Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-1703_x64 -
resource
win10-20240214-en -
resource tags
arch:x64arch:x86image:win10-20240214-enlocale:en-usos:windows10-1703-x64system -
submitted
19/02/2024, 16:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://192.243.59.12
Resource
win10-20240214-en
General
-
Target
http://192.243.59.12
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133528345885057023" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2388 chrome.exe 2388 chrome.exe 2028 chrome.exe 2028 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2388 wrote to memory of 5064 2388 chrome.exe 74 PID 2388 wrote to memory of 5064 2388 chrome.exe 74 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 5012 2388 chrome.exe 78 PID 2388 wrote to memory of 1412 2388 chrome.exe 76 PID 2388 wrote to memory of 1412 2388 chrome.exe 76 PID 2388 wrote to memory of 1620 2388 chrome.exe 77 PID 2388 wrote to memory of 1620 2388 chrome.exe 77 PID 2388 wrote to memory of 1620 2388 chrome.exe 77 PID 2388 wrote to memory of 1620 2388 chrome.exe 77 PID 2388 wrote to memory of 1620 2388 chrome.exe 77 PID 2388 wrote to memory of 1620 2388 chrome.exe 77 PID 2388 wrote to memory of 1620 2388 chrome.exe 77 PID 2388 wrote to memory of 1620 2388 chrome.exe 77 PID 2388 wrote to memory of 1620 2388 chrome.exe 77 PID 2388 wrote to memory of 1620 2388 chrome.exe 77 PID 2388 wrote to memory of 1620 2388 chrome.exe 77 PID 2388 wrote to memory of 1620 2388 chrome.exe 77 PID 2388 wrote to memory of 1620 2388 chrome.exe 77 PID 2388 wrote to memory of 1620 2388 chrome.exe 77 PID 2388 wrote to memory of 1620 2388 chrome.exe 77 PID 2388 wrote to memory of 1620 2388 chrome.exe 77 PID 2388 wrote to memory of 1620 2388 chrome.exe 77 PID 2388 wrote to memory of 1620 2388 chrome.exe 77 PID 2388 wrote to memory of 1620 2388 chrome.exe 77 PID 2388 wrote to memory of 1620 2388 chrome.exe 77 PID 2388 wrote to memory of 1620 2388 chrome.exe 77 PID 2388 wrote to memory of 1620 2388 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://192.243.59.121⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffe4cc79758,0x7ffe4cc79768,0x7ffe4cc797782⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1812 --field-trial-handle=1824,i,7083998702105305290,12436908886804908072,131072 /prefetch:82⤵PID:1412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2108 --field-trial-handle=1824,i,7083998702105305290,12436908886804908072,131072 /prefetch:82⤵PID:1620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1824,i,7083998702105305290,12436908886804908072,131072 /prefetch:22⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2632 --field-trial-handle=1824,i,7083998702105305290,12436908886804908072,131072 /prefetch:12⤵PID:3144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2588 --field-trial-handle=1824,i,7083998702105305290,12436908886804908072,131072 /prefetch:12⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4376 --field-trial-handle=1824,i,7083998702105305290,12436908886804908072,131072 /prefetch:12⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4720 --field-trial-handle=1824,i,7083998702105305290,12436908886804908072,131072 /prefetch:82⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3000 --field-trial-handle=1824,i,7083998702105305290,12436908886804908072,131072 /prefetch:82⤵PID:3384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4496 --field-trial-handle=1824,i,7083998702105305290,12436908886804908072,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2028
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
194KB
MD5ac84f1282f8542dee07f8a1af421f2a7
SHA1261885284826281a99ff982428a765be30de9029
SHA256193b8f571f3fd65b98dc39601431ff6e91ade5f90ee7790bfc1fba8f7580a4b0
SHA5129f4f58ab43ddadad903cea3454d79b99a750f05e4d850de5f25371d5bec16fc312015a875b8f418154f1124c400ae1c82e2efd862870cd35c3f0961426c8cd82
-
Filesize
168B
MD5b763c5ac8afd62a97f6d4dc9a8e1655a
SHA14cc0885575f047724690a2b587e408d7c2317c19
SHA256b1247798c267b9cfa4ceda475fc0ac1cffc0d72c020151ea5c61493a362af583
SHA5126ff1b5cad6b2002942369bff268b6f9a5ad1ccacc783a509a90565ce099087c0e772c50dff5bdc423f501d72bfd51a97c4de1d2a627efe11ec9946f6053cb278
-
Filesize
144B
MD5f50c207c69695874dd153ae19743534d
SHA1b0a640460e586e72b02fca5c21ea05c2a01aa467
SHA256982def21f55f654f7184e64276d040b837a937a15893ed39d0c2881dbb9ddeb4
SHA512e2b6147ff82a485f6f4627ca36484fd4d6f942af86e1ef2ac12db701ce0c1cb8586a6450211b8ee9fdb4ea433ba3ae96f066de694470c45a7ce904207d863ec5
-
Filesize
1KB
MD5dffda0fe7902b3de6b20c1319d0f7f88
SHA193e4e60d681efdb44f7381165e25dd874ce506db
SHA256b3dd00065f851be13a8160fd7bfb03759477069fbd983923b22b3ffa940d136a
SHA512d3fdc080ccc6122b5849a651dfff7b198c3b6350ccdd4563865f96c4514513708e08215cffbaa079e502b8c56cff9de842479762bde7359056b547e5f7d29df3
-
Filesize
5KB
MD517f439d18ad646ee529dc6e9899e9450
SHA1e85ae67cbf3ca291fce57f7fa4f3927178c65991
SHA256b4829e92ca7221c7f52f136e702dd8d91314236c776cc2b1273eb628ed05bda1
SHA51267b60c5400f11a5d54e79ea1452b737d6577ab0098f79126ebaa7baf6eed36699a0c0b42122e4a2b59106dca5cc53cba8a5a436d00cb44a0c06f639b0225b674
-
Filesize
6KB
MD50c867a1fe2cdeb71b156536ac3852ccf
SHA1a34972e41f4952e5b9eadd443bb85aaf1f1b14b3
SHA256b87c899847f0decdc07127d2132f8d940bfd4ae1dd24ada39815fe8f4bffe29a
SHA51243fa35995d86f60a2121d3a6883ff6542e09cfa8c36e07db96b5d93dac8d7c67c8d25f9c726b100322a9d16032640c46b04d9b4bcdd633244e293fa1ec90c032
-
Filesize
5KB
MD5980b6e3044f1398998a81953724b8d70
SHA1633c0d8ba0adfb82a575951d023a6c181a0695ab
SHA2561755cafce5c022e1a8141de58c416f9fd579a66febb05bd98cc0994af89c981d
SHA512de2981539a79a6cc719950097a9be0aee453b39fb7f200b8b299816098ad184002d52b87b5d8d6198d08ce726821a20215ce072869aa84b3a8b0e55395a84638
-
Filesize
5KB
MD550dc8ed9855b1ce4f1d1c248b91b12b2
SHA18767a4b07c7eee47d62f42c95d4bda713309ef42
SHA256df14dc1f4ad1c594af5b31d2f3c3ed44ea3492f2649dfae67a0bdd33ecb83454
SHA5126b7b266215b537a0c61bae3f84e2c2184f15c837c53edaa570b28c1249e6645e681290312402e824ce24fdf0418c622c59133fdf61ac4f1e21ae9a5ea0f460eb
-
Filesize
129KB
MD56d0535e2edffe767ebaf6443935c9676
SHA14e0f5b0989e5c1bc9bf30a29440ba1fa131bf95a
SHA256c48f50fc50ae20b0a49cb101e3e40cd4a137d3921a13f458334964f8fe1c1757
SHA512dba309f74e5da56f34f5e4430b005b456342432a2b03cae15f5754a15f5c3003d47b02f63c850e49e2eb185b85480311ae6229850c031edfedca4fcbddd3e082
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd