Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
16-02-2024 13:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cloudflare-ipfs.com/ipfs/QmYcMeWXmeBF5XvCYQhsZwLCiKR2oE4jXfEHfwTGxDLkAR
Resource
win10v2004-20231222-en
General
-
Target
https://cloudflare-ipfs.com/ipfs/QmYcMeWXmeBF5XvCYQhsZwLCiKR2oE4jXfEHfwTGxDLkAR
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133525638072315627" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 448 chrome.exe 448 chrome.exe 4736 chrome.exe 4736 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 448 chrome.exe 448 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 448 wrote to memory of 224 448 chrome.exe chrome.exe PID 448 wrote to memory of 224 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2176 448 chrome.exe chrome.exe PID 448 wrote to memory of 2872 448 chrome.exe chrome.exe PID 448 wrote to memory of 2872 448 chrome.exe chrome.exe PID 448 wrote to memory of 1740 448 chrome.exe chrome.exe PID 448 wrote to memory of 1740 448 chrome.exe chrome.exe PID 448 wrote to memory of 1740 448 chrome.exe chrome.exe PID 448 wrote to memory of 1740 448 chrome.exe chrome.exe PID 448 wrote to memory of 1740 448 chrome.exe chrome.exe PID 448 wrote to memory of 1740 448 chrome.exe chrome.exe PID 448 wrote to memory of 1740 448 chrome.exe chrome.exe PID 448 wrote to memory of 1740 448 chrome.exe chrome.exe PID 448 wrote to memory of 1740 448 chrome.exe chrome.exe PID 448 wrote to memory of 1740 448 chrome.exe chrome.exe PID 448 wrote to memory of 1740 448 chrome.exe chrome.exe PID 448 wrote to memory of 1740 448 chrome.exe chrome.exe PID 448 wrote to memory of 1740 448 chrome.exe chrome.exe PID 448 wrote to memory of 1740 448 chrome.exe chrome.exe PID 448 wrote to memory of 1740 448 chrome.exe chrome.exe PID 448 wrote to memory of 1740 448 chrome.exe chrome.exe PID 448 wrote to memory of 1740 448 chrome.exe chrome.exe PID 448 wrote to memory of 1740 448 chrome.exe chrome.exe PID 448 wrote to memory of 1740 448 chrome.exe chrome.exe PID 448 wrote to memory of 1740 448 chrome.exe chrome.exe PID 448 wrote to memory of 1740 448 chrome.exe chrome.exe PID 448 wrote to memory of 1740 448 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cloudflare-ipfs.com/ipfs/QmYcMeWXmeBF5XvCYQhsZwLCiKR2oE4jXfEHfwTGxDLkAR1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83cf09758,0x7ff83cf09768,0x7ff83cf097782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1636,i,5813030043879371004,78382867897097897,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1636,i,5813030043879371004,78382867897097897,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1636,i,5813030043879371004,78382867897097897,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2808 --field-trial-handle=1636,i,5813030043879371004,78382867897097897,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2816 --field-trial-handle=1636,i,5813030043879371004,78382867897097897,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 --field-trial-handle=1636,i,5813030043879371004,78382867897097897,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 --field-trial-handle=1636,i,5813030043879371004,78382867897097897,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 --field-trial-handle=1636,i,5813030043879371004,78382867897097897,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4720 --field-trial-handle=1636,i,5813030043879371004,78382867897097897,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
192B
MD5e989122e7da7deecd988cc94cf9e039b
SHA1b3686d30beb19ca48ee0aeaa834910cd8fdb3500
SHA2561c5145fec8b001186c69c35a7cd746079c96c978e89eaa66992e868619d84e2c
SHA512e04cded6fa080c762a6bcb69ae698c30842c95368cc31d1933e1291ee3ad3f34ce3446c8e2ade140a3abfba54a54799af0164fa62af4395a368794300c082d96
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD54f062ba01c0b9e88404574cdbe763f1d
SHA152ea6e94c471d12baafaf4808ed73515ac38ea31
SHA256a749c1ab4d7b880ba4a433b69769b0b7563fd8a11d948bc20b9b6c2228a9b465
SHA512e93c043d34a23d603e6c9d7e27c8bef102eb3eac127e99e06669133c5fd873351f023e9e69e8117f0fc086bf6c943ffeb6ee1b85ac2c01c7dd9ab7d2ac385578
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5dac089c639957bbdd3779ee5d9c52887
SHA1dad8f775efb539b8fc21fffe59a45566b5e2bd46
SHA256429f55f1b753565b6a983b0aa14e61f58bb400778dbea1bf61bc758719faa8a9
SHA512af2414c11048f9c13f51d8951db145bfa0bcc6d1ef746f7f044d2a18f64a31d88f9e23ae5eb11c100fe79e2ef4d156e5273f3176b72f0ef3ff4907d1da9e2cb6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD50b109d00084f448aeb2d7bb4c212d21e
SHA162708ec21b8de5164d0ec509c39a54147e98fb6f
SHA25634e7d895b4518ab94639586483a3519e22b55f86dab5a57e93d5b17b399f0623
SHA5127fbb3361063802fb39e70d2ee925cb19895b0ecc7e714843de4e3b23d7b4370929fa5b7c7834eb0a4c4a8aefb39334daeafb5c8943b78f2a719537de10aa4d19
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
114KB
MD5185fbe999bf9398b1b972b065bc3237f
SHA17a741923246f6930a7a4a7cc31a1697a98d9d278
SHA256ae2249cf8dcfed5cbde8b9556a5e75d5dfa48280a6ed5c47750cfdd3d737fb34
SHA512e62030acfc15523326ead22c794bf72a4eaa4740a59e84cbe521219a26e8c073bf808867879d6e38c0b7dca90c9620d9403afd58119d87322459eaf86ac01783
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
103KB
MD56ffd420075db452857539099c2421474
SHA132756af2fd3ff2cd6df5afe9d356d7d294953929
SHA256ef572bb5c05e250eb9521358a1aba8eb7d3fdb3c5ffe122f17b8ae31b1c00d46
SHA512fe633d894188593ad8c422ce60a9746e0c4edb749dc490b96171e501f31956704aab9437fcbbaf6d63df2569dcf50f030323404ddfd57fb5dbd751f682033c5d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe57ea21.TMPFilesize
101KB
MD58093dfb09b542262b082a332dc66de75
SHA1ed61d751344103003aad4f05d96d69b9e0ea5f4b
SHA2564c66c9454a2a52a3fdcdb2276c86d9bfb62f998f64ea0591212e159f1dd4a43f
SHA5121fe538b10bc3d8fc4763a59992b79aab805f3c86618cc79033b4ad8512a80dc96da54990eb9157cd0100b5118e518ab0a5c32e819b01a8823eb871ec5d5f2c5f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dicFilesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
\??\pipe\crashpad_448_UNNOAGXSYOWLNOWYMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e