Analysis
-
max time kernel
1809s -
max time network
1709s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-02-2024 14:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://brightvpn.com/
Resource
win10v2004-20240221-en
General
-
Target
https://brightvpn.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133532584783382531" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2316 chrome.exe 2316 chrome.exe 320 chrome.exe 320 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2316 chrome.exe 2316 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe Token: SeShutdownPrivilege 2316 chrome.exe Token: SeCreatePagefilePrivilege 2316 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe 2316 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 3648 2316 chrome.exe 37 PID 2316 wrote to memory of 3648 2316 chrome.exe 37 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 1572 2316 chrome.exe 91 PID 2316 wrote to memory of 3064 2316 chrome.exe 92 PID 2316 wrote to memory of 3064 2316 chrome.exe 92 PID 2316 wrote to memory of 1000 2316 chrome.exe 93 PID 2316 wrote to memory of 1000 2316 chrome.exe 93 PID 2316 wrote to memory of 1000 2316 chrome.exe 93 PID 2316 wrote to memory of 1000 2316 chrome.exe 93 PID 2316 wrote to memory of 1000 2316 chrome.exe 93 PID 2316 wrote to memory of 1000 2316 chrome.exe 93 PID 2316 wrote to memory of 1000 2316 chrome.exe 93 PID 2316 wrote to memory of 1000 2316 chrome.exe 93 PID 2316 wrote to memory of 1000 2316 chrome.exe 93 PID 2316 wrote to memory of 1000 2316 chrome.exe 93 PID 2316 wrote to memory of 1000 2316 chrome.exe 93 PID 2316 wrote to memory of 1000 2316 chrome.exe 93 PID 2316 wrote to memory of 1000 2316 chrome.exe 93 PID 2316 wrote to memory of 1000 2316 chrome.exe 93 PID 2316 wrote to memory of 1000 2316 chrome.exe 93 PID 2316 wrote to memory of 1000 2316 chrome.exe 93 PID 2316 wrote to memory of 1000 2316 chrome.exe 93 PID 2316 wrote to memory of 1000 2316 chrome.exe 93 PID 2316 wrote to memory of 1000 2316 chrome.exe 93 PID 2316 wrote to memory of 1000 2316 chrome.exe 93 PID 2316 wrote to memory of 1000 2316 chrome.exe 93 PID 2316 wrote to memory of 1000 2316 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://brightvpn.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffecf829758,0x7ffecf829768,0x7ffecf8297782⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1864,i,634275372256131781,5973259818161153050,131072 /prefetch:22⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1864,i,634275372256131781,5973259818161153050,131072 /prefetch:82⤵PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1728 --field-trial-handle=1864,i,634275372256131781,5973259818161153050,131072 /prefetch:82⤵PID:1000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2980 --field-trial-handle=1864,i,634275372256131781,5973259818161153050,131072 /prefetch:12⤵PID:4192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=1864,i,634275372256131781,5973259818161153050,131072 /prefetch:12⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 --field-trial-handle=1864,i,634275372256131781,5973259818161153050,131072 /prefetch:82⤵PID:1568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4568 --field-trial-handle=1864,i,634275372256131781,5973259818161153050,131072 /prefetch:82⤵PID:1068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2332 --field-trial-handle=1864,i,634275372256131781,5973259818161153050,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:320
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
624B
MD58d4b005efadf4cb9d3846a600e5a9f6e
SHA12a1a563646a2977235376165ba3bd6706f4fb902
SHA25643b9b8b1e10e3df6685138b08b2734f1fac48d6bbf7b41beb8477a00c753db48
SHA5120773f9bba45c98dfbd7e6dbdc8be5c036bfdbe01eb6bf603e92e0a00f9e4282e85fdedea85116fbefc7868687621a2ace2280c95212c82b1b3ca0a075c6ddb29
-
Filesize
1KB
MD5e0700462005adbd87d81d65dc7746e49
SHA19912f9a8302cdcaf1bd59934b68721b25bffe521
SHA25614cfe219612c081ea3a7dc42033f1c7208ef9a2495ab279ab0ce523d14af37c5
SHA5122582b14a5065f634b8425d63eb391adce586fcb7000fd9d65a98897fd1e261005775f2add487d74e55524251b74d67836851fbb1d6d0fcf6760aa5729a0f9668
-
Filesize
539B
MD5ff3fb3ad74f3c8ddfc307104163da665
SHA189f04d0b5074760ccaeaae9ab98951acc7d29156
SHA256326d5447eeba15a85347786c7c9447a50124fabc16388123300d5945e31f3969
SHA512c841b8e74139f6efb2643e4c67e115ecd39c2df9436c54d49061b4a71c29427eb0fc3907b62e529cd1682ee3b8797bd27c3b515a3e5eee7182ce3deeb1fd295e
-
Filesize
539B
MD50a3ac24f9cc7fa0e5930763b92efa779
SHA13ca188375cded55f233f88300edf9fc4a3e00b92
SHA2563e79961882911cac9d139ae5292ca18028bd33964bef0333eaaab25a712ab738
SHA5125ce98cc170c0703b21a4ad41e13536f270a239e1c897bb7bc9e3cf73461734f7997e5e5b2bcf92aa82cbcaa783d7afe8d82ab730d5b2d8a901459728af7ad790
-
Filesize
6KB
MD54f44a5934a9e9e38fe0d3cffe87628fa
SHA167af6461c2868a4679c800c393581d0470c0a82d
SHA256de7b9e62f8d4f8a4841d1e393ca1ba4c86bb5c11781ec284637cfa3df10ac0f5
SHA5123331c7f1b888500c06f050719f465cf0bb837184e829bab669338dc10b52352fa87cab2b77bfab3aa8a01ffa86c659d4575cbcc82f52a516fa4e0bb6444ea362
-
Filesize
130KB
MD56c4141704af55647529d0049621428d9
SHA181cdbb4ee7a36355f7118aa3f2ad3e74dc3f1b84
SHA25641388db65cbcfa8b8a023cbd364c98b72d037ec03839e82a547f218f7966d52f
SHA5125c7658e2c52603ccb0f46520e04b71bef3b5749b62c82f8e29afa21c05bef3d2e67798b012d5d0cd2133c89370716bdfd15940f1f823afc4d82ff09b3cbcb5c2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd