Analysis
-
max time kernel
1805s -
max time network
1697s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2024 15:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/NotReal96/Malware/blob/master/Windows%20XP%20Horror%20Edition.md
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://github.com/NotReal96/Malware/blob/master/Windows%20XP%20Horror%20Edition.md
Resource
win10v2004-20231215-en
General
-
Target
https://github.com/NotReal96/Malware/blob/master/Windows%20XP%20Horror%20Edition.md
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133513625600498078" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4588 chrome.exe 4588 chrome.exe 1524 chrome.exe 1524 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4588 chrome.exe 4588 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4588 wrote to memory of 4620 4588 chrome.exe 84 PID 4588 wrote to memory of 4620 4588 chrome.exe 84 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1548 4588 chrome.exe 86 PID 4588 wrote to memory of 1928 4588 chrome.exe 88 PID 4588 wrote to memory of 1928 4588 chrome.exe 88 PID 4588 wrote to memory of 3676 4588 chrome.exe 87 PID 4588 wrote to memory of 3676 4588 chrome.exe 87 PID 4588 wrote to memory of 3676 4588 chrome.exe 87 PID 4588 wrote to memory of 3676 4588 chrome.exe 87 PID 4588 wrote to memory of 3676 4588 chrome.exe 87 PID 4588 wrote to memory of 3676 4588 chrome.exe 87 PID 4588 wrote to memory of 3676 4588 chrome.exe 87 PID 4588 wrote to memory of 3676 4588 chrome.exe 87 PID 4588 wrote to memory of 3676 4588 chrome.exe 87 PID 4588 wrote to memory of 3676 4588 chrome.exe 87 PID 4588 wrote to memory of 3676 4588 chrome.exe 87 PID 4588 wrote to memory of 3676 4588 chrome.exe 87 PID 4588 wrote to memory of 3676 4588 chrome.exe 87 PID 4588 wrote to memory of 3676 4588 chrome.exe 87 PID 4588 wrote to memory of 3676 4588 chrome.exe 87 PID 4588 wrote to memory of 3676 4588 chrome.exe 87 PID 4588 wrote to memory of 3676 4588 chrome.exe 87 PID 4588 wrote to memory of 3676 4588 chrome.exe 87 PID 4588 wrote to memory of 3676 4588 chrome.exe 87 PID 4588 wrote to memory of 3676 4588 chrome.exe 87 PID 4588 wrote to memory of 3676 4588 chrome.exe 87 PID 4588 wrote to memory of 3676 4588 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/NotReal96/Malware/blob/master/Windows%20XP%20Horror%20Edition.md1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbac7c9758,0x7ffbac7c9768,0x7ffbac7c97782⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1676 --field-trial-handle=1908,i,15648107537051609585,1807266464550500924,131072 /prefetch:22⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1908,i,15648107537051609585,1807266464550500924,131072 /prefetch:82⤵PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1908,i,15648107537051609585,1807266464550500924,131072 /prefetch:82⤵PID:1928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3060 --field-trial-handle=1908,i,15648107537051609585,1807266464550500924,131072 /prefetch:12⤵PID:4160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1908,i,15648107537051609585,1807266464550500924,131072 /prefetch:12⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4888 --field-trial-handle=1908,i,15648107537051609585,1807266464550500924,131072 /prefetch:82⤵PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 --field-trial-handle=1908,i,15648107537051609585,1807266464550500924,131072 /prefetch:82⤵PID:1116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2800 --field-trial-handle=1908,i,15648107537051609585,1807266464550500924,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1524
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d0130cc1722391563350f7f3cdfe6cb9
SHA195e8ca7cd62e0db1cfbbfa76d4d44a164c1c8f33
SHA256036d4550dbe65d90788abfc63c943846dcf6b786bdcba84ef1267f676d1b6e99
SHA5120821da55bf5ad6252b386cb340b34a40ae545d0892a39183578fb780008694760adb6c3a8719f99edff261e2f7d2d39c7999e3750b72e55d9e72804f06f4d9cf
-
Filesize
1KB
MD5a74cc2c21f88d2232242c63beb791aa6
SHA14f521b4efea2d0c673d6d91c4533d0474ffcf542
SHA256b8cf658fdb94df253993885576d21f6aabc9a732bd417e62b5bcb8c6bd56c275
SHA51219c6a9eadd832f94f2d5596faf0a5703309e6d69081b5333b917d5772c3f1bdeff41d5fd070517b580109b85ef29dc4d8a8768a17355692f91ba32828b8f839c
-
Filesize
1KB
MD584054b904a4b9d6fa81c160be91c71c3
SHA19cfcef700fd60b1ff7469a90b1343c7d7e97889d
SHA256d5378e02611a7fda01e69c4692f434e05eebe3ef3ecee63573a5c1f002e9331d
SHA5122f2760b7ddb9fe5ee5dbfca289b8f09572379e6e9df8150ddb8ff37d578efc871e15aa5ef90c7fb41df7d4735ee4251f73e8929e1b0928a07c0ffdea7946c0eb
-
Filesize
6KB
MD5c797f91d971f76e46306113467085259
SHA1645f41b9bb4fbdc4e9134a55e362956129a6d205
SHA256f82241c53402554f48ff1a40ee3a35829b25da343c65ce829ee2b4ba250bb181
SHA512953302fd544101f00c392548848568c1aa594e0650dffb447caaa2ee814f279c26105c3bfefd1ce76c05ef118c46ef45ba61fa42848693d8a40f3f0764234796
-
Filesize
114KB
MD58ec6a458a03528aa7b26128796c60f9b
SHA1fd5e21be7c7fd5aec2fd18259b8cd839ab8cf42f
SHA256a7a8e21aa25d8e3ecc97219cfd3b17e87742bb450317030bce952d6720c8fa70
SHA5125d7640407f6476eee62ccf4c882166806eea785408bd90272cccc5403325ed133819d79e450ae9379577720c1ed7db7014c61560266068ceb3b39c6ac173a445
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd