Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2024 21:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://crazylovemeet.life/?u=4kawkwf&o=8zep4zh&m=1&t=obr&cid=11
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://crazylovemeet.life/?u=4kawkwf&o=8zep4zh&m=1&t=obr&cid=11
Resource
win10v2004-20231222-en
General
-
Target
https://crazylovemeet.life/?u=4kawkwf&o=8zep4zh&m=1&t=obr&cid=11
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133500874518331663" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 4932 chrome.exe 4932 chrome.exe 3376 chrome.exe 3376 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 4932 chrome.exe 4932 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe Token: SeShutdownPrivilege 4932 chrome.exe Token: SeCreatePagefilePrivilege 4932 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4932 wrote to memory of 2488 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2488 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 2348 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 1980 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 1980 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 4576 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 4576 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 4576 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 4576 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 4576 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 4576 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 4576 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 4576 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 4576 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 4576 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 4576 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 4576 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 4576 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 4576 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 4576 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 4576 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 4576 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 4576 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 4576 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 4576 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 4576 4932 chrome.exe chrome.exe PID 4932 wrote to memory of 4576 4932 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://crazylovemeet.life/?u=4kawkwf&o=8zep4zh&m=1&t=obr&cid=111⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9ea2b9758,0x7ff9ea2b9768,0x7ff9ea2b97782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1884,i,9125584385928531845,11750190701409753343,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1884,i,9125584385928531845,11750190701409753343,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1884,i,9125584385928531845,11750190701409753343,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3112 --field-trial-handle=1884,i,9125584385928531845,11750190701409753343,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3104 --field-trial-handle=1884,i,9125584385928531845,11750190701409753343,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 --field-trial-handle=1884,i,9125584385928531845,11750190701409753343,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 --field-trial-handle=1884,i,9125584385928531845,11750190701409753343,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3756 --field-trial-handle=1884,i,9125584385928531845,11750190701409753343,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
168B
MD53b522e9841795591baf54890664fd60f
SHA1eebd46ff38b7832504887736284d6944782c9202
SHA256d3960f219c2e807c5c2360bc872c58e76a8591baaeca3510daeadead0280d99a
SHA5122b630d95c8c393293867f7fbbd7eb52cb892602206a4dd6ede9018cda91cc9fe078d3fc4a3634b3d30155e1b086d36df19cc160bf5db8be3985edf0c9c1c744f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD5306b0bed3165b4baca8e8e53223ad057
SHA1f999a17c081fb037efb346836e5fd4f813533a42
SHA256471052b9dcf99850306e40de47d5514278a2710ab9bfc8edb891697f57118729
SHA5127b18c3c0e5141718fd27b3f5c7f4966e2bac3402e864a0bb54bf083a94e170c2d43b012102e30422a3f5a70211b0abe670d530bd82135b0ca6bfaaca1a2a178a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
538B
MD5daa13e3847a55b4c3c9537560151b3f0
SHA17f9bb244683e229cd287ec770b4a6326cafe5b87
SHA2564b72eeca55cd77feeb154e79b46653209727b81843a9c6410f59d7f53a2eac02
SHA512bdc05d42ebf51d99d5b8ccb51069ccedb06fc3d765a05048daa9ebfcfb9cd194e15d70a0c85925f2288178fd9c0ece519854e54a6ab4b518c0bd9975bc05e10d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD52114413b5e0f4682ada0b32a08a68360
SHA15f02f4dbd8ad1936ee34ff09f56b958ead9e54b9
SHA256e728af5c22feff4df63ce3e0f7a7ec5f57a7359893c67d923cf8e2885e471742
SHA51284631125e05aeb81eddcb909fb7a3c1c348be5a38c9bbe9b2375b7edce10b477bf34c6cf0941cc4a683562c1d0c741e1a2cd3a01bb88dbe656de37a5df89554f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
114KB
MD53f51d124cce4796b874348449002fd27
SHA16810583b905e51e9ff85f8254e129ff801001431
SHA256d47973111e0a8219d54d859c2353ac6a3e6a62d1d169936aaf90a444c068a248
SHA512b77d56938cd5edc34c978ef02bb120427af33511db083f2bbca8fe35b952cc174ee118a364399590719d007577535faf5e52791b694570663959e6fde857e67b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_4932_GYIQVMLFRARBRZIWMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e