Analysis
-
max time kernel
599s -
max time network
485s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2024 13:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ru6r4inkaf4thlgflg4iqs5mhqwqubols5qagspvya4whp3dgbvmyhad.tor2web.re
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://ru6r4inkaf4thlgflg4iqs5mhqwqubols5qagspvya4whp3dgbvmyhad.tor2web.re
Resource
win10v2004-20231215-en
General
-
Target
http://ru6r4inkaf4thlgflg4iqs5mhqwqubols5qagspvya4whp3dgbvmyhad.tor2web.re
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133505754577109000" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1920 chrome.exe 1920 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1320 chrome.exe 1320 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1320 wrote to memory of 860 1320 chrome.exe 79 PID 1320 wrote to memory of 860 1320 chrome.exe 79 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1404 1320 chrome.exe 91 PID 1320 wrote to memory of 1380 1320 chrome.exe 90 PID 1320 wrote to memory of 1380 1320 chrome.exe 90 PID 1320 wrote to memory of 4592 1320 chrome.exe 89 PID 1320 wrote to memory of 4592 1320 chrome.exe 89 PID 1320 wrote to memory of 4592 1320 chrome.exe 89 PID 1320 wrote to memory of 4592 1320 chrome.exe 89 PID 1320 wrote to memory of 4592 1320 chrome.exe 89 PID 1320 wrote to memory of 4592 1320 chrome.exe 89 PID 1320 wrote to memory of 4592 1320 chrome.exe 89 PID 1320 wrote to memory of 4592 1320 chrome.exe 89 PID 1320 wrote to memory of 4592 1320 chrome.exe 89 PID 1320 wrote to memory of 4592 1320 chrome.exe 89 PID 1320 wrote to memory of 4592 1320 chrome.exe 89 PID 1320 wrote to memory of 4592 1320 chrome.exe 89 PID 1320 wrote to memory of 4592 1320 chrome.exe 89 PID 1320 wrote to memory of 4592 1320 chrome.exe 89 PID 1320 wrote to memory of 4592 1320 chrome.exe 89 PID 1320 wrote to memory of 4592 1320 chrome.exe 89 PID 1320 wrote to memory of 4592 1320 chrome.exe 89 PID 1320 wrote to memory of 4592 1320 chrome.exe 89 PID 1320 wrote to memory of 4592 1320 chrome.exe 89 PID 1320 wrote to memory of 4592 1320 chrome.exe 89 PID 1320 wrote to memory of 4592 1320 chrome.exe 89 PID 1320 wrote to memory of 4592 1320 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://ru6r4inkaf4thlgflg4iqs5mhqwqubols5qagspvya4whp3dgbvmyhad.tor2web.re1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedbea9758,0x7ffedbea9768,0x7ffedbea97782⤵PID:860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 --field-trial-handle=1584,i,7672525091412287116,298620241488809352,131072 /prefetch:82⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 --field-trial-handle=1584,i,7672525091412287116,298620241488809352,131072 /prefetch:82⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1584,i,7672525091412287116,298620241488809352,131072 /prefetch:22⤵PID:1404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1584,i,7672525091412287116,298620241488809352,131072 /prefetch:12⤵PID:3244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1584,i,7672525091412287116,298620241488809352,131072 /prefetch:12⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=1584,i,7672525091412287116,298620241488809352,131072 /prefetch:82⤵PID:2508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 --field-trial-handle=1584,i,7672525091412287116,298620241488809352,131072 /prefetch:82⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 --field-trial-handle=1584,i,7672525091412287116,298620241488809352,131072 /prefetch:82⤵PID:3968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 --field-trial-handle=1584,i,7672525091412287116,298620241488809352,131072 /prefetch:82⤵PID:3264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4724 --field-trial-handle=1584,i,7672525091412287116,298620241488809352,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1920
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
823B
MD5b562af96faf5fbae73338cdc18a1f69e
SHA18b190bd4fce58ca7d1294c8f12c677b1125e252f
SHA25635fb3e42243df2bd8d4b390b0d6c30d357e399665958e20b4694823211911097
SHA5126c89b153fbaef9e8461ec7247b560d0a24485fb7952a3c779b852dfca239db83faa00aa92af81239ea8a707f935753de71942761560b9f6ffd324860c7bc0e8b
-
Filesize
6KB
MD54510a24b4e6f7b7ee0198b988e425775
SHA1ffa5aac0dc65dd4fda32fb74c2278dfb3de1a3c7
SHA2560e3085df51ea4c28d36d1ed8e49930215f8a290df6df4404da78569f9d605e6f
SHA5127e4788c5ae89cc2efdd16cd50f66ab9b40e052a6349cafddc8c1cba6b3d83b90d8116e089826cfc731a4dc856b9b01d865317f101e5584ad3378ba191e031565
-
Filesize
139KB
MD50a31e7bcadf2373959617f4782f14281
SHA1f6b0fb2fcf1478100dde545376f691d2944b78fb
SHA2564848b1a1e4ce98bb1b808b590fd2bef38c95e37d271b278e1895c24b7dae5a0e
SHA512439307156d2906b3289573c12b7b424540c87c5be9ae013564d8b94962590be2bd6656c9573b7172fdbc79c66d8ddf1f34504ae65f267a32ea0aadd7ed2eb1ae
-
Filesize
115KB
MD552f7e4b4fd77f0095b518cc99266359f
SHA1cf41ec0f1252bb85de695929917fbe20a8700074
SHA256fd9ae8d3efed482651f34cbad5fb32ca2557cc64802d7a4bb81d7fdccf8fa174
SHA512abafaf7aca0074686c1b0fc6ff3d6e9316f8ff0ffb4a2ea2b1a39ffb9b978f75a02a10295c465213dcad1604fc792f5fc17534d3bd389f6459be4cd52aeb88c7
-
Filesize
115KB
MD527901223f5a094bd4f146c4e893ef72c
SHA1e3d7fdd1f6931c0d79ab930ebd9136751fe02ee0
SHA2569268cc2e1871d01e6316d89a436a0215850f9fd99dcc5a8e266e43d171715ee1
SHA51225c49d6173501fc29e1b54353ca59db194d5e0a2d1d7078802b0a8d98a927d247b05291bcf7b908ce25afe603845609595de32f9126953b239dcb13499ed6d9a
-
Filesize
116KB
MD57e6a7eb6f68216783c07559967f12135
SHA1715d94595c1d3527934b9564b59932f0fd17fa64
SHA256dbfff64c7212644734e988bd58c9fea6a96ff73d2458f2f0587f7c22c462d4ff
SHA5121d4efce28c63af75b8b067edc75a8b142762e725ee6b2b16451500149768968dbc0ee331d90be119b138fb192fc5d990e52d46376eb097ddd7a7889c5c848634
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd