Analysis
-
max time kernel
599s -
max time network
598s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
23-01-2024 12:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://stickingrepute.com/wdiwppatc?nkeo=24&refer=https%3A%2F%2Fa5
Resource
win10-20231215-en
General
-
Target
http://stickingrepute.com/wdiwppatc?nkeo=24&refer=https%3A%2F%2Fa5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133504880979560397" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 308 chrome.exe 308 chrome.exe 812 chrome.exe 812 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 308 chrome.exe 308 chrome.exe 308 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeCreatePagefilePrivilege 308 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 308 wrote to memory of 2820 308 chrome.exe 74 PID 308 wrote to memory of 2820 308 chrome.exe 74 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 4688 308 chrome.exe 77 PID 308 wrote to memory of 2328 308 chrome.exe 76 PID 308 wrote to memory of 2328 308 chrome.exe 76 PID 308 wrote to memory of 3576 308 chrome.exe 78 PID 308 wrote to memory of 3576 308 chrome.exe 78 PID 308 wrote to memory of 3576 308 chrome.exe 78 PID 308 wrote to memory of 3576 308 chrome.exe 78 PID 308 wrote to memory of 3576 308 chrome.exe 78 PID 308 wrote to memory of 3576 308 chrome.exe 78 PID 308 wrote to memory of 3576 308 chrome.exe 78 PID 308 wrote to memory of 3576 308 chrome.exe 78 PID 308 wrote to memory of 3576 308 chrome.exe 78 PID 308 wrote to memory of 3576 308 chrome.exe 78 PID 308 wrote to memory of 3576 308 chrome.exe 78 PID 308 wrote to memory of 3576 308 chrome.exe 78 PID 308 wrote to memory of 3576 308 chrome.exe 78 PID 308 wrote to memory of 3576 308 chrome.exe 78 PID 308 wrote to memory of 3576 308 chrome.exe 78 PID 308 wrote to memory of 3576 308 chrome.exe 78 PID 308 wrote to memory of 3576 308 chrome.exe 78 PID 308 wrote to memory of 3576 308 chrome.exe 78 PID 308 wrote to memory of 3576 308 chrome.exe 78 PID 308 wrote to memory of 3576 308 chrome.exe 78 PID 308 wrote to memory of 3576 308 chrome.exe 78 PID 308 wrote to memory of 3576 308 chrome.exe 78
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://stickingrepute.com/wdiwppatc?nkeo=24&refer=https%3A%2F%2Fa51⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fff1a189758,0x7fff1a189768,0x7fff1a1897782⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1836 --field-trial-handle=1776,i,16453262171002757937,6971892354575722357,131072 /prefetch:82⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1576 --field-trial-handle=1776,i,16453262171002757937,6971892354575722357,131072 /prefetch:22⤵PID:4688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2056 --field-trial-handle=1776,i,16453262171002757937,6971892354575722357,131072 /prefetch:82⤵PID:3576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2596 --field-trial-handle=1776,i,16453262171002757937,6971892354575722357,131072 /prefetch:12⤵PID:4428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2588 --field-trial-handle=1776,i,16453262171002757937,6971892354575722357,131072 /prefetch:12⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3860 --field-trial-handle=1776,i,16453262171002757937,6971892354575722357,131072 /prefetch:12⤵PID:3456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4108 --field-trial-handle=1776,i,16453262171002757937,6971892354575722357,131072 /prefetch:82⤵PID:1164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4184 --field-trial-handle=1776,i,16453262171002757937,6971892354575722357,131072 /prefetch:82⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 --field-trial-handle=1776,i,16453262171002757937,6971892354575722357,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:812
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD571b780eda3145887dcb7338c02e77238
SHA194a4b5966d6650aee577987bec86803109adfa9a
SHA2562dbed0e567ffe80c5c3399dc7de8eeec2a0e317bd6c90d8209b28d8bc641f6b1
SHA5124886046217c9f08b45c1c4c429f37cab978b523ca7b9e57115ff2bb4f01427b04f4fbc4fdfba697c39284781a472f2a07fbdd158d4daa2ff378dbd1c0e679791
-
Filesize
5KB
MD5e2e5256158bfacb639a0dc25e67ca772
SHA1c337e801383f5c58a0d82256bc765cbd383a04e8
SHA256ba97707c5df0e594333f05e0bde30af34f9e39bee42e40a76a9ffccbfb6f89ff
SHA51215baf23c816104ee700292dafd23ced8be7c120595284f8046d32c5b1f2f8697ea526bac7cc0ade380e3dbdb898faa2a68da37208f6e57e324ceefa89c904d43
-
Filesize
5KB
MD5434beba38cb8c826681b56b0fee78931
SHA17e40c9289326e2901a4dbc7f4265f239966ab08c
SHA2566384593798f86383408e7833b2eb325b4cc2d6d37cd66232b07d5ba30be7058f
SHA512bf282424e19d586391614c59ffdb29de4db318dad4b2f63ccd249e67c9f26943f4f058a05faa856228e75a3b14febb2b24b92b97ce209f39a6007ce768360d3f
-
Filesize
114KB
MD5e34de5adc1843928bf9eba0597336278
SHA182ae354ea6fa2ff3e72a170ad763b09f3f83de88
SHA25641f08962fb54d23dc281deaa3d28c0dd3eeb98c851aa2852e7cfacb46cf2da1b
SHA512f943202f8b1f548cd77e2a2e5fce71a691ba993f06a7a79c50f243425c3b0274b0e56182f6f3a345cb1656cc07147b284f5d066a89a358b5812967b7ad46ff76
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd