Analysis
-
max time kernel
15s -
max time network
22s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 15:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://pcchaincontrol.com/?fid=1&cid=Zvwv09KqlzuKu3L8MO932zZwzzDnfL4B&clickid=346c5u39zocfyi4deb&feedId=100138&campaignId=1002450&creativeId=10027920&subscriptionId=1023836845&subscriptionAge=5&creativeButton=0¬ificationKey=1092798155_1024519749643_1023836845&oclickid={t5}
Resource
win10v2004-20231215-en
General
-
Target
https://pcchaincontrol.com/?fid=1&cid=Zvwv09KqlzuKu3L8MO932zZwzzDnfL4B&clickid=346c5u39zocfyi4deb&feedId=100138&campaignId=1002450&creativeId=10027920&subscriptionId=1023836845&subscriptionAge=5&creativeButton=0¬ificationKey=1092798155_1024519749643_1023836845&oclickid={t5}
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133522269497484714" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4568 chrome.exe 4568 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4568 wrote to memory of 984 4568 chrome.exe 17 PID 4568 wrote to memory of 984 4568 chrome.exe 17 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 3996 4568 chrome.exe 85 PID 4568 wrote to memory of 4904 4568 chrome.exe 87 PID 4568 wrote to memory of 4904 4568 chrome.exe 87 PID 4568 wrote to memory of 3344 4568 chrome.exe 86 PID 4568 wrote to memory of 3344 4568 chrome.exe 86 PID 4568 wrote to memory of 3344 4568 chrome.exe 86 PID 4568 wrote to memory of 3344 4568 chrome.exe 86 PID 4568 wrote to memory of 3344 4568 chrome.exe 86 PID 4568 wrote to memory of 3344 4568 chrome.exe 86 PID 4568 wrote to memory of 3344 4568 chrome.exe 86 PID 4568 wrote to memory of 3344 4568 chrome.exe 86 PID 4568 wrote to memory of 3344 4568 chrome.exe 86 PID 4568 wrote to memory of 3344 4568 chrome.exe 86 PID 4568 wrote to memory of 3344 4568 chrome.exe 86 PID 4568 wrote to memory of 3344 4568 chrome.exe 86 PID 4568 wrote to memory of 3344 4568 chrome.exe 86 PID 4568 wrote to memory of 3344 4568 chrome.exe 86 PID 4568 wrote to memory of 3344 4568 chrome.exe 86 PID 4568 wrote to memory of 3344 4568 chrome.exe 86 PID 4568 wrote to memory of 3344 4568 chrome.exe 86 PID 4568 wrote to memory of 3344 4568 chrome.exe 86 PID 4568 wrote to memory of 3344 4568 chrome.exe 86 PID 4568 wrote to memory of 3344 4568 chrome.exe 86 PID 4568 wrote to memory of 3344 4568 chrome.exe 86 PID 4568 wrote to memory of 3344 4568 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://pcchaincontrol.com/?fid=1&cid=Zvwv09KqlzuKu3L8MO932zZwzzDnfL4B&clickid=346c5u39zocfyi4deb&feedId=100138&campaignId=1002450&creativeId=10027920&subscriptionId=1023836845&subscriptionAge=5&creativeButton=0¬ificationKey=1092798155_1024519749643_1023836845&oclickid={t5}1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffa1879758,0x7fffa1879768,0x7fffa18797782⤵PID:984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1900,i,6160981510245616292,68825014096333293,131072 /prefetch:22⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1900,i,6160981510245616292,68825014096333293,131072 /prefetch:82⤵PID:3344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1900,i,6160981510245616292,68825014096333293,131072 /prefetch:82⤵PID:4904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3040 --field-trial-handle=1900,i,6160981510245616292,68825014096333293,131072 /prefetch:12⤵PID:3904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1900,i,6160981510245616292,68825014096333293,131072 /prefetch:12⤵PID:884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3900 --field-trial-handle=1900,i,6160981510245616292,68825014096333293,131072 /prefetch:12⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3176 --field-trial-handle=1900,i,6160981510245616292,68825014096333293,131072 /prefetch:12⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5496 --field-trial-handle=1900,i,6160981510245616292,68825014096333293,131072 /prefetch:82⤵PID:3428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 --field-trial-handle=1900,i,6160981510245616292,68825014096333293,131072 /prefetch:82⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c0777f54a8a0ccc1f7dc7aaea98db6fc
SHA1d74019a71bdf39d4367d124fb54c5289ac39e60d
SHA25602ee2818476182b0bbe705b6000732788bc121ced358f89333aea54d9c5bce9e
SHA512e522074ff6df75e06daf2f10c2a9468a9fd0da0d07af85dc64e856b101265e6da4e536727775ac00c57df5c6ce73c04b43a215901b68cde3646ee1511584ddb5
-
Filesize
6KB
MD53ae21fb84ee0d40c42f613f856498aaf
SHA1c59a3f2d607f8cbfc8aeb86b5a9d4f7b7a285b09
SHA256b085381f5d3130d7bae9de0d28662fe649d136dbbe6650e0a60624226864ab58
SHA51247a3bf6691701d03b419db5f73734f0c8d9b36d207a75bbee759d7e187cac1bf4cb0e464c2cab769d8d4cd03a69eef22cfa0ce429c53367a451e0122dcced308
-
Filesize
114KB
MD52098371ea682a37c227ce3e35802264a
SHA175ff46225b03953bdeae7536df5f0f402be6da2e
SHA2565dbda2b33b45162f1c63665ab75a1962d037c58f70e76bd25cf75de644d9ea04
SHA5128dd582864d0c760e0c51892fc0dbe81724f823968448bddbf1336c3137cecb672a76865c84f13c958a212f82868f872fe84730450fafb2dbdfc331d5cd1cba71
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd