Analysis
-
max time kernel
47s -
max time network
39s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
22/02/2024, 10:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://99gkf.r.a.d.sendibm1.com/mk/cl/f/sh/7nVU1aA2nfwFS2HPE8IkYsFasrCyd7d/C4LJHRhZPMkJ
Resource
win11-20240221-en
General
-
Target
https://99gkf.r.a.d.sendibm1.com/mk/cl/f/sh/7nVU1aA2nfwFS2HPE8IkYsFasrCyd7d/C4LJHRhZPMkJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4912 chrome.exe 4912 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4912 wrote to memory of 4432 4912 chrome.exe 38 PID 4912 wrote to memory of 4432 4912 chrome.exe 38 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1756 4912 chrome.exe 82 PID 4912 wrote to memory of 1544 4912 chrome.exe 83 PID 4912 wrote to memory of 1544 4912 chrome.exe 83 PID 4912 wrote to memory of 1876 4912 chrome.exe 84 PID 4912 wrote to memory of 1876 4912 chrome.exe 84 PID 4912 wrote to memory of 1876 4912 chrome.exe 84 PID 4912 wrote to memory of 1876 4912 chrome.exe 84 PID 4912 wrote to memory of 1876 4912 chrome.exe 84 PID 4912 wrote to memory of 1876 4912 chrome.exe 84 PID 4912 wrote to memory of 1876 4912 chrome.exe 84 PID 4912 wrote to memory of 1876 4912 chrome.exe 84 PID 4912 wrote to memory of 1876 4912 chrome.exe 84 PID 4912 wrote to memory of 1876 4912 chrome.exe 84 PID 4912 wrote to memory of 1876 4912 chrome.exe 84 PID 4912 wrote to memory of 1876 4912 chrome.exe 84 PID 4912 wrote to memory of 1876 4912 chrome.exe 84 PID 4912 wrote to memory of 1876 4912 chrome.exe 84 PID 4912 wrote to memory of 1876 4912 chrome.exe 84 PID 4912 wrote to memory of 1876 4912 chrome.exe 84 PID 4912 wrote to memory of 1876 4912 chrome.exe 84 PID 4912 wrote to memory of 1876 4912 chrome.exe 84 PID 4912 wrote to memory of 1876 4912 chrome.exe 84 PID 4912 wrote to memory of 1876 4912 chrome.exe 84 PID 4912 wrote to memory of 1876 4912 chrome.exe 84 PID 4912 wrote to memory of 1876 4912 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://99gkf.r.a.d.sendibm1.com/mk/cl/f/sh/7nVU1aA2nfwFS2HPE8IkYsFasrCyd7d/C4LJHRhZPMkJ1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9c9139758,0x7ff9c9139768,0x7ff9c91397782⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1820,i,3013222413665497739,12237364124204656248,131072 /prefetch:22⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1820,i,3013222413665497739,12237364124204656248,131072 /prefetch:82⤵PID:1544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2152 --field-trial-handle=1820,i,3013222413665497739,12237364124204656248,131072 /prefetch:82⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2140 --field-trial-handle=1820,i,3013222413665497739,12237364124204656248,131072 /prefetch:12⤵PID:4704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2944 --field-trial-handle=1820,i,3013222413665497739,12237364124204656248,131072 /prefetch:12⤵PID:4076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4464 --field-trial-handle=1820,i,3013222413665497739,12237364124204656248,131072 /prefetch:12⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4460 --field-trial-handle=1820,i,3013222413665497739,12237364124204656248,131072 /prefetch:12⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4948 --field-trial-handle=1820,i,3013222413665497739,12237364124204656248,131072 /prefetch:12⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4524 --field-trial-handle=1820,i,3013222413665497739,12237364124204656248,131072 /prefetch:82⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 --field-trial-handle=1820,i,3013222413665497739,12237364124204656248,131072 /prefetch:82⤵PID:1412
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384B
MD556f47f417ec8174a0746b9a99e16b4db
SHA1d0b5429558719879acb7b36c23cad50972338b5e
SHA2563240db5f762e054ef87fedd12b66b4bd68d728b7d7db0f4fe667535b3e1c1b0f
SHA512df86db67b431ed991e7aa5b4c4b4877cfd83dc16639334f60a0e5c1b1eb7f27c3c5463050d1c8fac77955ca94a316fe691c472ca2ab4815b956b5319ad4e7780
-
Filesize
1KB
MD52debd648dc6a4932fcfaafa46edbc881
SHA1f507bd9ee4a60e5f27a6996f50324c85881642a6
SHA25612c3b87b019958338eb5ee20500c32350ed6ba09db6c9db754afaef96a17e561
SHA5121ea07130de5cd1d8d8624eed08539a58782cc9f571a1c48b1e1ac2e30f800757b75005e47a5b49f9293511c92fdd6eccf7b51c9ab6e5a706be11700ccbd15df5
-
Filesize
1KB
MD5b5826ab4d93855c717963e54392bee07
SHA1c7492ac84a5c0e9dcb682189fdab030f375c73e6
SHA25660446b56e56422ce8a57bde40532d98428159ee65667ae5077c3bcdedd7ce516
SHA5123e8dee8174987be63e743381f2d7786a604ed2fe0a0022d04a962c252819fb0bac52384ff148352bc2eac82698b8e5862d4065ee23e96c0914ec58ada8a8be76
-
Filesize
1KB
MD5e3a48c5ddd5ac996dd02601a0fe8d1db
SHA1e8dde4337bb5a8612eb0e0e87a278d32689367ec
SHA256a9865f7e7bd5eab4f8378f84866e863e33cc407994aaf9f297a75ba005a736c9
SHA512d2b89a8346119c949123653162fb2064f241e8950a6c5eb9d3c64149baac313ce7afd2065e11b299b3e6433274d1ecd21dc063a634a595fb94eed28067145f3f
-
Filesize
6KB
MD5ed75ab2d46e5e6eadecadd5e48306383
SHA1b0cfdaca2aad18f050fa727cb061b8575e15543d
SHA2560330d55c5e8747f6ef758b36f4a9e16f33cba08ae2813b017b186d7a8ae84a0f
SHA5123859628c7b261421e448478a76ad8e0c6f86e491a27174034a1661b8ba1c8bf6eeda6e71c33560333c265677b815b7227b98ba5e9b8f76735a704ec51b749575
-
Filesize
130KB
MD5747d11c2e36e1d8a4a1a0359ccb709c5
SHA1a03567b9980ba7d92c8765827194e200d96ca7a2
SHA2567fd162ca8ab7d762c018123ff64705a0b4886905ff6d39e0207eb19037d674d4
SHA5125b0746d301592cb0740e117414be4ec9406b4932a9f95dad65cd5b2b9201de1839bca0c82b8db2c9e7c7b58b4341f9991eae5bd60fb9de8c06d4249294833e57
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd