Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 14:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cm-cgm.com:443
Resource
win10v2004-20231215-en
General
-
Target
https://cm-cgm.com:443
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133500629295159636" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3508 chrome.exe 3508 chrome.exe 3276 chrome.exe 3276 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3508 wrote to memory of 4424 3508 chrome.exe 60 PID 3508 wrote to memory of 4424 3508 chrome.exe 60 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 1016 3508 chrome.exe 88 PID 3508 wrote to memory of 3640 3508 chrome.exe 89 PID 3508 wrote to memory of 3640 3508 chrome.exe 89 PID 3508 wrote to memory of 4112 3508 chrome.exe 90 PID 3508 wrote to memory of 4112 3508 chrome.exe 90 PID 3508 wrote to memory of 4112 3508 chrome.exe 90 PID 3508 wrote to memory of 4112 3508 chrome.exe 90 PID 3508 wrote to memory of 4112 3508 chrome.exe 90 PID 3508 wrote to memory of 4112 3508 chrome.exe 90 PID 3508 wrote to memory of 4112 3508 chrome.exe 90 PID 3508 wrote to memory of 4112 3508 chrome.exe 90 PID 3508 wrote to memory of 4112 3508 chrome.exe 90 PID 3508 wrote to memory of 4112 3508 chrome.exe 90 PID 3508 wrote to memory of 4112 3508 chrome.exe 90 PID 3508 wrote to memory of 4112 3508 chrome.exe 90 PID 3508 wrote to memory of 4112 3508 chrome.exe 90 PID 3508 wrote to memory of 4112 3508 chrome.exe 90 PID 3508 wrote to memory of 4112 3508 chrome.exe 90 PID 3508 wrote to memory of 4112 3508 chrome.exe 90 PID 3508 wrote to memory of 4112 3508 chrome.exe 90 PID 3508 wrote to memory of 4112 3508 chrome.exe 90 PID 3508 wrote to memory of 4112 3508 chrome.exe 90 PID 3508 wrote to memory of 4112 3508 chrome.exe 90 PID 3508 wrote to memory of 4112 3508 chrome.exe 90 PID 3508 wrote to memory of 4112 3508 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cm-cgm.com:4431⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9940c9758,0x7ff9940c9768,0x7ff9940c97782⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=312 --field-trial-handle=1860,i,993224476272289009,2280656241531027255,131072 /prefetch:22⤵PID:1016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1860,i,993224476272289009,2280656241531027255,131072 /prefetch:82⤵PID:3640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1860,i,993224476272289009,2280656241531027255,131072 /prefetch:82⤵PID:4112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2928 --field-trial-handle=1860,i,993224476272289009,2280656241531027255,131072 /prefetch:12⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2920 --field-trial-handle=1860,i,993224476272289009,2280656241531027255,131072 /prefetch:12⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4772 --field-trial-handle=1860,i,993224476272289009,2280656241531027255,131072 /prefetch:82⤵PID:3196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4896 --field-trial-handle=1860,i,993224476272289009,2280656241531027255,131072 /prefetch:82⤵PID:4948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3668 --field-trial-handle=1860,i,993224476272289009,2280656241531027255,131072 /prefetch:12⤵PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3916 --field-trial-handle=1860,i,993224476272289009,2280656241531027255,131072 /prefetch:12⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3716 --field-trial-handle=1860,i,993224476272289009,2280656241531027255,131072 /prefetch:12⤵PID:2520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3432 --field-trial-handle=1860,i,993224476272289009,2280656241531027255,131072 /prefetch:12⤵PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1604 --field-trial-handle=1860,i,993224476272289009,2280656241531027255,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2640 --field-trial-handle=1860,i,993224476272289009,2280656241531027255,131072 /prefetch:12⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824B
MD5592a08000961500721e47794b26e9915
SHA1bf491bffef27ec20e95576bf03795a581b073e26
SHA256db797a76fbad9d834a2ca3976275cf9f40fa8f60075e70c8e8f2ecd064b0e3dc
SHA512afa5506ae2f40ac023d2577b225250debf6b3f6484dc2aee0a022a840e4aacacff8f2dead24bcb9dd235d728c819f2c6bf5e64943a709d34ababfa9c408480a9
-
Filesize
6KB
MD5654470628a64b9b42fdfe159e8a455e7
SHA163d2a7d92583bbefd407b5f055aa4777f042da41
SHA2564a8aff1e15457221f9b5b5db5f51c31992e4791c210b97e617180c4ab0a970f6
SHA512973dc10340900ac377cd5c2e96724af9a45e9ad9be199f26ac1854606008ed7d1c84cba6d19818b4d74440afb03c3a6bcf16e2e941ac8007d9f370d8aa05b981
-
Filesize
6KB
MD520196f6dffbeae1383fe938ca27cb460
SHA1b6092855fed62042530fcdedc4ea5a961733eced
SHA256b1a8ba4daf641264e333001044dd64d10954734427ba2c586dcfd1bb14ee6f7d
SHA5127084b305ef5831813bfbc7fa27cb596d162a328373e09cff5b864388ce61bf828d0bfecb100238a18b1190fa0adccf79fb33e1c62daf0675723275b0388ca23a
-
Filesize
114KB
MD542cdbbd41d99cc531e9852e6fd8a170e
SHA1dfb4a6820f678f243aa4a49739c967df501c1db2
SHA25691d71376e89366198fa52e9aa115b7dc6093a2577baf4b407de301aa841729fd
SHA512466bfa6e78596b50e77f399caf29d0c6c95118e20364af5369109d9e6ca3cb19e8390d9b5491474600b06462b043c3ce0b097c00812bf67b91719ae383333295
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd