Analysis
-
max time kernel
149s -
max time network
159s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
23-02-2024 17:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://protect-us.mimecast.com/s/iTYCCVOyVZF0pkyvwUGfGmb?domain=tonybutti.bubbleapps.io/
Resource
win11-20240221-en
General
-
Target
https://protect-us.mimecast.com/s/iTYCCVOyVZF0pkyvwUGfGmb?domain=tonybutti.bubbleapps.io/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133531834930525040" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3852 chrome.exe 3852 chrome.exe 2680 chrome.exe 2680 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3852 chrome.exe 3852 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe Token: SeShutdownPrivilege 3852 chrome.exe Token: SeCreatePagefilePrivilege 3852 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe 3852 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3852 wrote to memory of 928 3852 chrome.exe 78 PID 3852 wrote to memory of 928 3852 chrome.exe 78 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 2376 3852 chrome.exe 80 PID 3852 wrote to memory of 4168 3852 chrome.exe 82 PID 3852 wrote to memory of 4168 3852 chrome.exe 82 PID 3852 wrote to memory of 360 3852 chrome.exe 81 PID 3852 wrote to memory of 360 3852 chrome.exe 81 PID 3852 wrote to memory of 360 3852 chrome.exe 81 PID 3852 wrote to memory of 360 3852 chrome.exe 81 PID 3852 wrote to memory of 360 3852 chrome.exe 81 PID 3852 wrote to memory of 360 3852 chrome.exe 81 PID 3852 wrote to memory of 360 3852 chrome.exe 81 PID 3852 wrote to memory of 360 3852 chrome.exe 81 PID 3852 wrote to memory of 360 3852 chrome.exe 81 PID 3852 wrote to memory of 360 3852 chrome.exe 81 PID 3852 wrote to memory of 360 3852 chrome.exe 81 PID 3852 wrote to memory of 360 3852 chrome.exe 81 PID 3852 wrote to memory of 360 3852 chrome.exe 81 PID 3852 wrote to memory of 360 3852 chrome.exe 81 PID 3852 wrote to memory of 360 3852 chrome.exe 81 PID 3852 wrote to memory of 360 3852 chrome.exe 81 PID 3852 wrote to memory of 360 3852 chrome.exe 81 PID 3852 wrote to memory of 360 3852 chrome.exe 81 PID 3852 wrote to memory of 360 3852 chrome.exe 81 PID 3852 wrote to memory of 360 3852 chrome.exe 81 PID 3852 wrote to memory of 360 3852 chrome.exe 81 PID 3852 wrote to memory of 360 3852 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://protect-us.mimecast.com/s/iTYCCVOyVZF0pkyvwUGfGmb?domain=tonybutti.bubbleapps.io/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc719d9758,0x7ffc719d9768,0x7ffc719d97782⤵PID:928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1572 --field-trial-handle=1832,i,14196987197417769641,17084762153853226802,131072 /prefetch:22⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2172 --field-trial-handle=1832,i,14196987197417769641,17084762153853226802,131072 /prefetch:82⤵PID:360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1832,i,14196987197417769641,17084762153853226802,131072 /prefetch:82⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3148 --field-trial-handle=1832,i,14196987197417769641,17084762153853226802,131072 /prefetch:12⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1832,i,14196987197417769641,17084762153853226802,131072 /prefetch:12⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4720 --field-trial-handle=1832,i,14196987197417769641,17084762153853226802,131072 /prefetch:82⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 --field-trial-handle=1832,i,14196987197417769641,17084762153853226802,131072 /prefetch:82⤵PID:4088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3836 --field-trial-handle=1832,i,14196987197417769641,17084762153853226802,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2680
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD544419a81b99c4a91a406d0a1e106eb12
SHA1fd23dc0d6fa253de4ffe06297db5302cff06250e
SHA25677cf34ec326fbcc7e03d15e1d57cb48c1aa3a1e330f8511a2bf12db289c87e81
SHA5121f84d88ef8a3b829395d75d882c78dae474e9c12e02a9569fab03111feedc88f3e54e9a9b993092dec0e3dfa7fb9e3eb8c47fdf083ed62013e98874a36f0fd94
-
Filesize
705B
MD53ef3112bfd10091e136c5973c0852c25
SHA139a6ffe55d5b682bedf2381f9ff9edc0b3fa69e5
SHA256fd58e1e53df31702eba2d4b284258d393955c11834e1edb23d9bc84a5bb543bf
SHA512a49ab2ecbc9d9f0a3d71221a88355bff1b156070f8d82c5b276af185e3265b9f288a5bd2c5d5cbe7eafbee88589b5c720813dcb652ec770c27450acad77ad8ba
-
Filesize
5KB
MD570ebb2eb90c43ea4f51979096c150c75
SHA14c0405934ca56d5c3964bd12473d645f8be59dae
SHA2568b01ef64f02651f5e965a63d2c79801f029feb888061bf0ce7a977604297fda4
SHA51243965600c24d2f7396f60e76054830cb43dc7ba37a9a8688d467351731587426abeba0d7b62d7981771df6d91b335d7a6ea93fd2f5e28c0d0f9b6bc5bb3e168a
-
Filesize
5KB
MD5ecc774a2b469788fcaf97cdfe114ab94
SHA1e08faa5ad8823514f6549535bbbfe83ac3c821b7
SHA256cfb221e4cf8ec620b2a5d89d1b4a39580c1986546ef706ee3b6a7c80bda7c901
SHA5123327ef145bb352adee50eb3308f6abe991b2ad73be866947710df5bb6166ca125a34469d736cc8a3ee69358a25ea925601faea03bfff23cff709e22f412d2dea
-
Filesize
6KB
MD5cb4a65375786c92b63b699103aabefa5
SHA1057f04f9597cdb0c251890c1ad8ac3aedd5eee26
SHA256c868adc22621abe55cbc57f5c872a6248797a5d62e6a0670aee409fc9c43293b
SHA512bba9318fd46fabbec12a6584622569a6c1675ee151dad966c0bb6a2fe018401be64b8c8b9a19b85028a54a09e68b72a834d387f48c55be9465bf9eb2bf460aac
-
Filesize
130KB
MD586580c46a683ec9f61d03c2268db895d
SHA1a60767868a0ee59acb81a85b49b1714fb10d998c
SHA256a699ec7664aca5a776696a4fc0509ed167dd5b9d4bf7abaaa7d9d6536d8e3101
SHA512f912091b77fb28491fb62c96db8c55372d0cb1af4b8ab4bec612107d8b22a152e20153e52b7ea3a13ae64a97da3f5b5904012d6df482dcb124cdca67e085c6e6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd