Analysis
-
max time kernel
25s -
max time network
24s -
platform
windows10-2004_x64 -
resource
win10v2004-20240220-it -
resource tags
arch:x64arch:x86image:win10v2004-20240220-itlocale:it-itos:windows10-2004-x64systemwindows -
submitted
21/02/2024, 09:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.xbox.com/xbox-game-pass/pc-game-pass?ocid=XGP_inp_rmc_xbo_SPO_valp-boost&form=M402JX
Resource
win10v2004-20240220-it
General
-
Target
https://www.xbox.com/xbox-game-pass/pc-game-pass?ocid=XGP_inp_rmc_xbo_SPO_valp-boost&form=M402JX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133529813889068539" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4504 chrome.exe 4504 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4504 wrote to memory of 2360 4504 chrome.exe 68 PID 4504 wrote to memory of 2360 4504 chrome.exe 68 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 3524 4504 chrome.exe 90 PID 4504 wrote to memory of 2268 4504 chrome.exe 91 PID 4504 wrote to memory of 2268 4504 chrome.exe 91 PID 4504 wrote to memory of 4216 4504 chrome.exe 92 PID 4504 wrote to memory of 4216 4504 chrome.exe 92 PID 4504 wrote to memory of 4216 4504 chrome.exe 92 PID 4504 wrote to memory of 4216 4504 chrome.exe 92 PID 4504 wrote to memory of 4216 4504 chrome.exe 92 PID 4504 wrote to memory of 4216 4504 chrome.exe 92 PID 4504 wrote to memory of 4216 4504 chrome.exe 92 PID 4504 wrote to memory of 4216 4504 chrome.exe 92 PID 4504 wrote to memory of 4216 4504 chrome.exe 92 PID 4504 wrote to memory of 4216 4504 chrome.exe 92 PID 4504 wrote to memory of 4216 4504 chrome.exe 92 PID 4504 wrote to memory of 4216 4504 chrome.exe 92 PID 4504 wrote to memory of 4216 4504 chrome.exe 92 PID 4504 wrote to memory of 4216 4504 chrome.exe 92 PID 4504 wrote to memory of 4216 4504 chrome.exe 92 PID 4504 wrote to memory of 4216 4504 chrome.exe 92 PID 4504 wrote to memory of 4216 4504 chrome.exe 92 PID 4504 wrote to memory of 4216 4504 chrome.exe 92 PID 4504 wrote to memory of 4216 4504 chrome.exe 92 PID 4504 wrote to memory of 4216 4504 chrome.exe 92 PID 4504 wrote to memory of 4216 4504 chrome.exe 92 PID 4504 wrote to memory of 4216 4504 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.xbox.com/xbox-game-pass/pc-game-pass?ocid=XGP_inp_rmc_xbo_SPO_valp-boost&form=M402JX1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8d779758,0x7ffd8d779768,0x7ffd8d7797782⤵PID:2360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1872,i,13486694486257274377,8555941644611053082,131072 /prefetch:22⤵PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1872,i,13486694486257274377,8555941644611053082,131072 /prefetch:82⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1872,i,13486694486257274377,8555941644611053082,131072 /prefetch:82⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2876 --field-trial-handle=1872,i,13486694486257274377,8555941644611053082,131072 /prefetch:12⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2868 --field-trial-handle=1872,i,13486694486257274377,8555941644611053082,131072 /prefetch:12⤵PID:4444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3892 --field-trial-handle=1872,i,13486694486257274377,8555941644611053082,131072 /prefetch:12⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5112 --field-trial-handle=1872,i,13486694486257274377,8555941644611053082,131072 /prefetch:82⤵PID:4028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2880 --field-trial-handle=1872,i,13486694486257274377,8555941644611053082,131072 /prefetch:12⤵PID:3224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5044 --field-trial-handle=1872,i,13486694486257274377,8555941644611053082,131072 /prefetch:12⤵PID:4952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4996 --field-trial-handle=1872,i,13486694486257274377,8555941644611053082,131072 /prefetch:12⤵PID:392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 --field-trial-handle=1872,i,13486694486257274377,8555941644611053082,131072 /prefetch:82⤵PID:1556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 --field-trial-handle=1872,i,13486694486257274377,8555941644611053082,131072 /prefetch:82⤵PID:4284
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3936
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3f4 0x3f81⤵PID:4328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5e62734f5d1f12fd9f6aa0d6632787395
SHA1bfbde526762a27feab75cc188213bc4dfc0864c7
SHA2568bac3d19c208ec56f331e6b1219c49b9baf3536804b8e222a97729ff63e9c86e
SHA5121c711951a9471ec314cc3879a3a8db5c01036028c7bdb3603a2966376f9ceeb7149b231ee07bbc25a2570500c0418440ee00617e073d7a6086b0e28602742740
-
Filesize
1KB
MD5bc8b32835b850c24e8f4ca37a98a7155
SHA1c3277d3b2a95255c1f73931e777dc619638e57e3
SHA2568f5d15b5150832282666a343df05271aa117d4b60e29edd6806f65f5e5493fd8
SHA512a7a33f7c47d64ba9f890128b948b8263ea856c8298505da05afb1061c97b5f8e8ffeb9d6b7012a03aef44543f3ff4a05bf6145df1326790bd173b6cd2b47e7ce
-
Filesize
6KB
MD5732d2330ed5dc3a89b90ce6c01b1f142
SHA108427494e86c77323f6acd0e0f069719dacfe110
SHA25624c1966e2c809a06820c0a31a12fad9df3662b3632a1a1f3c806b4c52a6c7a79
SHA512ffc800623f4086aa3fd21184ef7a69fd3c1e947e148ad49eaee44ed0c6b49d08672f384ab6b4224fa3df22fcd8dfd9ee365c416ad52e97562f9c09476dbea5ae
-
Filesize
130KB
MD50e923184c6585e2496303f4354ad7ffe
SHA19ac91c807ec9b32f1069acbf509c03d3a5667df0
SHA256901c4e5edd876dc828683820405c13de3b39649bb99ab0df9710a93823e65f47
SHA512f995b32ef7258082bed27d85d9ce7f1edacf32561eb2fbd0061d8b37d2912f2a8eab0a2c01acf97b36924a5c8773be1499ea3bfe2a3207dc9eb7a654c0c0266c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd