Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20240214-en -
resource tags
arch:x64arch:x86image:win10-20240214-enlocale:en-usos:windows10-1703-x64system -
submitted
19-02-2024 12:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=https%3a%2f%2fapc%2dovernight.com&umid=88543d29-30ab-4829-adcb-86502fda9c76&auth=6ec521ede5feedb16a344a55d6b657efa55978c4-ebdc2127dc304735cd4e29a7ffb9d388e9253e41
Resource
win10-20240214-en
General
-
Target
https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=https%3a%2f%2fapc%2dovernight.com&umid=88543d29-30ab-4829-adcb-86502fda9c76&auth=6ec521ede5feedb16a344a55d6b657efa55978c4-ebdc2127dc304735cd4e29a7ffb9d388e9253e41
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133528202493630992" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5004 chrome.exe 5004 chrome.exe 1300 chrome.exe 1300 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5004 wrote to memory of 4592 5004 chrome.exe 73 PID 5004 wrote to memory of 4592 5004 chrome.exe 73 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 4660 5004 chrome.exe 77 PID 5004 wrote to memory of 784 5004 chrome.exe 76 PID 5004 wrote to memory of 784 5004 chrome.exe 76 PID 5004 wrote to memory of 1128 5004 chrome.exe 75 PID 5004 wrote to memory of 1128 5004 chrome.exe 75 PID 5004 wrote to memory of 1128 5004 chrome.exe 75 PID 5004 wrote to memory of 1128 5004 chrome.exe 75 PID 5004 wrote to memory of 1128 5004 chrome.exe 75 PID 5004 wrote to memory of 1128 5004 chrome.exe 75 PID 5004 wrote to memory of 1128 5004 chrome.exe 75 PID 5004 wrote to memory of 1128 5004 chrome.exe 75 PID 5004 wrote to memory of 1128 5004 chrome.exe 75 PID 5004 wrote to memory of 1128 5004 chrome.exe 75 PID 5004 wrote to memory of 1128 5004 chrome.exe 75 PID 5004 wrote to memory of 1128 5004 chrome.exe 75 PID 5004 wrote to memory of 1128 5004 chrome.exe 75 PID 5004 wrote to memory of 1128 5004 chrome.exe 75 PID 5004 wrote to memory of 1128 5004 chrome.exe 75 PID 5004 wrote to memory of 1128 5004 chrome.exe 75 PID 5004 wrote to memory of 1128 5004 chrome.exe 75 PID 5004 wrote to memory of 1128 5004 chrome.exe 75 PID 5004 wrote to memory of 1128 5004 chrome.exe 75 PID 5004 wrote to memory of 1128 5004 chrome.exe 75 PID 5004 wrote to memory of 1128 5004 chrome.exe 75 PID 5004 wrote to memory of 1128 5004 chrome.exe 75
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=https%3a%2f%2fapc%2dovernight.com&umid=88543d29-30ab-4829-adcb-86502fda9c76&auth=6ec521ede5feedb16a344a55d6b657efa55978c4-ebdc2127dc304735cd4e29a7ffb9d388e9253e411⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff98c309758,0x7ff98c309768,0x7ff98c3097782⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2064 --field-trial-handle=1844,i,2117880543930634822,14577774564179374526,131072 /prefetch:82⤵PID:1128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1792 --field-trial-handle=1844,i,2117880543930634822,14577774564179374526,131072 /prefetch:82⤵PID:784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1560 --field-trial-handle=1844,i,2117880543930634822,14577774564179374526,131072 /prefetch:22⤵PID:4660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2900 --field-trial-handle=1844,i,2117880543930634822,14577774564179374526,131072 /prefetch:12⤵PID:1300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2892 --field-trial-handle=1844,i,2117880543930634822,14577774564179374526,131072 /prefetch:12⤵PID:2536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4564 --field-trial-handle=1844,i,2117880543930634822,14577774564179374526,131072 /prefetch:12⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3168 --field-trial-handle=1844,i,2117880543930634822,14577774564179374526,131072 /prefetch:12⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4488 --field-trial-handle=1844,i,2117880543930634822,14577774564179374526,131072 /prefetch:12⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 --field-trial-handle=1844,i,2117880543930634822,14577774564179374526,131072 /prefetch:82⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 --field-trial-handle=1844,i,2117880543930634822,14577774564179374526,131072 /prefetch:82⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2376 --field-trial-handle=1844,i,2117880543930634822,14577774564179374526,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1300
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
194KB
MD5ac84f1282f8542dee07f8a1af421f2a7
SHA1261885284826281a99ff982428a765be30de9029
SHA256193b8f571f3fd65b98dc39601431ff6e91ade5f90ee7790bfc1fba8f7580a4b0
SHA5129f4f58ab43ddadad903cea3454d79b99a750f05e4d850de5f25371d5bec16fc312015a875b8f418154f1124c400ae1c82e2efd862870cd35c3f0961426c8cd82
-
Filesize
480B
MD520f08e4d6192151b1b2498722de1fade
SHA11485186a92904befb20d659a1f69fa89125c9b4e
SHA256b69203365793b7f44359987a9198ba8c2011176a691743e8546c9ea55a2ed2ab
SHA5124591fef143bdde47f646f1914fe623f5c6d11de3c6051ab3838d4e2f98afb50a714cdc50a14466fa4b8ab670b97d799d79baebce7d93e16f3ad6dc826bf93d00
-
Filesize
2KB
MD53447ae65e64e55f71edc08dbaf4923dc
SHA1ebcefa8187eb26090341c44bec973a710463a29e
SHA25605e6a3417b90eb12a390c5471c6d330c4260b686a1b0a83aec0b5aacd4d048ce
SHA512cdbe5071dcb826c8fe8baeda10b66ed793235f6f18846e54685a6979c55df705868882fc75d79a5fc3beb460d818a647dcf2e8f22535ed6c03c1e49a72ae5840
-
Filesize
1KB
MD59d03a2432433f9e82980a7dcdbc952b2
SHA1b0a2b06cafca4ae93557bdc9251f5b77e6a63916
SHA2560e715b808a2093cd5a09b068a44970ffbfee4b1ee771d3810ab610fb97e22908
SHA51226b91158ff55d567c45a0d08a9cbe4476f0f2538613ca0ebbcec5a2982d9bf0a868228af8d17b101b675228a3ed6017da81b48df5196dfade6426e97e1766306
-
Filesize
5KB
MD5a14eb8d7cb261edb98fbdcab933de048
SHA11e80acb584ba11cbbd6a700d31d2b1d545e7e875
SHA2561153b7814362e651b12c1502c708b1fa6fcd12c077160446b394e1d8702b6ad4
SHA512fe3e8d11e1fa57201e1ac3d2a9a7a9e0ce8b72334c0d401dbac28fb7802ba61e6dc62aa258d859862adb8ed98f893cfb0d7291129ecf8a7d7927e349e030e0cb
-
Filesize
5KB
MD5c7f9fa09b85a18b9a34d0f2915775c63
SHA130a9b1034fccd01231408342aefa631f553736f2
SHA256a1e38a6d6f148124cf36d204cc857754f397ef29d04524320076f86d8a780a1a
SHA5126b01761519fbcea7a174f03df5794397e741533e8933be752a70fa388811de2169dc22f5e3b0c7b1ed3dc26fbe0b8182801959b9ee6268bf206caddb7318d668
-
Filesize
6KB
MD59ea707b33d8c29d06d6f38725e1607b1
SHA18b06ede7e7e952ecd104691b3cf9e0dd1e9b660f
SHA25650090a71b0bdfa1555660316e80e2804b2cada8c7183ad356032af6e2cc25dc4
SHA51239f1cc30c016fa360cbd66f507ff321262976386fef0088c5efc47caf382df2c83c7497b027f19330d1ba66513fb5098e76ba79871721f9434f761b2c219cf82
-
Filesize
254KB
MD57d2723dcd17584d8571cf62865806edb
SHA1f3eaeadf9c4a406bd20910b04ec06b5718fbb05b
SHA256b9a6bf306e170a258c0287b2449752855cb7d369d507cdb54368ef95b8e1f5d0
SHA51295615069854f1216acfd5150613be7c0431d0742745b379bc29732cdb72ff995165f4e989594c932061968cb6ca87ce9fe7e462f1e8f342a72bb934ff8367738
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd