Analysis
-
max time kernel
299s -
max time network
245s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2024 15:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://91.92.253.112
Resource
win10v2004-20231215-en
General
-
Target
http://91.92.253.112
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133523120546433938" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3420 chrome.exe 3420 chrome.exe 460 chrome.exe 460 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3420 wrote to memory of 452 3420 chrome.exe 62 PID 3420 wrote to memory of 452 3420 chrome.exe 62 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3668 3420 chrome.exe 87 PID 3420 wrote to memory of 3084 3420 chrome.exe 88 PID 3420 wrote to memory of 3084 3420 chrome.exe 88 PID 3420 wrote to memory of 4356 3420 chrome.exe 89 PID 3420 wrote to memory of 4356 3420 chrome.exe 89 PID 3420 wrote to memory of 4356 3420 chrome.exe 89 PID 3420 wrote to memory of 4356 3420 chrome.exe 89 PID 3420 wrote to memory of 4356 3420 chrome.exe 89 PID 3420 wrote to memory of 4356 3420 chrome.exe 89 PID 3420 wrote to memory of 4356 3420 chrome.exe 89 PID 3420 wrote to memory of 4356 3420 chrome.exe 89 PID 3420 wrote to memory of 4356 3420 chrome.exe 89 PID 3420 wrote to memory of 4356 3420 chrome.exe 89 PID 3420 wrote to memory of 4356 3420 chrome.exe 89 PID 3420 wrote to memory of 4356 3420 chrome.exe 89 PID 3420 wrote to memory of 4356 3420 chrome.exe 89 PID 3420 wrote to memory of 4356 3420 chrome.exe 89 PID 3420 wrote to memory of 4356 3420 chrome.exe 89 PID 3420 wrote to memory of 4356 3420 chrome.exe 89 PID 3420 wrote to memory of 4356 3420 chrome.exe 89 PID 3420 wrote to memory of 4356 3420 chrome.exe 89 PID 3420 wrote to memory of 4356 3420 chrome.exe 89 PID 3420 wrote to memory of 4356 3420 chrome.exe 89 PID 3420 wrote to memory of 4356 3420 chrome.exe 89 PID 3420 wrote to memory of 4356 3420 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://91.92.253.1121⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xd8,0x100,0x104,0xe4,0x108,0x7ffed2ea9758,0x7ffed2ea9768,0x7ffed2ea97782⤵PID:452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1916,i,6707831425436590665,10510338681909758912,131072 /prefetch:22⤵PID:3668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1832 --field-trial-handle=1916,i,6707831425436590665,10510338681909758912,131072 /prefetch:82⤵PID:3084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1916,i,6707831425436590665,10510338681909758912,131072 /prefetch:82⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2828 --field-trial-handle=1916,i,6707831425436590665,10510338681909758912,131072 /prefetch:12⤵PID:916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2820 --field-trial-handle=1916,i,6707831425436590665,10510338681909758912,131072 /prefetch:12⤵PID:3216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3840 --field-trial-handle=1916,i,6707831425436590665,10510338681909758912,131072 /prefetch:12⤵PID:1816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4692 --field-trial-handle=1916,i,6707831425436590665,10510338681909758912,131072 /prefetch:12⤵PID:2488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 --field-trial-handle=1916,i,6707831425436590665,10510338681909758912,131072 /prefetch:82⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5016 --field-trial-handle=1916,i,6707831425436590665,10510338681909758912,131072 /prefetch:82⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4888 --field-trial-handle=1916,i,6707831425436590665,10510338681909758912,131072 /prefetch:12⤵PID:2724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1796 --field-trial-handle=1916,i,6707831425436590665,10510338681909758912,131072 /prefetch:12⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=212 --field-trial-handle=1916,i,6707831425436590665,10510338681909758912,131072 /prefetch:12⤵PID:1612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=996 --field-trial-handle=1916,i,6707831425436590665,10510338681909758912,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:460
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
823B
MD558af98c19528b388613d7caab794ba6b
SHA13ec38dd8219d8ae2e877e5de19027aef6edec7e3
SHA256de89a980464a59dc59aafbdcdfe33288d7d7079f9a8906e291f68e24520d32cc
SHA5127888769212341c2d78b5cf049b2f29b3b2cb9df8ab7915f9d14cd859872762cdf26c2266bab670803c9adcda1e060d484bdab3973124aa4eeca2821c87ab5e8c
-
Filesize
6KB
MD52caf31a48e8f8bc1e2b2cb5e1b96f7a3
SHA1e3abfb103a2aefe8b303e839db393f04bda7ffc6
SHA256cfd4b38c079a92327acd9a5b1e018128a379cb1620cd159274516704aafab3c0
SHA512c707670805ee21bb65aa730155cd332f0982d328ba4437960eca4cfc606884a76095f6f6e9bb8b9b29b1cdc61af28d10643730ada2f1b97b29fba2074d9f0533
-
Filesize
6KB
MD595e9aab0af3dd846318e52d152064883
SHA10dd58218b2fccc5b98a8867c9ae9b2cb27ccff7f
SHA2566a44b147d3e444aa544ab451161c941ed64469c8e1d71971b99fb80974a9b076
SHA5124b23cee6fdb4d40dbbe4dd259fd47bb2d148c1694f0ad7f007b41570725cc479c1e7e542e61a0861659aa4d895625514a5cb66ab9002e8e4023570e7cc2066b4
-
Filesize
114KB
MD5a6ef4511adc1e14df9b3b67eed6bda79
SHA161732709d0537cd726b7581d164f2d886b47f137
SHA256fc4f1e29053570bc2c1b1eea30462aa94d2dee6a9e90a9bf6de628a58e1b880b
SHA512a4ae95400e3565159f1217512441ac945f00dc97ea429b521149abefed720c06f9ca5b925db15277adc653212298386bbd11e0e4ac5fc8f86ca552711116dc7e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd