Analysis
-
max time kernel
1799s -
max time network
1685s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
04-02-2024 16:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://isexychat.com
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
http://isexychat.com
Resource
win11-20231215-en
General
-
Target
http://isexychat.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133515399650351847" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3848 chrome.exe 3848 chrome.exe 2144 chrome.exe 2144 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe Token: SeShutdownPrivilege 3848 chrome.exe Token: SeCreatePagefilePrivilege 3848 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe 3848 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3848 wrote to memory of 3348 3848 chrome.exe 76 PID 3848 wrote to memory of 3348 3848 chrome.exe 76 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 3748 3848 chrome.exe 78 PID 3848 wrote to memory of 488 3848 chrome.exe 82 PID 3848 wrote to memory of 488 3848 chrome.exe 82 PID 3848 wrote to memory of 3516 3848 chrome.exe 79 PID 3848 wrote to memory of 3516 3848 chrome.exe 79 PID 3848 wrote to memory of 3516 3848 chrome.exe 79 PID 3848 wrote to memory of 3516 3848 chrome.exe 79 PID 3848 wrote to memory of 3516 3848 chrome.exe 79 PID 3848 wrote to memory of 3516 3848 chrome.exe 79 PID 3848 wrote to memory of 3516 3848 chrome.exe 79 PID 3848 wrote to memory of 3516 3848 chrome.exe 79 PID 3848 wrote to memory of 3516 3848 chrome.exe 79 PID 3848 wrote to memory of 3516 3848 chrome.exe 79 PID 3848 wrote to memory of 3516 3848 chrome.exe 79 PID 3848 wrote to memory of 3516 3848 chrome.exe 79 PID 3848 wrote to memory of 3516 3848 chrome.exe 79 PID 3848 wrote to memory of 3516 3848 chrome.exe 79 PID 3848 wrote to memory of 3516 3848 chrome.exe 79 PID 3848 wrote to memory of 3516 3848 chrome.exe 79 PID 3848 wrote to memory of 3516 3848 chrome.exe 79 PID 3848 wrote to memory of 3516 3848 chrome.exe 79 PID 3848 wrote to memory of 3516 3848 chrome.exe 79 PID 3848 wrote to memory of 3516 3848 chrome.exe 79 PID 3848 wrote to memory of 3516 3848 chrome.exe 79 PID 3848 wrote to memory of 3516 3848 chrome.exe 79
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://isexychat.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xe0,0x10c,0x7ffe3e6e9758,0x7ffe3e6e9768,0x7ffe3e6e97782⤵PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1584 --field-trial-handle=1824,i,2903450859815558069,9195978880401296233,131072 /prefetch:22⤵PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2140 --field-trial-handle=1824,i,2903450859815558069,9195978880401296233,131072 /prefetch:82⤵PID:3516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2852 --field-trial-handle=1824,i,2903450859815558069,9195978880401296233,131072 /prefetch:12⤵PID:4032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2844 --field-trial-handle=1824,i,2903450859815558069,9195978880401296233,131072 /prefetch:12⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=1824,i,2903450859815558069,9195978880401296233,131072 /prefetch:82⤵PID:488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4532 --field-trial-handle=1824,i,2903450859815558069,9195978880401296233,131072 /prefetch:12⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4956 --field-trial-handle=1824,i,2903450859815558069,9195978880401296233,131072 /prefetch:12⤵PID:704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3304 --field-trial-handle=1824,i,2903450859815558069,9195978880401296233,131072 /prefetch:12⤵PID:1272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 --field-trial-handle=1824,i,2903450859815558069,9195978880401296233,131072 /prefetch:82⤵PID:1652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 --field-trial-handle=1824,i,2903450859815558069,9195978880401296233,131072 /prefetch:82⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4584 --field-trial-handle=1824,i,2903450859815558069,9195978880401296233,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2144
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD52379e5bb7e5767e4dc671c575a75907f
SHA116c10b20c7e1a635258bb577917b23cb41787d21
SHA2567cf75e944f337bd0ef4cee35b65c9130e7fa4d82a7b4d9587dae3e07c4c53a59
SHA51200c11d7813ff13921949697d0178efb730817d6901ce845eafce8e99362001bc0660978f293a6c25de243a294b5e021f3afaa8d94d385984623e9783f859d7f2
-
Filesize
2KB
MD56634a5368fd9a28d5541016473455967
SHA1cca683b75c64829df4c5b35ce4bc72fc89b1fbd1
SHA256c706333938f01af496aad77d0d69f62fbcb6a40f98589ad3a4437f3f09142b91
SHA51237448343ed95fe4f2d4c9dc20a168ec8972f3095651179f0494eca0c0fa6fd8cb9dd5dd840020ff1ffc8cb6b7afd6cd4066dc22788aecd413c754b6edb7e5b59
-
Filesize
3KB
MD51eca1efe3bc2f5774be1d714865ada88
SHA1184ba3b7b717142e21744a44cf01d36f7968f06e
SHA25692811e73004e6463434e04a876ca0de8a3ea1efb814be16e050dcdf973a5fe22
SHA512673d50dd1b8f377a1f2444cb75c00c7def6ae081b54ac22f8ec49063d161934e9ccfea119c3b7d9bb665119d3db0886fdbe081103f41f5193576cedfc86409f3
-
Filesize
3KB
MD549b9f57ac277263201f2563ee279393b
SHA1a0857746cd099f038ced5a1db925d75a8c6e3f2d
SHA256381b060a2963bff2a1541920bae01b155f0050e585e80d39eca8c73aee45d9d4
SHA51238fec9f194d77d9ec85b78702403bab4745c312700beb59d2559a007d0088c888151aff47e31f11d1babe294d98da240ae60d22dd7053559c61dc8b5d53da5d2
-
Filesize
3KB
MD5565226a1c7fad0a9a534aefb3c2123a7
SHA12f845a5d508705787b3bc0ed6bad10c31141cd0e
SHA256470fcf7f4667acfe43010baa43be913242c705fb1682666088fcd86933bd9e9c
SHA512b5ed27dd30ee883ad02e3b2365575fa0045a2b6dbd901b871bb72348487060e7e89285c906a5d25e305b9153bf90ec7438a854e24539441d8292df732897d081
-
Filesize
872B
MD516007f1623152b6232b2975357d5c5ee
SHA10e1a887681ad908ecfd529f4cc44b38f664dc3db
SHA25654019552709c6c3ca4e04c94c611f181fc8a5c039f976b889ae4c3b2be3631d9
SHA5127dc1903a436b1ed8be4eb22a1e12690ed2e703828c81b0e3eaabe04573e8ccb55d8261899b228b2a9b3e11887c880eeb01b84c6556867cd1000f32164115bd1c
-
Filesize
6KB
MD5898bcddb5598f52c0b1b938b3581ecc1
SHA1852753927a62ec935e3caa3ff84186de7b5f2d77
SHA2562a2d0fd27041f15aa0da4b5f736c9989d1df5830483c855cc9e7d645bf7ef88a
SHA51251f5df07a12f4918d204ebff7c4e3ef31e7a7b0393c99523802837349bc6539c63a38bbcd32a02f606e8cbc47ce242837c8e09260af03d74b454a13144cac9cd
-
Filesize
6KB
MD57b6fa07393228de497e3866ed564c78b
SHA1834982596f3456c31e3b8ffd00b4147f2a86b3d1
SHA25642d27b60158fabe5a8493e92b2108f544693a2f1f2b0765ee609be314d38385f
SHA51214002abc27cca2127afb150eac22c628fa26dddf8f983cbce810c41c63e8edbba4d38a57230dafeed6a3a2525817795a44971e01a61feb4e200a68e54dc1f088
-
Filesize
6KB
MD5b4b807e4481c2a6685fefe09a6055d94
SHA1c4db173324a095b08f1b63e900c1618668c5932d
SHA2567793c523868ad7ab0db8b47c631b033a8bd652527d9b8efceeff96249cebca7b
SHA512a56e7fa49add5f049014bb75d89fb7d55783d64bab759b3998c49fd1722efed8da9c50837b531baf5831458fecc5300f35515229703df23ccdba1935a0494af0
-
Filesize
114KB
MD571d73f11b3e19d4dfb5d79ea8b7c93a9
SHA1150acddab4bd85fddecfbcb368ccdd7fa756a1fa
SHA25676069ccd7fcf9b8ec812ccb5a283a2ce0a50cfeb0b95ff12928eaea914f5ddea
SHA51217082dba6fc5a3a842966b95076f62b45b6ad085f724f94310352b48c07393ca34818c269c1d3feaf3bd908b49d5be328f05ea9495e5bb480153fb89bed39cff
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd