Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 22:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://lepudy.com
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://lepudy.com
Resource
win10v2004-20231215-en
General
-
Target
http://lepudy.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133513013656114957" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1368 chrome.exe 1368 chrome.exe 4132 chrome.exe 4132 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1368 wrote to memory of 4868 1368 chrome.exe 84 PID 1368 wrote to memory of 4868 1368 chrome.exe 84 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 632 1368 chrome.exe 86 PID 1368 wrote to memory of 3824 1368 chrome.exe 88 PID 1368 wrote to memory of 3824 1368 chrome.exe 88 PID 1368 wrote to memory of 1700 1368 chrome.exe 87 PID 1368 wrote to memory of 1700 1368 chrome.exe 87 PID 1368 wrote to memory of 1700 1368 chrome.exe 87 PID 1368 wrote to memory of 1700 1368 chrome.exe 87 PID 1368 wrote to memory of 1700 1368 chrome.exe 87 PID 1368 wrote to memory of 1700 1368 chrome.exe 87 PID 1368 wrote to memory of 1700 1368 chrome.exe 87 PID 1368 wrote to memory of 1700 1368 chrome.exe 87 PID 1368 wrote to memory of 1700 1368 chrome.exe 87 PID 1368 wrote to memory of 1700 1368 chrome.exe 87 PID 1368 wrote to memory of 1700 1368 chrome.exe 87 PID 1368 wrote to memory of 1700 1368 chrome.exe 87 PID 1368 wrote to memory of 1700 1368 chrome.exe 87 PID 1368 wrote to memory of 1700 1368 chrome.exe 87 PID 1368 wrote to memory of 1700 1368 chrome.exe 87 PID 1368 wrote to memory of 1700 1368 chrome.exe 87 PID 1368 wrote to memory of 1700 1368 chrome.exe 87 PID 1368 wrote to memory of 1700 1368 chrome.exe 87 PID 1368 wrote to memory of 1700 1368 chrome.exe 87 PID 1368 wrote to memory of 1700 1368 chrome.exe 87 PID 1368 wrote to memory of 1700 1368 chrome.exe 87 PID 1368 wrote to memory of 1700 1368 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://lepudy.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa5f829758,0x7ffa5f829768,0x7ffa5f8297782⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1616 --field-trial-handle=1852,i,71896687837691440,2151912583489442241,131072 /prefetch:22⤵PID:632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2168 --field-trial-handle=1852,i,71896687837691440,2151912583489442241,131072 /prefetch:82⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1852,i,71896687837691440,2151912583489442241,131072 /prefetch:82⤵PID:3824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2864 --field-trial-handle=1852,i,71896687837691440,2151912583489442241,131072 /prefetch:12⤵PID:460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2872 --field-trial-handle=1852,i,71896687837691440,2151912583489442241,131072 /prefetch:12⤵PID:1936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4684 --field-trial-handle=1852,i,71896687837691440,2151912583489442241,131072 /prefetch:12⤵PID:4692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3920 --field-trial-handle=1852,i,71896687837691440,2151912583489442241,131072 /prefetch:12⤵PID:4408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 --field-trial-handle=1852,i,71896687837691440,2151912583489442241,131072 /prefetch:82⤵PID:1820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3696 --field-trial-handle=1852,i,71896687837691440,2151912583489442241,131072 /prefetch:82⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4908 --field-trial-handle=1852,i,71896687837691440,2151912583489442241,131072 /prefetch:12⤵PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3208 --field-trial-handle=1852,i,71896687837691440,2151912583489442241,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4132
