Analysis
-
max time kernel
1800s -
max time network
1690s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 11:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://getdstudioglobal.com/28?subid=LikiIT&dpl=https://likeit.guru//torrent4/52/chicken-invaders-2.torrent&extra2=Chicken%20Invaders%202&extra=poster%3Dhttps://likeit.guru/images4/poster/292/poster_chicken-invaders-2.jpg
Resource
win10v2004-20240226-en
General
-
Target
https://getdstudioglobal.com/28?subid=LikiIT&dpl=https://likeit.guru//torrent4/52/chicken-invaders-2.torrent&extra2=Chicken%20Invaders%202&extra=poster%3Dhttps://likeit.guru/images4/poster/292/poster_chicken-invaders-2.jpg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133541112456466136" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4624 chrome.exe 4624 chrome.exe 3632 chrome.exe 3632 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4624 chrome.exe 4624 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe Token: SeShutdownPrivilege 4624 chrome.exe Token: SeCreatePagefilePrivilege 4624 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe 4624 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4624 wrote to memory of 2852 4624 chrome.exe 87 PID 4624 wrote to memory of 2852 4624 chrome.exe 87 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 2088 4624 chrome.exe 90 PID 4624 wrote to memory of 764 4624 chrome.exe 91 PID 4624 wrote to memory of 764 4624 chrome.exe 91 PID 4624 wrote to memory of 4248 4624 chrome.exe 92 PID 4624 wrote to memory of 4248 4624 chrome.exe 92 PID 4624 wrote to memory of 4248 4624 chrome.exe 92 PID 4624 wrote to memory of 4248 4624 chrome.exe 92 PID 4624 wrote to memory of 4248 4624 chrome.exe 92 PID 4624 wrote to memory of 4248 4624 chrome.exe 92 PID 4624 wrote to memory of 4248 4624 chrome.exe 92 PID 4624 wrote to memory of 4248 4624 chrome.exe 92 PID 4624 wrote to memory of 4248 4624 chrome.exe 92 PID 4624 wrote to memory of 4248 4624 chrome.exe 92 PID 4624 wrote to memory of 4248 4624 chrome.exe 92 PID 4624 wrote to memory of 4248 4624 chrome.exe 92 PID 4624 wrote to memory of 4248 4624 chrome.exe 92 PID 4624 wrote to memory of 4248 4624 chrome.exe 92 PID 4624 wrote to memory of 4248 4624 chrome.exe 92 PID 4624 wrote to memory of 4248 4624 chrome.exe 92 PID 4624 wrote to memory of 4248 4624 chrome.exe 92 PID 4624 wrote to memory of 4248 4624 chrome.exe 92 PID 4624 wrote to memory of 4248 4624 chrome.exe 92 PID 4624 wrote to memory of 4248 4624 chrome.exe 92 PID 4624 wrote to memory of 4248 4624 chrome.exe 92 PID 4624 wrote to memory of 4248 4624 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://getdstudioglobal.com/28?subid=LikiIT&dpl=https://likeit.guru//torrent4/52/chicken-invaders-2.torrent&extra2=Chicken%20Invaders%202&extra=poster%3Dhttps://likeit.guru/images4/poster/292/poster_chicken-invaders-2.jpg1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa60c79758,0x7ffa60c79768,0x7ffa60c797782⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1936,i,10110121381410720850,9915016574008244512,131072 /prefetch:22⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1908 --field-trial-handle=1936,i,10110121381410720850,9915016574008244512,131072 /prefetch:82⤵PID:764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2176 --field-trial-handle=1936,i,10110121381410720850,9915016574008244512,131072 /prefetch:82⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2984 --field-trial-handle=1936,i,10110121381410720850,9915016574008244512,131072 /prefetch:12⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3004 --field-trial-handle=1936,i,10110121381410720850,9915016574008244512,131072 /prefetch:12⤵PID:1100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 --field-trial-handle=1936,i,10110121381410720850,9915016574008244512,131072 /prefetch:82⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 --field-trial-handle=1936,i,10110121381410720850,9915016574008244512,131072 /prefetch:82⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3688 --field-trial-handle=1936,i,10110121381410720850,9915016574008244512,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3632
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b0d106d4de0fbd6dc558bae1d8fe6e00
SHA1b90c3db35537dac55a462d8e900bbb2cf60725d2
SHA2563c151244c4b1b789246dde08760765f307eceb367a0fd053d4764c50cfbacf71
SHA512276ec64d5e02f98b27599c60233447f6676784b55815abebc761ded695ee8f6ba996496591b4fe6338c2bbed86c7f7d8101aa40b20b8c470584579a52caaec80
-
Filesize
1KB
MD55b0f14a3185daac8508baf8f3fa8eaf0
SHA1369990788c43b7f20f5e38e6e57d3780d08a3c89
SHA2562792e0901dfa8db93caa1240af69fdbd74438fa75ac844ab2117a106acb02400
SHA51267950038f7a47a413d256dadf69a5ca711094cde141290205aab069df37bf3b5a43151b1f32bb739af21d839601929a7fbf78a505a351702b07124806952b102
-
Filesize
1KB
MD50e084464f5cf127583fa3a3eb0c7b76e
SHA178168d1f007043da7c13a012c43bcd3125ece59e
SHA25627b4edca577c00c6dee30b84329f8e51a9cdafc173e595aa93be74305678a699
SHA512aff78ab6fa448e8378a518e2b4bfcb50312cdc73851373bb13f1e77010704cf19527f7ca1b41b958e2852f4c0019444e3c6793b27277fa687a26dc6b0f661249
-
Filesize
6KB
MD5b11d9f3a3d66a23f328c5e84b1779477
SHA144364e15176b3ae5ae2505f3932471b2a9637cb7
SHA2566b5a99203565eed737a2393da9e44df8f0fa35fdae645a29c5a79de3fab4c37b
SHA512746468e507e2ea62fee0c22c4eac4c995d5ae5d10bf53203209ecf05328017ea599a621dd555ec795ddaae41604fac42586ae55173ee002c738533753cb1f313
-
Filesize
6KB
MD511f179b2c43c8db19661ae2ebdb7963b
SHA16d5e46cf0af7fdc377d26404014c6882eff12f35
SHA25686fd837a286d1f2131d13fc2c2bd65cd7b58a8cb6854c278586328f84d2419b9
SHA512b39369efc72b59935c86ccd82e883eb6f770f659165106b4b73054084b3197ef2437e88e901195c48174fd29e0ca95469bf4fdd6d714f8de3832610aad10c3d6
-
Filesize
128KB
MD59b2aad7d710834a4ffb635c376746f48
SHA1c3c7a25afc990f493b73c440b2f3b64de6782ccc
SHA25697201888b7e3047374b31d9c4cf5438967d0401fcdc7178ef26db9448b0bec6f
SHA512f44af451841a0e71a08cd0a2b3ecd93827c9770bd92a6db3f7895aaa68037c28355c2a4c7b9cdd96412c2f61554d5661d73ad0165d44e48d91e6c68813049dcc
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd