Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/02/2024, 23:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://13.36.85.141
Resource
win10v2004-20231215-en
General
-
Target
http://13.36.85.141
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 10 IoCs
flow ioc 61 camo.githubusercontent.com 62 camo.githubusercontent.com 65 raw.githubusercontent.com 57 camo.githubusercontent.com 58 raw.githubusercontent.com 59 camo.githubusercontent.com 60 camo.githubusercontent.com 63 camo.githubusercontent.com 64 camo.githubusercontent.com 66 raw.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133521687113261909" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1884 chrome.exe 1884 chrome.exe 1048 chrome.exe 1048 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1884 wrote to memory of 3136 1884 chrome.exe 83 PID 1884 wrote to memory of 3136 1884 chrome.exe 83 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 1400 1884 chrome.exe 85 PID 1884 wrote to memory of 3840 1884 chrome.exe 86 PID 1884 wrote to memory of 3840 1884 chrome.exe 86 PID 1884 wrote to memory of 4496 1884 chrome.exe 87 PID 1884 wrote to memory of 4496 1884 chrome.exe 87 PID 1884 wrote to memory of 4496 1884 chrome.exe 87 PID 1884 wrote to memory of 4496 1884 chrome.exe 87 PID 1884 wrote to memory of 4496 1884 chrome.exe 87 PID 1884 wrote to memory of 4496 1884 chrome.exe 87 PID 1884 wrote to memory of 4496 1884 chrome.exe 87 PID 1884 wrote to memory of 4496 1884 chrome.exe 87 PID 1884 wrote to memory of 4496 1884 chrome.exe 87 PID 1884 wrote to memory of 4496 1884 chrome.exe 87 PID 1884 wrote to memory of 4496 1884 chrome.exe 87 PID 1884 wrote to memory of 4496 1884 chrome.exe 87 PID 1884 wrote to memory of 4496 1884 chrome.exe 87 PID 1884 wrote to memory of 4496 1884 chrome.exe 87 PID 1884 wrote to memory of 4496 1884 chrome.exe 87 PID 1884 wrote to memory of 4496 1884 chrome.exe 87 PID 1884 wrote to memory of 4496 1884 chrome.exe 87 PID 1884 wrote to memory of 4496 1884 chrome.exe 87 PID 1884 wrote to memory of 4496 1884 chrome.exe 87 PID 1884 wrote to memory of 4496 1884 chrome.exe 87 PID 1884 wrote to memory of 4496 1884 chrome.exe 87 PID 1884 wrote to memory of 4496 1884 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://13.36.85.1411⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7ffd5b119758,0x7ffd5b119768,0x7ffd5b1197782⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1864,i,11675831298796510456,11382891652115472750,131072 /prefetch:22⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1864,i,11675831298796510456,11382891652115472750,131072 /prefetch:82⤵PID:3840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1864,i,11675831298796510456,11382891652115472750,131072 /prefetch:82⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=1864,i,11675831298796510456,11382891652115472750,131072 /prefetch:12⤵PID:912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=1864,i,11675831298796510456,11382891652115472750,131072 /prefetch:12⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 --field-trial-handle=1864,i,11675831298796510456,11382891652115472750,131072 /prefetch:82⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1864,i,11675831298796510456,11382891652115472750,131072 /prefetch:82⤵PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5076 --field-trial-handle=1864,i,11675831298796510456,11382891652115472750,131072 /prefetch:12⤵PID:1556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2388 --field-trial-handle=1864,i,11675831298796510456,11382891652115472750,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1048
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD551d1ebb7c8ecd813368942835e732c68
SHA1d3a60e8ec061957075affd4aa803464635e32f5e
SHA25624db093aba34f22fd0082a785039ac4f5dfaba3e75c36c752c6a775ab3d3be36
SHA512e7a635bb97da63afe90cf366ea9d550c2affd0de7fc2f985674e2b671dcc7b05af67816344917c62b04995535d45664392f5470cda524af13e151e2715789bd5
-
Filesize
1KB
MD5cbca391f82d397408dc2ab4d6baa23e4
SHA15b2fdc2811e6faf5aa5b3f4437308a2d42d5aa0c
SHA2562ccf5f234c00987163844057ea3600d8cbca0a60c9ef5ad4fdd9b0235d34eea7
SHA512e1c0fd8a1f98bb717640767257ad75a4325c4e842ee7b4fab00a4500a88abd088624f0f37db561bd5341c4072c65217c61c6d32b83a90e8e944de8195a8e41bb
-
Filesize
1KB
MD5a4bbd675f0e687ae9107b5d704ba16fb
SHA196d83e77e87b690ae6f4f74f0bc5460f3453c463
SHA2563d6ca0dda0cfdc4ec252cbd3e839cdd0e06a1dfed647bd84b6b9496d216bad97
SHA512cb7eef41d27b72f629a94fbfb97498f8e785500d24fdaf0f852b22362ebb070ad448278a3c6c7fe6f0eae1e8897d2ac1463df1d8a62b3713e651a475cdcec118
-
Filesize
1KB
MD5338ce15f9b1a9ad5d9d6c101da1fffb4
SHA1c926eed1380cd983f014378020df28a524bc0664
SHA2561ff19e86b41bf2dfb8f7d6d84bbb14c465a913b90e3334a89579446b452c882a
SHA5128b285498b28a3bf25753717027a372838742011d89142a6956a280e1dced84149a96f523c33bcbd5055e17cf31f70704f651480c140fc341ca77f47809950a15
-
Filesize
1KB
MD5a4fd678ac5c41618472594607aa855ba
SHA199991c426c708cb2a98e77ce1a65f6a48fd2a6be
SHA256134b3351d704b6fbf28f864bc36ac3167b8191aad24ad459a4f85d626fea1a68
SHA51260a7aebeedaaf998be1b7df8b0128723862c8514b7c411cc1ab2a703f86148e31438990f84d2529b9a3370dc53b987db864fcd1c88890e2d1e1b351185acb032
-
Filesize
6KB
MD58b4d548ca2aab461a37001ed2ec508d5
SHA104451a2f2d4b3d113e62a6ccbe01b19b6ccaaec6
SHA2563d56e3d9620498f127727827ebd5216e35132985d111db21740dc82b65cec712
SHA51264c42f84e1d141ef35149077dd085b92e2ee677d5559803b59740b9d4fa4ef03ebe67b09e144e1c96b5ccab27fb7f015b1d42ca104ead6f3d478641be06fe0e7
-
Filesize
6KB
MD5b6ef14d3a9d1edc60ebef55843f996d6
SHA1034a56d2270591fb408a09da9160af7830ec2511
SHA256c28e1385ef0e007a63d997ec653ee158054b348f54001f70435804e11cd4ec54
SHA512994b430d6f4a3baf0aef256a87c60fa584528e35f64c2f726999e75adbc9d230871370399db862bfcd90d4e9509f69dc044b9aade77aa25d0a27434eff6c1bf4
-
Filesize
114KB
MD50e899a4d207a55e1c4f4ab896d9839f2
SHA179e5a95f1b7c1772758aaa8ed6c06623295bc698
SHA256be7da96632b6afbb95f7013c3daddb19779cb7e58bd4bc5a36e7092a3aff481f
SHA512f199ebbdb31bb03f194556ef86d9aa962bca94466c98d211f97c208473556cd99470ae7131bca2a3d284497729f4110ba06e43124690aeb54b0490ece8851c7e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd