Analysis
-
max time kernel
1800s -
max time network
1690s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2024, 21:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://poki.com/
Resource
win10v2004-20240221-en
General
-
Target
https://poki.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133531126126805496" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4048 chrome.exe 4048 chrome.exe 2460 chrome.exe 2460 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4048 chrome.exe 4048 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4048 wrote to memory of 3060 4048 chrome.exe 83 PID 4048 wrote to memory of 3060 4048 chrome.exe 83 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4260 4048 chrome.exe 88 PID 4048 wrote to memory of 4948 4048 chrome.exe 89 PID 4048 wrote to memory of 4948 4048 chrome.exe 89 PID 4048 wrote to memory of 1956 4048 chrome.exe 90 PID 4048 wrote to memory of 1956 4048 chrome.exe 90 PID 4048 wrote to memory of 1956 4048 chrome.exe 90 PID 4048 wrote to memory of 1956 4048 chrome.exe 90 PID 4048 wrote to memory of 1956 4048 chrome.exe 90 PID 4048 wrote to memory of 1956 4048 chrome.exe 90 PID 4048 wrote to memory of 1956 4048 chrome.exe 90 PID 4048 wrote to memory of 1956 4048 chrome.exe 90 PID 4048 wrote to memory of 1956 4048 chrome.exe 90 PID 4048 wrote to memory of 1956 4048 chrome.exe 90 PID 4048 wrote to memory of 1956 4048 chrome.exe 90 PID 4048 wrote to memory of 1956 4048 chrome.exe 90 PID 4048 wrote to memory of 1956 4048 chrome.exe 90 PID 4048 wrote to memory of 1956 4048 chrome.exe 90 PID 4048 wrote to memory of 1956 4048 chrome.exe 90 PID 4048 wrote to memory of 1956 4048 chrome.exe 90 PID 4048 wrote to memory of 1956 4048 chrome.exe 90 PID 4048 wrote to memory of 1956 4048 chrome.exe 90 PID 4048 wrote to memory of 1956 4048 chrome.exe 90 PID 4048 wrote to memory of 1956 4048 chrome.exe 90 PID 4048 wrote to memory of 1956 4048 chrome.exe 90 PID 4048 wrote to memory of 1956 4048 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://poki.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f1509758,0x7ff8f1509768,0x7ff8f15097782⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1860,i,422400522270030890,14846452925404986069,131072 /prefetch:22⤵PID:4260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1860,i,422400522270030890,14846452925404986069,131072 /prefetch:82⤵PID:4948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1860,i,422400522270030890,14846452925404986069,131072 /prefetch:82⤵PID:1956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3244 --field-trial-handle=1860,i,422400522270030890,14846452925404986069,131072 /prefetch:12⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3092 --field-trial-handle=1860,i,422400522270030890,14846452925404986069,131072 /prefetch:12⤵PID:60
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 --field-trial-handle=1860,i,422400522270030890,14846452925404986069,131072 /prefetch:82⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 --field-trial-handle=1860,i,422400522270030890,14846452925404986069,131072 /prefetch:82⤵PID:2096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4852 --field-trial-handle=1860,i,422400522270030890,14846452925404986069,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2460
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59c9f94def29df95115383c20a91acfbc
SHA1693b4ceb5490f48231855e2d800a4bb40f06c7e0
SHA2562d715c0be7915f4f86c6ef8d0fd07d55e64dc6ab0d1e71ab08fa08147209735a
SHA512c00fe0870c14923811fd7e27a0293b0078dd4b52dc2b7e70f85070ef51b626cc6681e54df58cbbeac932a7a99d8a3397f8992621708451f8199f406027e61e4a
-
Filesize
1KB
MD588b94dc0ef8b6d7510435199369f0310
SHA10c415292f37cf08c3feeb5241201a19b2511cdfa
SHA25633f404dbe9f6115f5a98ce4e4069d62a8cd2374bc766d556660c5d766fb5ff72
SHA51270a22586dc3b81d362662d52136aaf3000eef0148d2c3883140143f4d021a0f9a826aca42c986f6a862c0cd99e391e46fc0d0562b296d94d893367db26eceb70
-
Filesize
1KB
MD57dae3c0b8177c0d7da86d33b7725286b
SHA13c571adc41e114910e596ff3083bff38563d2d27
SHA2561088ea883cf8b543b28f7f7a59c211056ca175952cae4c2f1dafaea2c205046d
SHA51241c7a1306318f3aaacf7f8cf9afbd397d490db9dbd418dfc86320e07170566950acd51e1f23d7ad492a7ccd26df2dc8f8f8c0c24aeae22272859d4c889df1830
-
Filesize
1KB
MD5226cdbe23c5fae0a301cff2b663238b2
SHA1389949782def0fceb07f0256081952c3c1e1bc1e
SHA256db3b57ffc1734023a974f68806523b7028c6ce06e75999afa164f92da251cfea
SHA5126657c947c7353031a4e76e11e3d4c7c0a2973f3e0c0b9ee63ce940b40cc34aa690a626bd708bc6769b5677916d2b7b2eac00cc33e32313c0f196fb7e65be3317
-
Filesize
1KB
MD5554ef838c659868225aaf9e809ee91e7
SHA19454903fc56a02d2249cd82d2b19d6da5c7e74a2
SHA25641eb2be703cfb117239280e7d8e315e4b98bcc6df0b291245f191cd206219dff
SHA512c0a5fd0c262820af5b0bdff34ecf0e9d385718dfbc4b305689b8f99048dd50f02a6b29b49b987eb95dfe946fb0f162adaec8d33147e1f66d98aaa0b685d9888f
-
Filesize
1KB
MD5bea9fa5274141578ae5b0c3fd750e5ec
SHA18148df9b7114b065c950449e2d3023a30ec89a20
SHA25664195369a658ac13c15855d6600f3c492babec7aabca7f3b86396f9c8f49415f
SHA512f3db4e9bdeaf788080f2b44194605892c37eddda456b4152fce9d7b57651c79b4f8a4f4900f40cb1d22dfd4ecd95dd425e336852de38780eacdb2646ca2614fe
-
Filesize
1KB
MD5d07be8f3d5fc6e61bad5d1946cae0a40
SHA1d15aa68fd18c4870e780a65f0b73e28147cb1225
SHA256e4e4d9a9a421b25681665516fa109af46fea96f0d835a880892fd9a952cde8e4
SHA512ea275d4ac2d80e268cf8eb34c871f0648ce2ee4e0b86cf6e55a32310a8caba83f1fdb925f91066a77ac60c53edcac88fe53fc5835f6abbae4ba397dd8d5782b7
-
Filesize
369B
MD52c3e088700e6a21b1724ab9962f6df9e
SHA1094b9db76ff233135a1ba07101e8b56769e9dca5
SHA2561fd2f86dd845dc607edcedb5df5b8e5f60f72ad6176818461d93397da149f77c
SHA512f3e075011a3239e0bd8b6337c74d055be9ef52dd36474f1ecedb92dcdf53a79ec8a48950f4a0290815f85e76235e7ca6363d18cf3ac8b9cf48a909e7a1e4a3fb
-
Filesize
5KB
MD5b9bf44ff19e1a629137470aa4cc44442
SHA115f683b9017d87308eb38289c187bda746c8d67c
SHA256ba70c2524a14bf6cd22a879bcd026a2f9839a8f021d224a870299183fa1c20fd
SHA512b6dbeed46d5365274530b0df16a48bc697522d080b88b46aea9d25726f192dcc0953ee5bf9a0c160311295c288b597a284c76a45b12d56d8f5a559ef23a89fa2
-
Filesize
5KB
MD54b6895eb239d2c1f23a2de2deba12d07
SHA127607a222dbabb5016704324e554a75476eb8076
SHA25654d01fcdf13b846b66a1404e8bc94985e8e6fc213e4d26ceee40c6ee32b9d252
SHA51252914d194f75f7c88dad2d4f9016bee153b625da6ec763a8b12ec695eab5d7feef73e7865993abc141ca1b3929727008578e30b1ab138e077cc4f75db5e36989
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\c4a38ee3-e74c-49bb-885b-c89614a34770.tmp
Filesize5KB
MD5d87632a5b390ee49359d6c3d6982a736
SHA15e3c23b76bee82f79b92edc18db4097577b5ab77
SHA256f02d580d72729da7ace4ecfc84aa125dfb50a0fd8b1c8c704efc6879c00205de
SHA5121ad38f7de2f1c3623f49319956e4aeb0b824f2d1620b1955d05fca39488b5c51db350bab425927ee8ddd6e1efe9f4fa80ced63506e811efc29ff0c99e5c4ecf0
-
Filesize
130KB
MD50e91e079e05de84196947639f4847ba3
SHA1eaeb41b97298c47b1604e633f254da2c45468c11
SHA256a224b4e791a6902c50093bc411257e0a4122b26f985f5bad0f778c87a1240bb0
SHA512b42100ea6854708bd705bd8a1111c24bd04ce60ba965d696ebe676d56f7a9a95716805961b75fb35e79e2cc510f3b25f45e89b110575c46320e50bb9e179d807
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd