Analysis
-
max time kernel
149s -
max time network
133s -
platform
windows10-1703_x64 -
resource
win10-20240214-en -
resource tags
arch:x64arch:x86image:win10-20240214-enlocale:en-usos:windows10-1703-x64system -
submitted
19-02-2024 21:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://111.40.18.248
Resource
win10-20240214-en
General
-
Target
http://111.40.18.248
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133528516113851502" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2416 chrome.exe 2416 chrome.exe 1212 chrome.exe 1212 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2416 wrote to memory of 4740 2416 chrome.exe 73 PID 2416 wrote to memory of 4740 2416 chrome.exe 73 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 4432 2416 chrome.exe 76 PID 2416 wrote to memory of 3312 2416 chrome.exe 75 PID 2416 wrote to memory of 3312 2416 chrome.exe 75 PID 2416 wrote to memory of 520 2416 chrome.exe 77 PID 2416 wrote to memory of 520 2416 chrome.exe 77 PID 2416 wrote to memory of 520 2416 chrome.exe 77 PID 2416 wrote to memory of 520 2416 chrome.exe 77 PID 2416 wrote to memory of 520 2416 chrome.exe 77 PID 2416 wrote to memory of 520 2416 chrome.exe 77 PID 2416 wrote to memory of 520 2416 chrome.exe 77 PID 2416 wrote to memory of 520 2416 chrome.exe 77 PID 2416 wrote to memory of 520 2416 chrome.exe 77 PID 2416 wrote to memory of 520 2416 chrome.exe 77 PID 2416 wrote to memory of 520 2416 chrome.exe 77 PID 2416 wrote to memory of 520 2416 chrome.exe 77 PID 2416 wrote to memory of 520 2416 chrome.exe 77 PID 2416 wrote to memory of 520 2416 chrome.exe 77 PID 2416 wrote to memory of 520 2416 chrome.exe 77 PID 2416 wrote to memory of 520 2416 chrome.exe 77 PID 2416 wrote to memory of 520 2416 chrome.exe 77 PID 2416 wrote to memory of 520 2416 chrome.exe 77 PID 2416 wrote to memory of 520 2416 chrome.exe 77 PID 2416 wrote to memory of 520 2416 chrome.exe 77 PID 2416 wrote to memory of 520 2416 chrome.exe 77 PID 2416 wrote to memory of 520 2416 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://111.40.18.2481⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0x88,0xd8,0x7fffb4209758,0x7fffb4209768,0x7fffb42097782⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1784 --field-trial-handle=1968,i,14762209470895206367,234231689514963138,131072 /prefetch:82⤵PID:3312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1600 --field-trial-handle=1968,i,14762209470895206367,234231689514963138,131072 /prefetch:22⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1864 --field-trial-handle=1968,i,14762209470895206367,234231689514963138,131072 /prefetch:82⤵PID:520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2852 --field-trial-handle=1968,i,14762209470895206367,234231689514963138,131072 /prefetch:12⤵PID:3576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2728 --field-trial-handle=1968,i,14762209470895206367,234231689514963138,131072 /prefetch:12⤵PID:1908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4156 --field-trial-handle=1968,i,14762209470895206367,234231689514963138,131072 /prefetch:82⤵PID:460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4480 --field-trial-handle=1968,i,14762209470895206367,234231689514963138,131072 /prefetch:82⤵PID:2504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4544 --field-trial-handle=1968,i,14762209470895206367,234231689514963138,131072 /prefetch:12⤵PID:4444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2856 --field-trial-handle=1968,i,14762209470895206367,234231689514963138,131072 /prefetch:12⤵PID:676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3640 --field-trial-handle=1968,i,14762209470895206367,234231689514963138,131072 /prefetch:12⤵PID:2972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2412 --field-trial-handle=1968,i,14762209470895206367,234231689514963138,131072 /prefetch:12⤵PID:4648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=920 --field-trial-handle=1968,i,14762209470895206367,234231689514963138,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1212
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD51f7a8c7245fb7a2259bcab894583e0ab
SHA14aa2e73cb02e4bb4ae648dd6e6f4df362bc5ebbf
SHA2566608754768b8868b7ec65cda23ba808ad05bd699b321233dd191f6fbebd8c248
SHA5121d8808cafd688d7d2124b3a8874252bb8ba1957cd5fd503f1e6039019a3910888d45c78161f1aee05aa9d17c853f800f0446ae9a33b1188647ba48fdfc971111
-
Filesize
5KB
MD59cbfe2c9a1f036042c09ef18594dcf2c
SHA1dc315f30da03489f165a9290e0f48b4e8335ace6
SHA2564354e920c9a3803b06d7854f528c870e3c385b01f9e19644f8c96b86dd55e8a5
SHA512c20eed6481acf9d1189766a9791ec5b98e37291843746a8eb73e726ad64eb80a0a29cd8c627ace93cea9ff392174df8198a9e6a590235e890deca0287e8f5f89
-
Filesize
5KB
MD5f9522c920a2d9016c1b8463d86437611
SHA16e57f324e9843f67c649dce1cae9bee837fa132f
SHA256caf6f7c7c625de594c63b80ac04b2e72a80502c5a0109261dd337db2a7a03a00
SHA512281ba8cb2593b7b55e682f576fd542ab00c6b4778ebfce463966e48273e2619691355a5887fb34ed1577fd9987c1ed09e8aa3f746d6fc35de9d844ff31385b3d
-
Filesize
129KB
MD5d07b6e5c2991ecb12a667d7accde731e
SHA1263a6422928bdf060152dfd3adcb82eb6f8cefe4
SHA2566a217f3a6b85713f6485292ef2c7a60c388738b59f22d5865680af1113dcb178
SHA512af48fe296af34b05e88e3919012aba84538998eddced41dff68eeeffd4d41aae53b7574130719cc5eb1c2aab8bce78c1012cf98f040ecb2e14697fd184807f09
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd