Analysis
-
max time kernel
300s -
max time network
304s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 23:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://steamunlocked.pro/wwe-2k19-free-download/
Resource
win10v2004-20231215-en
General
-
Target
http://steamunlocked.pro/wwe-2k19-free-download/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133522541978507041" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 884 chrome.exe 884 chrome.exe 4324 chrome.exe 4324 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 884 chrome.exe 884 chrome.exe 884 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 884 wrote to memory of 2828 884 chrome.exe 83 PID 884 wrote to memory of 2828 884 chrome.exe 83 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 4824 884 chrome.exe 85 PID 884 wrote to memory of 1048 884 chrome.exe 86 PID 884 wrote to memory of 1048 884 chrome.exe 86 PID 884 wrote to memory of 4608 884 chrome.exe 87 PID 884 wrote to memory of 4608 884 chrome.exe 87 PID 884 wrote to memory of 4608 884 chrome.exe 87 PID 884 wrote to memory of 4608 884 chrome.exe 87 PID 884 wrote to memory of 4608 884 chrome.exe 87 PID 884 wrote to memory of 4608 884 chrome.exe 87 PID 884 wrote to memory of 4608 884 chrome.exe 87 PID 884 wrote to memory of 4608 884 chrome.exe 87 PID 884 wrote to memory of 4608 884 chrome.exe 87 PID 884 wrote to memory of 4608 884 chrome.exe 87 PID 884 wrote to memory of 4608 884 chrome.exe 87 PID 884 wrote to memory of 4608 884 chrome.exe 87 PID 884 wrote to memory of 4608 884 chrome.exe 87 PID 884 wrote to memory of 4608 884 chrome.exe 87 PID 884 wrote to memory of 4608 884 chrome.exe 87 PID 884 wrote to memory of 4608 884 chrome.exe 87 PID 884 wrote to memory of 4608 884 chrome.exe 87 PID 884 wrote to memory of 4608 884 chrome.exe 87 PID 884 wrote to memory of 4608 884 chrome.exe 87 PID 884 wrote to memory of 4608 884 chrome.exe 87 PID 884 wrote to memory of 4608 884 chrome.exe 87 PID 884 wrote to memory of 4608 884 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://steamunlocked.pro/wwe-2k19-free-download/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8b73d9758,0x7ff8b73d9768,0x7ff8b73d97782⤵PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=1856,i,16542367934442137506,9416253485707429948,131072 /prefetch:22⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1856,i,16542367934442137506,9416253485707429948,131072 /prefetch:82⤵PID:1048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1856,i,16542367934442137506,9416253485707429948,131072 /prefetch:82⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2760 --field-trial-handle=1856,i,16542367934442137506,9416253485707429948,131072 /prefetch:12⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2744 --field-trial-handle=1856,i,16542367934442137506,9416253485707429948,131072 /prefetch:12⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4544 --field-trial-handle=1856,i,16542367934442137506,9416253485707429948,131072 /prefetch:12⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 --field-trial-handle=1856,i,16542367934442137506,9416253485707429948,131072 /prefetch:82⤵PID:4144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 --field-trial-handle=1856,i,16542367934442137506,9416253485707429948,131072 /prefetch:82⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2324 --field-trial-handle=1856,i,16542367934442137506,9416253485707429948,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4324
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336B
MD5676d108d6ac356dc1383175cc622b577
SHA1b22dd8dcb526a0fd44c04b2bfbd91caa02cc7f47
SHA256317ff7e35bb01a63544421e39ce81267ec23f51af574df3d4ea6474bf149297e
SHA5123e2c80980a676f3b7979c751d4aa2a029740f62c5cb38f89b5527d5ef404da33f9e9bacca0fce52c01e08e224151eebd7db277e198f44894eb064905550d4edd
-
Filesize
3KB
MD54d0acb9fa3f6b49d4ed05174950d01f4
SHA10b3d96da0f6d13e834c8a89b4d02766e2ce05bfb
SHA2566e5e59851b3c81c0a6b0dee6e7078bb7538839c56cb85f99f3763368fc1f22b3
SHA5125bf0fc3cbd85eb81a2400f2c566d5ad687b443c9727169144283ece894ad457ee7d4ffe063de4f718febafe15860c746ebb6a345ad90b3541fb3ab77bf36daa3
-
Filesize
707B
MD5b566bfd6f1398c9be3161b0ff00a8fb9
SHA1d4f38b46f8241012eef24086c6ea2eeacacc35b0
SHA25685d0ded065dd1d15143b1a936a0354137c4061a9345bce66bba4cff2235000ad
SHA5122f81a10b6cb2947086886bd7eff1945ef4d742ca57ffee3452e4372fc1fdb4cf5498f4ae97d9a16b9d743ebdf905419a34350d82c94b456628010850e4b5e9c0
-
Filesize
6KB
MD5aaafd422ffef727994572f769e2d1478
SHA12ea614e8674bcd3cfbc1917f89e8a80f13e5730a
SHA256798f63280e4890d5cac332d50223ad4426a6803cb5c1b7d57cccd6aebbb9c75c
SHA512ba6c3b5a5d7e0e16682fe6476df854d0cf64aa49f16798a5fa2da99ef958f3eed76010acfc69cb7be7d98c94e8fbd437514dd65ea128c1d74d605f4c5254301b
-
Filesize
114KB
MD565dca4b2c12e64432044c94c76118147
SHA110b3dc09abb014bbadd8a98e1d80f5f0db544eaa
SHA25629c951f5a7ec9709762b47562ff7af6c24b31efaf309f0add37efafca5967b42
SHA512d83b3e75c076a083994f618e41c05fdb59664381b9a061b75e1cfebde81c254e2b17ac0ca078a078cfe991bce4392eb35c9dbf826c760e9de8b2e9965748f820
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd