Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 15:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://204.79.197.203
Resource
win7-20231215-en
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133506720095391740" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 3560 chrome.exe 3560 chrome.exe 5084 chrome.exe 5084 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3560 wrote to memory of 4176 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4176 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4140 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4376 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 4376 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 824 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 824 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 824 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 824 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 824 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 824 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 824 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 824 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 824 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 824 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 824 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 824 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 824 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 824 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 824 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 824 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 824 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 824 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 824 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 824 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 824 3560 chrome.exe chrome.exe PID 3560 wrote to memory of 824 3560 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://204.79.197.2031⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff42a69758,0x7fff42a69768,0x7fff42a697782⤵PID:4176
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1848,i,7741409011996414069,5892676270919038028,131072 /prefetch:22⤵PID:4140
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1848,i,7741409011996414069,5892676270919038028,131072 /prefetch:82⤵PID:4376
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1848,i,7741409011996414069,5892676270919038028,131072 /prefetch:82⤵PID:824
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2884 --field-trial-handle=1848,i,7741409011996414069,5892676270919038028,131072 /prefetch:12⤵PID:3872
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2864 --field-trial-handle=1848,i,7741409011996414069,5892676270919038028,131072 /prefetch:12⤵PID:4036
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4460 --field-trial-handle=1848,i,7741409011996414069,5892676270919038028,131072 /prefetch:12⤵PID:3316
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 --field-trial-handle=1848,i,7741409011996414069,5892676270919038028,131072 /prefetch:82⤵PID:2952
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3052 --field-trial-handle=1848,i,7741409011996414069,5892676270919038028,131072 /prefetch:82⤵PID:3420
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2936 --field-trial-handle=1848,i,7741409011996414069,5892676270919038028,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5084
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
824B
MD575957b623a781a6bfdeee154153654f9
SHA160c131244735e649c0c983c9878a8446ac008d85
SHA256611acfbe40ec24432bc8c15f07fd8a977891d54a117e3c529597860ec70b52ab
SHA51237f04a050e776b3b5c6e7928572b3fc0668d0d60e1d765647c1cf7d3463ec1411aeaf4508575fe39ceeab1782d59e74f1254a657b06de9ab72cdc103dbced5c0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD56261319f74c4c7a694e1b3076c56ff5f
SHA174387b2080ce09ab0bf2507ca8ec996ca877afad
SHA2567f82ca374e978d3bc14e560b6416f3c58accbab6988e0fb08c82d103ff2300cb
SHA512be4d578a8d646fdcaf0161e249e10cc831e9c49cee66b77e8f5b6ba36639d521f0567e53dcfe9a92c1c4e8972e58b094340ed6a77f33c194ef251aa4dfb6d065
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD551de714323ada4b4e017840322f3b9d2
SHA1321714083a455f776d0f87afc47673904fe25d43
SHA2569ddfb7fcae06c941f5e338b843af27925ded6b238fe0a39ca9c496a2773d097c
SHA512f1bbdf244a4091eee256e366f7c9939b58f756c75f6e2f5d7fc4b8fab874e7d2dc0d301f396b794120bf1ea0d1ce21b19366001a2583e6645bbd73e439776ba4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
114KB
MD5a527e1654ddd906e2dd0afa9bf09b852
SHA17c0b0936e19247b6a54a575617608faef9abb580
SHA256e176aa7f99ae011ca39924fcaf776f83973675a3ef5b0e13afa00132de3e3530
SHA5122b6e3a2f507c401e632cbe8b3d93d0fe8a6a3abf08dd09008f5342184f48aaa250bda3e7d93d51662b6a8dbf52b84a918c5a47416b103279883cc03e031886ff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_3560_VNCPVFYUIXFUSUJGMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e