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408B
MD56f626be69db268deb0e2b861bb3c6ca6
SHA16bad0727b3ca4227342c5beafb1cdf2f61975135
SHA256ebaace44acfa35a238a0b1bba351578f36a5abfcf4083f286e7fef0d1e306a13
SHA5122862377af9b4427df813b87898691f8d92386ed9a27ff4b14d9b780fcf90e89671bf1d256f47d91664d31b70a5c1cfcfa6652fe0077b71f7443e6a17b2e6493a
-
Filesize
360B
MD55a00350c09509bd55676db5c344c1091
SHA1105bf50cf8053f9cdf30eb60bbb271190fb45727
SHA25657730f30b346451702e2fed2db38b861fadafdf84d9614be37c77b413dd7fbd2
SHA512cfabaf5477ca4f6d4cfb1a13af5541f83ffb921113137106709e6b34209314bf77e4ebb48a810fbff2e4807b8f452de3edba3d8a3e979af7e31981e6972b6e1a
-
Filesize
1KB
MD5e240f108fec07a0a32a6608bc73d0b49
SHA1f031bf2f021f75ce51e0fe9e4eaeca38bb9cde55
SHA256d0d601bbf46fe446d9a26803f9b1b55c6f712d605cfa67348380631f49069fcf
SHA512877df7782a749f048848ae1a2bfe49eb0c8592dab8c2a6b4ce6e14200bac277c2c9d7024f3f2af4de0d19815d196797b3d768ac34f1e65860c6e28b50a799320
-
Filesize
2KB
MD5640e4008b76c2054e8aa44eec941853c
SHA1a26d39e746388c96d6133ac17b46e76b453f00c6
SHA256b3c17534f001de202aaec40bf07bcef968ea4bb490a690f5826bf4dc8844a900
SHA5123b774957c62298842d58d4ab692606671bad74bd66ae8294d4bd353b38ba6372ae6eb5b486e6b87a529c1a9c709859c45a5d4faa92c1a7cda490857a9073ce1d
-
Filesize
1KB
MD5d04d8d5f1b6ef5978d0d35bd535d0a5c
SHA160b75ea4c5b0e335d0bc596d6623580ed82d5aa1
SHA256609c8e916b158719e44e5cd0de47f51ba951862d47655130433c811c42e82d39
SHA51208a687aaa8d3426f92a6c585c429187ecee4194a8cb733c9fdae65351b6686c6511f3e27c6be91fee4956f8b602aa5422b604e630f17d57e65edb137c367ed3a
-
Filesize
1KB
MD5034cb63d21630134cbfe46d1c8e34a93
SHA1c7b54129548d9f4ba75f1982a053b32a282831d8
SHA2565e6cbc3423ab71608635514e668e06a5c1b2b43079e037960e9b5f67c81ac737
SHA512c786ff9fa3368dae0c2d1ac7b123bf31b92d98ab154479c5c8a4c10f2c602c6281ba803cf8f4725502b212546373fe5eb46361e9961523a8be4c13d6d537991d
-
Filesize
6KB
MD5b923c5e3c2f429ac4911e4362a81cfee
SHA1ebfc5d31ac8812a7035ba7a28016af751acae4f7
SHA256642035449b9d49dd4112a7bc02dc2af47805ce1f0e53edc8b94bdaa9d8824991
SHA512e46021c1c6af41134c23938851db3f3a31201dc729a65b01cd5c1973859574c8d6c5a9ee5ecce372150cbc4c2bdb1005c3b3c2b7ad86a953357b9bceda11117f
-
Filesize
6KB
MD50e984f558297fbdffb0ba2cfe5ff3040
SHA1296babd02d83a7d44f3bfb54d099673211014f5d
SHA2565c3aaf587b423cce9715df4de2b6c2f1e198f575b7abc388bef00defb408c111
SHA5124bf7075f08755fdc5f38dc8eb047289078d01dce34ad55ac971eb89c5b0122854a41a37ff2b13a9a479f50240d1f70942dad07e2b0513f786f4afbc0115ea6f8
-
Filesize
114KB
MD5d4d1886dc6374cfaa7b2211d94b3870e
SHA1ac2cd0531a063b77f72188acd2583a5917bedaab
SHA2563cb2dbbe144b4e3ebe28dd8b84a209704c00a97520e98b418bd043ba11a659e3
SHA512339aef6bd30b817acc3b79c58f64169c2f1e22b26e96f923ede624f3957d4f55b4f8378106305097a4bea3bde232d3c95085e3e1dffe804d648ab5bc416de3eb
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd