362e356224ddcc3c9c0454ae8e7dba58f374e2306cf3a2566073f49179856c12d35ebdde66ecfca863f36f092115e1ffca7d7986b4a7a865f997af86
-
Filesize
6KB
MD54f11a8ff7371b76b697b6fd9fa6329e3
SHA1d745562b437a1debc581ee0e03d8e84a3a4fe632
SHA25650f6120fcb57b896f347fb3d1fbc87f7ee3bf47a2fa6b9ac080191af040a3665
SHA5120404c2bc703ababb2638abcf63ac6d9008fc300d1dda8035b6014701fd59addaf98953567f5fffda29122ff7c5d9edfd4d70277b11dfb9ab4254b2511dc2ddd6
-
Filesize
5KB
MD569c588b8e35392ef65777580aed69696
SHA1801626b15db4e818119b5389dcd30c27b088599b
SHA256b9d8acf91709da4256bbbcf7d524270794bd5e6b8528c65edafff7ca3f8daa4b
SHA512599dce9ef8d77a9ac01022281f05eac690a05b228fb619a9ef930efe2d3f5eb3dc8b2a240dda71bfa579a02f0e4e0ba85ce8b440c2397437373660ef18aa0bf0
-
Filesize
114KB
MD5ca66590864352de1d814e51c7fa85dd3
SHA15be94b1ff2e596862a43f478704588f7a83766c8
SHA2563cb0914dff71480b717afc44a58c5edbbbf6336ed021289f5dcc34c75be0e033
SHA51252b405d51747bc7c59d12ed1d1ec67bb34146cf6dac44ecf76a44c8646e6e42d5c32b8585afd8baca827a73d115d4656cc90f94706d44d74fb6b2d6a409f2d2d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd