Analysis
-
max time kernel
300s -
max time network
247s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-02-2024 00:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gate.sc/?url=https%3A%2F%2F4flixs5.blogspot.com%2Ftv%2F241002-1-1%2FT103119&token=94288d-1-1705058821226
Resource
win10v2004-20240221-en
General
-
Target
https://gate.sc/?url=https%3A%2F%2F4flixs5.blogspot.com%2Ftv%2F241002-1-1%2FT103119&token=94288d-1-1705058821226
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133532083420479558" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4564 chrome.exe 4564 chrome.exe 2876 chrome.exe 2876 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4564 wrote to memory of 4040 4564 chrome.exe 85 PID 4564 wrote to memory of 4040 4564 chrome.exe 85 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 2836 4564 chrome.exe 90 PID 4564 wrote to memory of 3276 4564 chrome.exe 91 PID 4564 wrote to memory of 3276 4564 chrome.exe 91 PID 4564 wrote to memory of 228 4564 chrome.exe 94 PID 4564 wrote to memory of 228 4564 chrome.exe 94 PID 4564 wrote to memory of 228 4564 chrome.exe 94 PID 4564 wrote to memory of 228 4564 chrome.exe 94 PID 4564 wrote to memory of 228 4564 chrome.exe 94 PID 4564 wrote to memory of 228 4564 chrome.exe 94 PID 4564 wrote to memory of 228 4564 chrome.exe 94 PID 4564 wrote to memory of 228 4564 chrome.exe 94 PID 4564 wrote to memory of 228 4564 chrome.exe 94 PID 4564 wrote to memory of 228 4564 chrome.exe 94 PID 4564 wrote to memory of 228 4564 chrome.exe 94 PID 4564 wrote to memory of 228 4564 chrome.exe 94 PID 4564 wrote to memory of 228 4564 chrome.exe 94 PID 4564 wrote to memory of 228 4564 chrome.exe 94 PID 4564 wrote to memory of 228 4564 chrome.exe 94 PID 4564 wrote to memory of 228 4564 chrome.exe 94 PID 4564 wrote to memory of 228 4564 chrome.exe 94 PID 4564 wrote to memory of 228 4564 chrome.exe 94 PID 4564 wrote to memory of 228 4564 chrome.exe 94 PID 4564 wrote to memory of 228 4564 chrome.exe 94 PID 4564 wrote to memory of 228 4564 chrome.exe 94 PID 4564 wrote to memory of 228 4564 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://gate.sc/?url=https%3A%2F%2F4flixs5.blogspot.com%2Ftv%2F241002-1-1%2FT103119&token=94288d-1-17050588212261⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa9a7b9758,0x7ffa9a7b9768,0x7ffa9a7b97782⤵PID:4040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1848,i,18358821457270348175,8061183196544162336,131072 /prefetch:22⤵PID:2836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1848,i,18358821457270348175,8061183196544162336,131072 /prefetch:82⤵PID:3276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2868 --field-trial-handle=1848,i,18358821457270348175,8061183196544162336,131072 /prefetch:12⤵PID:3332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2860 --field-trial-handle=1848,i,18358821457270348175,8061183196544162336,131072 /prefetch:12⤵PID:3316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2172 --field-trial-handle=1848,i,18358821457270348175,8061183196544162336,131072 /prefetch:82⤵PID:228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4588 --field-trial-handle=1848,i,18358821457270348175,8061183196544162336,131072 /prefetch:12⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3092 --field-trial-handle=1848,i,18358821457270348175,8061183196544162336,131072 /prefetch:82⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4812 --field-trial-handle=1848,i,18358821457270348175,8061183196544162336,131072 /prefetch:82⤵PID:888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1840 --field-trial-handle=1848,i,18358821457270348175,8061183196544162336,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2876
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD536f7d624068b46e9faa14f0c3df0e071
SHA153fef022ebcea6a87f2ed1a71e2ed1282adb6aee
SHA25619ac174a349898fb404e4124aa9e63fa524b27376f523a7c28af7d82a4926460
SHA5123a45ecd38efc6f7d06c83a56084e2ba5fe8f6ef5555767438ba385021dd9ddbfcc98c1561bde3914d2597b050024c63f06d7ceaf579d1b57c04e8db70c8a1ea7
-
Filesize
538B
MD5337161f0bc5897945e3781db5eeb1369
SHA1b7f51427846168731a15f82352ab54134c20c37a
SHA256ec44f332f6b1edf9da35c6035c574f94570047b6f89f677d77b0230e904d7b1f
SHA51216018f27e1bda2e0bde9dde8b36da688d81501598a0635e79a68271e923f27f9ae60d39190b5e20660c387d0bd5c601d56c8089b62c770bf7eb245f1571bfe72
-
Filesize
6KB
MD588edf8f0082113447a6bef6c83ea5191
SHA1de80524f00c6540a87f4046a2370647b27f85f1c
SHA2568fefd930fa700bb09fd46a17d4b81575188c9f587e2f38283b22a13c4e2a90b4
SHA5124ab430f61139769cf4b53fee5af8f193a339ceb3f18f745eb80b8f7604e1fe26befeca5ca0163973355bd0e0bed01356319838006828eb3908c295dae0a68680
-
Filesize
6KB
MD5a15adbb6fa6de6363885aec47a6c1480
SHA18c0e87e70dac28b7363543207eb72606724480e7
SHA256e94f8bd59b8a3f2cde454ef7936871c4dc9c3975871e6cd04ce816c58ed8a94c
SHA512e93a53107d4043197401967653c336b53311961b9efe7f97c3aaf66a5c15fa7537a367878bea2d5dc7f101c7502b5a5d6df49547e2832e9602c29bff7af29ede
-
Filesize
130KB
MD557b0eaf92fbc7c98cdeca45714650e6e
SHA181f335c186794abbfa21f2aee2a1ba1066088039
SHA256681279d65dd24fcd07576dfd54bb1be68c091d568b10c4b640a8a46ff6d800a8
SHA5120c14847e64ddab1f5fc6d2a5d2f0a51cf059fbf8ab8ad975a49e2f9f3c3194258594de975283e8bef4fa5584dae336db149e48b0c44efff4a77f9aca895367c4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd