Analysis
-
max time kernel
153s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2024, 06:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://scnv.io/Fjdd
Resource
win10v2004-20231215-en
General
-
Target
https://scnv.io/Fjdd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133528841514512296" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3992 chrome.exe 3992 chrome.exe 4308 chrome.exe 4308 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3992 wrote to memory of 2792 3992 chrome.exe 84 PID 3992 wrote to memory of 2792 3992 chrome.exe 84 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 3048 3992 chrome.exe 86 PID 3992 wrote to memory of 980 3992 chrome.exe 87 PID 3992 wrote to memory of 980 3992 chrome.exe 87 PID 3992 wrote to memory of 916 3992 chrome.exe 88 PID 3992 wrote to memory of 916 3992 chrome.exe 88 PID 3992 wrote to memory of 916 3992 chrome.exe 88 PID 3992 wrote to memory of 916 3992 chrome.exe 88 PID 3992 wrote to memory of 916 3992 chrome.exe 88 PID 3992 wrote to memory of 916 3992 chrome.exe 88 PID 3992 wrote to memory of 916 3992 chrome.exe 88 PID 3992 wrote to memory of 916 3992 chrome.exe 88 PID 3992 wrote to memory of 916 3992 chrome.exe 88 PID 3992 wrote to memory of 916 3992 chrome.exe 88 PID 3992 wrote to memory of 916 3992 chrome.exe 88 PID 3992 wrote to memory of 916 3992 chrome.exe 88 PID 3992 wrote to memory of 916 3992 chrome.exe 88 PID 3992 wrote to memory of 916 3992 chrome.exe 88 PID 3992 wrote to memory of 916 3992 chrome.exe 88 PID 3992 wrote to memory of 916 3992 chrome.exe 88 PID 3992 wrote to memory of 916 3992 chrome.exe 88 PID 3992 wrote to memory of 916 3992 chrome.exe 88 PID 3992 wrote to memory of 916 3992 chrome.exe 88 PID 3992 wrote to memory of 916 3992 chrome.exe 88 PID 3992 wrote to memory of 916 3992 chrome.exe 88 PID 3992 wrote to memory of 916 3992 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://scnv.io/Fjdd1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfc8f9758,0x7ffcfc8f9768,0x7ffcfc8f97782⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1716,i,5651447413714361454,6811833018072732784,131072 /prefetch:22⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1716,i,5651447413714361454,6811833018072732784,131072 /prefetch:82⤵PID:980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2112 --field-trial-handle=1716,i,5651447413714361454,6811833018072732784,131072 /prefetch:82⤵PID:916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2860 --field-trial-handle=1716,i,5651447413714361454,6811833018072732784,131072 /prefetch:12⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3252 --field-trial-handle=1716,i,5651447413714361454,6811833018072732784,131072 /prefetch:12⤵PID:3612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4612 --field-trial-handle=1716,i,5651447413714361454,6811833018072732784,131072 /prefetch:12⤵PID:3916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 --field-trial-handle=1716,i,5651447413714361454,6811833018072732784,131072 /prefetch:82⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 --field-trial-handle=1716,i,5651447413714361454,6811833018072732784,131072 /prefetch:82⤵PID:752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2636 --field-trial-handle=1716,i,5651447413714361454,6811833018072732784,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4308
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c46efb152ff5f1e1597c9c271d98a3a3
SHA1b295fbf2ffdb126821fb3c81ee3a84057d798135
SHA2561341a86f5e4cd14f0352b2f9216a6ba9f7fc6de0485955c3e4059c724bd60eef
SHA512810fff49a8c58ac202cf25cb58d075bac33a815b822355fea5b344a8811d408593ee8634eed218a1fd53d6ef6306c2114a821598303bd79123db66b0993668c0
-
Filesize
6KB
MD5afed4b65a7f13541a2cb56676e334fc3
SHA15df19fbb2d65790d0b3f0a54cfcf68d91af847cb
SHA25655efa265bc648742fcbbdc50b8dd823e1aba3477c62ca53a56d611a508c577a1
SHA51298d5cb59ac5ed2a87f50879839b016859c59f9d4821302c78f2c4715abb6c3e8cef2827d42344dec731f440c6bb2d8461122bf45494265c5022efe99989022a5
-
Filesize
114KB
MD5b3a8c60e8c704801e4daf6e244b6e877
SHA125ee5bf57eb8a45875c2ef99242c15ce574ab85a
SHA2568d4117af1d471c92da7289c2a19a57ad1bb0fd9ef4233b48c1b64d57f1d33343
SHA512007d942047e34bdb6afeefcfcca17efcdcc9a82834b32816bdab61c3fdef26213e0c61ce9ac985572cbecd694abddef68e7b89572f8a2aa8232f19130bbaeb52
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd