Analysis
-
max time kernel
103s -
max time network
104s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
18/01/2024, 04:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://stark-industries.solutions
Resource
win10-20231215-en
General
-
Target
http://stark-industries.solutions
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133500242546629681" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 740 chrome.exe 740 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 740 chrome.exe 740 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe Token: SeShutdownPrivilege 740 chrome.exe Token: SeCreatePagefilePrivilege 740 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe 740 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 740 wrote to memory of 2656 740 chrome.exe 74 PID 740 wrote to memory of 2656 740 chrome.exe 74 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 1136 740 chrome.exe 77 PID 740 wrote to memory of 2824 740 chrome.exe 76 PID 740 wrote to memory of 2824 740 chrome.exe 76 PID 740 wrote to memory of 1596 740 chrome.exe 80 PID 740 wrote to memory of 1596 740 chrome.exe 80 PID 740 wrote to memory of 1596 740 chrome.exe 80 PID 740 wrote to memory of 1596 740 chrome.exe 80 PID 740 wrote to memory of 1596 740 chrome.exe 80 PID 740 wrote to memory of 1596 740 chrome.exe 80 PID 740 wrote to memory of 1596 740 chrome.exe 80 PID 740 wrote to memory of 1596 740 chrome.exe 80 PID 740 wrote to memory of 1596 740 chrome.exe 80 PID 740 wrote to memory of 1596 740 chrome.exe 80 PID 740 wrote to memory of 1596 740 chrome.exe 80 PID 740 wrote to memory of 1596 740 chrome.exe 80 PID 740 wrote to memory of 1596 740 chrome.exe 80 PID 740 wrote to memory of 1596 740 chrome.exe 80 PID 740 wrote to memory of 1596 740 chrome.exe 80 PID 740 wrote to memory of 1596 740 chrome.exe 80 PID 740 wrote to memory of 1596 740 chrome.exe 80 PID 740 wrote to memory of 1596 740 chrome.exe 80 PID 740 wrote to memory of 1596 740 chrome.exe 80 PID 740 wrote to memory of 1596 740 chrome.exe 80 PID 740 wrote to memory of 1596 740 chrome.exe 80 PID 740 wrote to memory of 1596 740 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://stark-industries.solutions1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fff5cf19758,0x7fff5cf19768,0x7fff5cf197782⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1812 --field-trial-handle=1764,i,17776099972462110064,9214982450613522226,131072 /prefetch:82⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1528 --field-trial-handle=1764,i,17776099972462110064,9214982450613522226,131072 /prefetch:22⤵PID:1136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2624 --field-trial-handle=1764,i,17776099972462110064,9214982450613522226,131072 /prefetch:12⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2616 --field-trial-handle=1764,i,17776099972462110064,9214982450613522226,131072 /prefetch:12⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2068 --field-trial-handle=1764,i,17776099972462110064,9214982450613522226,131072 /prefetch:82⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4172 --field-trial-handle=1764,i,17776099972462110064,9214982450613522226,131072 /prefetch:82⤵PID:1236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4136 --field-trial-handle=1764,i,17776099972462110064,9214982450613522226,131072 /prefetch:82⤵PID:3928
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD5ed213db3b2a40e64113c633b289b8f91
SHA1e369413caadc3424db6d0529cc7058f5c149e7ad
SHA256ed28b5c5bf1d0d698cbe164b26a699e8453db4c6e99f0960b9aa9c59c1a56482
SHA512ed9bac3bab79297544ac061334feab7860772621df3f6efbd0c5b0bdea7a3fb4c2a09702604b9f2ed4c2fe2585e2bcb71afef26078ba2ef6bd8aacb9de8caeca
-
Filesize
6KB
MD5802bd6d514895eaa220fbb0911610bea
SHA118e55ee2c9d4ff03caecca28079d6153f8c2d95b
SHA2566367545ef9138442950cef49575feaae16d3e1bb2fb22b9d1860edc3255149d4
SHA5122baea312874c1725dedb610e0e26319613e96416b930100a1d39684d7e49581b64c26ca1fc1dd39a65c572275ad41bb33bbfb0598772263624a3e1753ef52fab
-
Filesize
6KB
MD55d81a5b8346de2a0b04eea3b21b7de4e
SHA1e2d4dfe380dafcaa2a002b37820a3b93ddf315b8
SHA2568ceab8b61850b80a2ae4d005d88d88f8e04e746de3cff9e31cb60f128c192c96
SHA512408843f24a5ea0cbc2217acfc99a18a0c6ff8ddb62d167031d0c0aefb8f428c22de77160563695fd537671c8ef35132b627f748928e6c6fbfabdbd4a84c9219d
-
Filesize
6KB
MD55f373dbdfc88c88ab185429762f98efa
SHA185b2df0b3089bb90483ea97bb955b472dd4bb201
SHA2562a0dab8dc26818d2f40d2d50a7efabe9d9b8cba9f65420d6254bd70df9abf827
SHA51231d91d668d4643abfafaef94d7149f22096731873d4da90d3e62771d0a6eb0b46d8a4f270ec1e45ef0da02de29ea995b49c5da82295edaaf123ee0a1019457fe
-
Filesize
114KB
MD5361102c2ec01f269cb140920492f729e
SHA1de8dbb048c0a61b6d8f3518dd1a5db9f1b8c0118
SHA2561dcb91e693d5559ee4010a1e6a814d3af515e935e4db4919b083455139903ced
SHA5122f331e39d1ffd014f8a43efc46fba885c7c5813d332ac9396a883db81d43752f773b9ff2a7b07c088d770917274c24fc40f3be2b6599c8f53eb5d5c004b64f81
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd