Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 08:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://szchuangsu.com
Resource
win10v2004-20240226-en
General
-
Target
http://szchuangsu.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133541891319253578" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1156 chrome.exe 1156 chrome.exe 1868 chrome.exe 1868 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1156 wrote to memory of 1748 1156 chrome.exe 89 PID 1156 wrote to memory of 1748 1156 chrome.exe 89 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 3360 1156 chrome.exe 92 PID 1156 wrote to memory of 5000 1156 chrome.exe 93 PID 1156 wrote to memory of 5000 1156 chrome.exe 93 PID 1156 wrote to memory of 1264 1156 chrome.exe 94 PID 1156 wrote to memory of 1264 1156 chrome.exe 94 PID 1156 wrote to memory of 1264 1156 chrome.exe 94 PID 1156 wrote to memory of 1264 1156 chrome.exe 94 PID 1156 wrote to memory of 1264 1156 chrome.exe 94 PID 1156 wrote to memory of 1264 1156 chrome.exe 94 PID 1156 wrote to memory of 1264 1156 chrome.exe 94 PID 1156 wrote to memory of 1264 1156 chrome.exe 94 PID 1156 wrote to memory of 1264 1156 chrome.exe 94 PID 1156 wrote to memory of 1264 1156 chrome.exe 94 PID 1156 wrote to memory of 1264 1156 chrome.exe 94 PID 1156 wrote to memory of 1264 1156 chrome.exe 94 PID 1156 wrote to memory of 1264 1156 chrome.exe 94 PID 1156 wrote to memory of 1264 1156 chrome.exe 94 PID 1156 wrote to memory of 1264 1156 chrome.exe 94 PID 1156 wrote to memory of 1264 1156 chrome.exe 94 PID 1156 wrote to memory of 1264 1156 chrome.exe 94 PID 1156 wrote to memory of 1264 1156 chrome.exe 94 PID 1156 wrote to memory of 1264 1156 chrome.exe 94 PID 1156 wrote to memory of 1264 1156 chrome.exe 94 PID 1156 wrote to memory of 1264 1156 chrome.exe 94 PID 1156 wrote to memory of 1264 1156 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://szchuangsu.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd7bd59758,0x7ffd7bd59768,0x7ffd7bd597782⤵PID:1748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1884,i,2873060806469890057,11204026340523610033,131072 /prefetch:22⤵PID:3360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1884,i,2873060806469890057,11204026340523610033,131072 /prefetch:82⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1884,i,2873060806469890057,11204026340523610033,131072 /prefetch:82⤵PID:1264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2824 --field-trial-handle=1884,i,2873060806469890057,11204026340523610033,131072 /prefetch:12⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2832 --field-trial-handle=1884,i,2873060806469890057,11204026340523610033,131072 /prefetch:12⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 --field-trial-handle=1884,i,2873060806469890057,11204026340523610033,131072 /prefetch:82⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4708 --field-trial-handle=1884,i,2873060806469890057,11204026340523610033,131072 /prefetch:82⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4848 --field-trial-handle=1884,i,2873060806469890057,11204026340523610033,131072 /prefetch:12⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4800 --field-trial-handle=1884,i,2873060806469890057,11204026340523610033,131072 /prefetch:12⤵PID:4752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3912 --field-trial-handle=1884,i,2873060806469890057,11204026340523610033,131072 /prefetch:12⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=212 --field-trial-handle=1884,i,2873060806469890057,11204026340523610033,131072 /prefetch:12⤵PID:4728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4048 --field-trial-handle=1884,i,2873060806469890057,11204026340523610033,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1868
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5a32bd3c10a025d8293b2c9b3dac37e30
SHA10aaf60140ee52b97fb6f0d13d0015587d7c1df0a
SHA256c2d3ee354671ee4123b528409708e43b5bb0ee02c04acb92e9bca81c78a3ec81
SHA51297b30a786364ded850b5ac52a2cece3573945315e9223bf5f4f244beeaa9f21c149ac171f5809514242c9876779c80ec7c44098d71c2ca01cec82fd0cb188eba
-
Filesize
6KB
MD5b9540b25dfab975acee40f21e7869253
SHA19bc8b6d5c9cb5d5c83ad773a8db9d6a23205f80e
SHA2569015376a881c8c0dc545593e645912501afd5a80e81a1bd220f13871bc4978c5
SHA512c2ef7eb6bff7210c8a369f06f353e326aa98c36b1751207b682a146790c4777ab7a79d3d31ded824f0fcaa638e73cf8150c544d8ec5b3ecd349876f9f2e66244
-
Filesize
6KB
MD5a1b5bc5b867e11c9994da8d83291b63f
SHA1fed7f7afeda9e6047faf395993964f6b24c9eee8
SHA25611c716425ca872d310954064755b78e90270ceaf23611b611d1d88d418d85910
SHA512b30608cd4971949f44a5bf592b7ac3a7b28eb0c5c58b6f6aece8e6f006831b685540cf23fa5fcee32913b2be9425276ae2be3487e7e2a3ba75466ef9f59b1b99
-
Filesize
128KB
MD5ea8237f28e89ebb05506d4a06a2cbcdb
SHA1e7df51e5834febc0e86ad7eb670dd6a72e52a6c6
SHA25673a6e751fa9d6c84df9d7216b8fea4deaf1a6c4084a8c03c77d2367af03009a7
SHA512e1fac68cd5efc7a459a306f7e2ea92ea28091440426f56e4576971000aad7da0f7959b8bffc39753a124272c4334da04d7b0c6623112a69707645add6ce23e04
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd