Analysis
-
max time kernel
97s -
max time network
94s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-02-2024 11:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://crackedfine.com
Resource
win11-20231215-en
General
-
Target
https://crackedfine.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133522097629887443" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 644 chrome.exe 644 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 644 chrome.exe 644 chrome.exe 644 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 644 wrote to memory of 5064 644 chrome.exe 55 PID 644 wrote to memory of 5064 644 chrome.exe 55 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 1912 644 chrome.exe 79 PID 644 wrote to memory of 4900 644 chrome.exe 81 PID 644 wrote to memory of 4900 644 chrome.exe 81 PID 644 wrote to memory of 3500 644 chrome.exe 80 PID 644 wrote to memory of 3500 644 chrome.exe 80 PID 644 wrote to memory of 3500 644 chrome.exe 80 PID 644 wrote to memory of 3500 644 chrome.exe 80 PID 644 wrote to memory of 3500 644 chrome.exe 80 PID 644 wrote to memory of 3500 644 chrome.exe 80 PID 644 wrote to memory of 3500 644 chrome.exe 80 PID 644 wrote to memory of 3500 644 chrome.exe 80 PID 644 wrote to memory of 3500 644 chrome.exe 80 PID 644 wrote to memory of 3500 644 chrome.exe 80 PID 644 wrote to memory of 3500 644 chrome.exe 80 PID 644 wrote to memory of 3500 644 chrome.exe 80 PID 644 wrote to memory of 3500 644 chrome.exe 80 PID 644 wrote to memory of 3500 644 chrome.exe 80 PID 644 wrote to memory of 3500 644 chrome.exe 80 PID 644 wrote to memory of 3500 644 chrome.exe 80 PID 644 wrote to memory of 3500 644 chrome.exe 80 PID 644 wrote to memory of 3500 644 chrome.exe 80 PID 644 wrote to memory of 3500 644 chrome.exe 80 PID 644 wrote to memory of 3500 644 chrome.exe 80 PID 644 wrote to memory of 3500 644 chrome.exe 80 PID 644 wrote to memory of 3500 644 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://crackedfine.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff872719758,0x7ff872719768,0x7ff8727197782⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1616 --field-trial-handle=1844,i,15820740431219229079,8451132428475613672,131072 /prefetch:22⤵PID:1912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2132 --field-trial-handle=1844,i,15820740431219229079,8451132428475613672,131072 /prefetch:82⤵PID:3500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1844,i,15820740431219229079,8451132428475613672,131072 /prefetch:82⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1844,i,15820740431219229079,8451132428475613672,131072 /prefetch:12⤵PID:4140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1844,i,15820740431219229079,8451132428475613672,131072 /prefetch:12⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4588 --field-trial-handle=1844,i,15820740431219229079,8451132428475613672,131072 /prefetch:12⤵PID:240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 --field-trial-handle=1844,i,15820740431219229079,8451132428475613672,131072 /prefetch:82⤵PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 --field-trial-handle=1844,i,15820740431219229079,8451132428475613672,131072 /prefetch:82⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD585b2373714232408db6ecde22eb3712b
SHA18f6d95d0d8200fbe3cda4e282ca4e08f57ab41e3
SHA2560d028ebf6e46fc36fd164db8c1defacf98bb86017586eaf5ace9797d1c962239
SHA512db934cd4c5b73cb74cada64c06705e2f185c99e35a166ef0e629b78e82eefa91d8f18014d35685c86d4f29a72aed1122538dc3782da622d645b9422541f46f5b
-
Filesize
2KB
MD53614f101ee41cc800a52ded969a83749
SHA11e4ad2b7baadc83289289f7fcb3849ea8935151d
SHA256993c7c8af75281270aba37f2b4b5314b1f547bb7d09c091fc956d21289009de9
SHA512ab975d6d9e7ffbafba870954cc650a7af8e2ef7099b59d0145c40ee6c6f984a5f3356a71d0469b6728cc6de10b6e9085494d487716152c1a74e756625aeb48f9
-
Filesize
872B
MD550f0eef4e5cc70596909491b06f60049
SHA1264ef3fe2a11f2a543bc0caf4c90f34d5e364775
SHA25651216d315171c25a8ff9bf9c2d3b2c5afdb31326709c92c7f641f40f626bb492
SHA5127070fc8c78d0708d7299485fb663359d8ca094fbd45dd9f18d7c2a12b295cca6a384f5aa868958ae9977459c303cbce5ed23f75ae2fc37b9340b9d31855381a8
-
Filesize
6KB
MD57b674be78dea73e6fb2a1f29700e62bd
SHA16e78ddef38004915a4992be32aeec071a23f91f8
SHA25694d78161122b4a4d5e9982ef390a8c2660b561395d0d5f2c7a0a105b2c279b07
SHA51248cc6b868c41f72fb98131184941b9b0e9188efb94c59a0c1c4590870c9b5503a2b3d7bef1c08e3b078a9df1348abe611e1619a541204d1f75daac052965dd57
-
Filesize
6KB
MD58eb567abd3040c6b74b10281e8f04b4f
SHA1ece9542da4c37dfca0b41d60bfd6fc5f68476990
SHA25616689efa60525ce287b2fc3321bdf0f32079efa22235c5496ebfef36cd1b5abc
SHA512f189f13a7c1cae478a8422e03c4390cac92959e3e966d39af4bb7e056db9f49e3dad3fdc0a4ba0509d2d698a9b4a2ad01f0cf06a8b48ed5900ccbb2ea537293b
-
Filesize
114KB
MD55795e54cf97f2c5d49dd7dae02a8bfed
SHA12c65677bebb1cc574f8c6cce0e0c8fe547251759
SHA256317d7291cb0bb40724ed60b9f6bba22b1190b1bb973f5c6ad7734f514e872d60
SHA512421f8ebd21f98edbf384e529ab9664284da284237d884b879fbf9de81e1ecf67a7c06bd2281f056675d7cafc2eb9fc474991d6dfb0a9d2a5a5bc685f7b607bbd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd