Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2024 05:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cloudfanatic.net
Resource
win10v2004-20231215-en
General
-
Target
https://cloudfanatic.net
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133527955938456410" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 968 chrome.exe 968 chrome.exe 2196 chrome.exe 2196 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 968 chrome.exe 968 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 968 wrote to memory of 932 968 chrome.exe 84 PID 968 wrote to memory of 932 968 chrome.exe 84 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3168 968 chrome.exe 86 PID 968 wrote to memory of 3124 968 chrome.exe 87 PID 968 wrote to memory of 3124 968 chrome.exe 87 PID 968 wrote to memory of 4452 968 chrome.exe 88 PID 968 wrote to memory of 4452 968 chrome.exe 88 PID 968 wrote to memory of 4452 968 chrome.exe 88 PID 968 wrote to memory of 4452 968 chrome.exe 88 PID 968 wrote to memory of 4452 968 chrome.exe 88 PID 968 wrote to memory of 4452 968 chrome.exe 88 PID 968 wrote to memory of 4452 968 chrome.exe 88 PID 968 wrote to memory of 4452 968 chrome.exe 88 PID 968 wrote to memory of 4452 968 chrome.exe 88 PID 968 wrote to memory of 4452 968 chrome.exe 88 PID 968 wrote to memory of 4452 968 chrome.exe 88 PID 968 wrote to memory of 4452 968 chrome.exe 88 PID 968 wrote to memory of 4452 968 chrome.exe 88 PID 968 wrote to memory of 4452 968 chrome.exe 88 PID 968 wrote to memory of 4452 968 chrome.exe 88 PID 968 wrote to memory of 4452 968 chrome.exe 88 PID 968 wrote to memory of 4452 968 chrome.exe 88 PID 968 wrote to memory of 4452 968 chrome.exe 88 PID 968 wrote to memory of 4452 968 chrome.exe 88 PID 968 wrote to memory of 4452 968 chrome.exe 88 PID 968 wrote to memory of 4452 968 chrome.exe 88 PID 968 wrote to memory of 4452 968 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cloudfanatic.net1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff9e079758,0x7fff9e079768,0x7fff9e0797782⤵PID:932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1840,i,17014893826031830160,4967502407395785787,131072 /prefetch:22⤵PID:3168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2008 --field-trial-handle=1840,i,17014893826031830160,4967502407395785787,131072 /prefetch:82⤵PID:3124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1840,i,17014893826031830160,4967502407395785787,131072 /prefetch:82⤵PID:4452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2760 --field-trial-handle=1840,i,17014893826031830160,4967502407395785787,131072 /prefetch:12⤵PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2752 --field-trial-handle=1840,i,17014893826031830160,4967502407395785787,131072 /prefetch:12⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4868 --field-trial-handle=1840,i,17014893826031830160,4967502407395785787,131072 /prefetch:82⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 --field-trial-handle=1840,i,17014893826031830160,4967502407395785787,131072 /prefetch:82⤵PID:4200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 --field-trial-handle=1840,i,17014893826031830160,4967502407395785787,131072 /prefetch:82⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3712 --field-trial-handle=1840,i,17014893826031830160,4967502407395785787,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4368
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x40c 0x4b41⤵PID:3208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\10ab43a4-bddb-4005-b14e-a432cf389b66.tmp
Filesize6KB
MD5fa527b2f74febcc191db5c99fb325729
SHA1164a6d86acd19e363b9f12974ae67758d78c3d6e
SHA256bd6224a892c6ebe9ca1b6151760fbe836760dea8726f4541daa0d7eed74d72a3
SHA5124b29be322da19d7bcbd1b3946de060e83498d23c59349759f11f519d9f90607e48f11364e928b787d204f2e52821edb0c27985ec57f082635b02fdaadca0ca74
-
Filesize
528B
MD587ecf97db6897b20d729d7ffce1dd47e
SHA14895fc73da71bcb5b35402f2a8f084775652a800
SHA25619cd0fc250b039432433232df32b2e357598778d3c4eb12f7c00a46b93b8ee03
SHA512a16bffad03dfaa2ed64bd50c429c4d9f17898fae3eab86ea57254c26effb184fe9a65ae83bbbca3f848f60927b9173a5d6e45e21f043776179e0244a39c256de
-
Filesize
1KB
MD58b4de8785073b8c001f52f04c38239a5
SHA1943a3637b7098c46b15c31f938956dc972710675
SHA256f586cb303ac57c03d2d990378344e1a58577504642d5bf4cb2215c309396b00e
SHA51271eb942b5501223644250001c05666ea314da1db0011a489535330bac6b5c2de857568d54610603fcf04ad182f3ad6e7c1374cabb25ee5766733e8842a9c0a32
-
Filesize
2KB
MD5305be0a9a6b420e9e4d87b4c67a2a880
SHA15e3af493573d4a10edb90f5dc2462e043d1c281f
SHA25648dbd3a7197e44e483538713c616805e44099d05960d3f180f796869c1a745fc
SHA512fcbb7af04ffb66489e548698fb987af6c8d4c4ce20275fd5c094994ce05d4cd0385e9e4f683718cbed58dabb0245c6bbce5c69e47917217fe217374133bb1cc5
-
Filesize
538B
MD5c34552b740b9ef927dc8a7cbda6a8ad3
SHA126798149eb1d3af2ee1e51ac27ec43e645812b89
SHA256490f140e1247ec782e86e7331305c59ee4ef45657338be1827f272b176c1b9f2
SHA512674cab0f744ca23a2a4a20ae4ca25439e501f0d2cb0b5a2263dd96404268417a3c15ed530eb51e3316a1341c504cfb90109b4513c1d626e3e5a6e5008002c2cd
-
Filesize
114KB
MD53014c6ccc87d310728e86037c3eb872c
SHA1a13393a640a1fad655b8a58565cc28264f36c1d7
SHA2566afa0baea884e410370e1c80eb1ae895fdfeab312d65f3b26989591db44c632a
SHA512e8b324fb9cb5c861810e51031f506837d0685beb7af35e0f04f657f0e74cd38cf19cd4bf37a45c33f56fe39ad7cc2104a42bcb3b552fc193bac632496981e341
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd