Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 01:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.shootdoll.best/pfkwon/vbbn2016kekesla/4auYJyaqnaTXo9mOaxPwO6SeoOuXindKq2mY_M4P85Q/YQLZajIzUGcwJ6vy1LmUEqAUidyKOOcxcWek0MJPHdg
Resource
win10v2004-20240226-en
General
-
Target
http://www.shootdoll.best/pfkwon/vbbn2016kekesla/4auYJyaqnaTXo9mOaxPwO6SeoOuXindKq2mY_M4P85Q/YQLZajIzUGcwJ6vy1LmUEqAUidyKOOcxcWek0MJPHdg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133535558054000806" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1460 chrome.exe 1460 chrome.exe 212 chrome.exe 212 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1460 wrote to memory of 5028 1460 chrome.exe 47 PID 1460 wrote to memory of 5028 1460 chrome.exe 47 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 4108 1460 chrome.exe 93 PID 1460 wrote to memory of 2228 1460 chrome.exe 94 PID 1460 wrote to memory of 2228 1460 chrome.exe 94 PID 1460 wrote to memory of 4148 1460 chrome.exe 95 PID 1460 wrote to memory of 4148 1460 chrome.exe 95 PID 1460 wrote to memory of 4148 1460 chrome.exe 95 PID 1460 wrote to memory of 4148 1460 chrome.exe 95 PID 1460 wrote to memory of 4148 1460 chrome.exe 95 PID 1460 wrote to memory of 4148 1460 chrome.exe 95 PID 1460 wrote to memory of 4148 1460 chrome.exe 95 PID 1460 wrote to memory of 4148 1460 chrome.exe 95 PID 1460 wrote to memory of 4148 1460 chrome.exe 95 PID 1460 wrote to memory of 4148 1460 chrome.exe 95 PID 1460 wrote to memory of 4148 1460 chrome.exe 95 PID 1460 wrote to memory of 4148 1460 chrome.exe 95 PID 1460 wrote to memory of 4148 1460 chrome.exe 95 PID 1460 wrote to memory of 4148 1460 chrome.exe 95 PID 1460 wrote to memory of 4148 1460 chrome.exe 95 PID 1460 wrote to memory of 4148 1460 chrome.exe 95 PID 1460 wrote to memory of 4148 1460 chrome.exe 95 PID 1460 wrote to memory of 4148 1460 chrome.exe 95 PID 1460 wrote to memory of 4148 1460 chrome.exe 95 PID 1460 wrote to memory of 4148 1460 chrome.exe 95 PID 1460 wrote to memory of 4148 1460 chrome.exe 95 PID 1460 wrote to memory of 4148 1460 chrome.exe 95
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.shootdoll.best/pfkwon/vbbn2016kekesla/4auYJyaqnaTXo9mOaxPwO6SeoOuXindKq2mY_M4P85Q/YQLZajIzUGcwJ6vy1LmUEqAUidyKOOcxcWek0MJPHdg1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa7eb59758,0x7ffa7eb59768,0x7ffa7eb597782⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1860,i,5477887451064063738,3272265725058510733,131072 /prefetch:22⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1860,i,5477887451064063738,3272265725058510733,131072 /prefetch:82⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1860,i,5477887451064063738,3272265725058510733,131072 /prefetch:82⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2876 --field-trial-handle=1860,i,5477887451064063738,3272265725058510733,131072 /prefetch:12⤵PID:944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2868 --field-trial-handle=1860,i,5477887451064063738,3272265725058510733,131072 /prefetch:12⤵PID:3636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 --field-trial-handle=1860,i,5477887451064063738,3272265725058510733,131072 /prefetch:82⤵PID:4120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4888 --field-trial-handle=1860,i,5477887451064063738,3272265725058510733,131072 /prefetch:82⤵PID:3388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4940 --field-trial-handle=1860,i,5477887451064063738,3272265725058510733,131072 /prefetch:12⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 --field-trial-handle=1860,i,5477887451064063738,3272265725058510733,131072 /prefetch:82⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5156 --field-trial-handle=1860,i,5477887451064063738,3272265725058510733,131072 /prefetch:12⤵PID:1076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2360 --field-trial-handle=1860,i,5477887451064063738,3272265725058510733,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:212
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD57bac3649843b8966da2fd4979a625bbb
SHA17464af9834fe3eb643f5d2f165b38630c527e48b
SHA256889ad73242222a9571889c90a6118844c6b91d0eca8bd728231316fe952caaa9
SHA512d64efdb6adee4f9a76e4c99c7bf25d544f3e42afba185be79535c3882bda85ce53b07577c26d6f0ab4ccceb46a441a7ef8613bd5279b6005269c2a0dfa9a992c
-
Filesize
1KB
MD562403cec009768d4ecaa311d4d2bb579
SHA147aa25faf73c7111ed064dc82c3f30b2743eddac
SHA2561bc374d7b7593813c0d77199ccb4ba2194bf72cd3fe396702f8033f0c3323a68
SHA5120cf2eea89b42af41c5410c733db5a9fab76b644fcb40d9999eee9be95f6cb43ecf841b77841a5416072320e7e23bb6fbe9c07ad05f7262fbb761e43a945e50a1
-
Filesize
538B
MD5d3ddfff0bcb651d87d28b09739da2de1
SHA1e85bbbb168a6d01798d91c4743f8ab1e59cecab4
SHA2567ce0e2588ba4e11ac960c4670eff97cf7e781ccd101fbfdf6e8a7293442b4fcd
SHA5121f4136f5591706fb6738a05681a729717b4571e9697da276ad7c0f8b3f1bbdaf3ad9aeb935d611c8a58a5553a308c9442dd214abb4a569218dd0353535dd4ff1
-
Filesize
6KB
MD56f509a905c06361c52e319ed5547f19c
SHA18235ff94e45e5e828b14756d20528489f152b939
SHA256368532a04f7138027081df5b580ce1fa7c16a01aa205f449c681337583ecac60
SHA512f58915abdf7a1216f0a138a2bcdf15cf0928bf124cdd158d985590dbd3ac99f40da7648f0eb27121406e48408b46376c954ca98202e0be0a71eafd21ff42ff44
-
Filesize
6KB
MD5a6fcff530bd6c466353348f98fc4ad29
SHA1f6f6094baf341974faa2d2bb5257e35949baa97a
SHA2564e3928fb72c1983a12653b4a2b7e1c08717a7bec28801b48461c57ee86d4da49
SHA5128936b5c9b903697dca113f346660d2897935cc3b413cf0140cab3d4678dfc471422b53a75f297728e4a2186498be3ad237af8a2446d696fe33a0761f3411b07f
-
Filesize
128KB
MD5dfcbf2e5489e62b3f02a66445b89853d
SHA111b3029741bca1a1972353287ee4f082a1f53c47
SHA256e18c30a05ccab58b62bd46d51685e6b0e462ffdf932d243f8b577d145f507fd1
SHA5127970c808b8634b81fc8120a37dca37f8695b0415107fef9072f88be8ad02fb59cc4c8453ae764070446666e0bc9b2d5ebf1f2a80a6b94041243d1a65209c8f1a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd