Analysis
-
max time kernel
34s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 11:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://biourl.me/mociRD2ef
Resource
win10v2004-20240226-en
General
-
Target
http://biourl.me/mociRD2ef
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133541982749631267" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2324 chrome.exe 2324 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeCreatePagefilePrivilege 2324 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2324 wrote to memory of 3404 2324 chrome.exe 88 PID 2324 wrote to memory of 3404 2324 chrome.exe 88 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 1840 2324 chrome.exe 90 PID 2324 wrote to memory of 3704 2324 chrome.exe 91 PID 2324 wrote to memory of 3704 2324 chrome.exe 91 PID 2324 wrote to memory of 1052 2324 chrome.exe 92 PID 2324 wrote to memory of 1052 2324 chrome.exe 92 PID 2324 wrote to memory of 1052 2324 chrome.exe 92 PID 2324 wrote to memory of 1052 2324 chrome.exe 92 PID 2324 wrote to memory of 1052 2324 chrome.exe 92 PID 2324 wrote to memory of 1052 2324 chrome.exe 92 PID 2324 wrote to memory of 1052 2324 chrome.exe 92 PID 2324 wrote to memory of 1052 2324 chrome.exe 92 PID 2324 wrote to memory of 1052 2324 chrome.exe 92 PID 2324 wrote to memory of 1052 2324 chrome.exe 92 PID 2324 wrote to memory of 1052 2324 chrome.exe 92 PID 2324 wrote to memory of 1052 2324 chrome.exe 92 PID 2324 wrote to memory of 1052 2324 chrome.exe 92 PID 2324 wrote to memory of 1052 2324 chrome.exe 92 PID 2324 wrote to memory of 1052 2324 chrome.exe 92 PID 2324 wrote to memory of 1052 2324 chrome.exe 92 PID 2324 wrote to memory of 1052 2324 chrome.exe 92 PID 2324 wrote to memory of 1052 2324 chrome.exe 92 PID 2324 wrote to memory of 1052 2324 chrome.exe 92 PID 2324 wrote to memory of 1052 2324 chrome.exe 92 PID 2324 wrote to memory of 1052 2324 chrome.exe 92 PID 2324 wrote to memory of 1052 2324 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://biourl.me/mociRD2ef1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb4fa29758,0x7ffb4fa29768,0x7ffb4fa297782⤵PID:3404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1892,i,10024663383797160590,12516688494519904469,131072 /prefetch:22⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1892,i,10024663383797160590,12516688494519904469,131072 /prefetch:82⤵PID:3704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1892,i,10024663383797160590,12516688494519904469,131072 /prefetch:82⤵PID:1052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2896 --field-trial-handle=1892,i,10024663383797160590,12516688494519904469,131072 /prefetch:12⤵PID:4112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2904 --field-trial-handle=1892,i,10024663383797160590,12516688494519904469,131072 /prefetch:12⤵PID:3416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 --field-trial-handle=1892,i,10024663383797160590,12516688494519904469,131072 /prefetch:82⤵PID:3176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 --field-trial-handle=1892,i,10024663383797160590,12516688494519904469,131072 /prefetch:82⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5248 --field-trial-handle=1892,i,10024663383797160590,12516688494519904469,131072 /prefetch:12⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4852 --field-trial-handle=1892,i,10024663383797160590,12516688494519904469,131072 /prefetch:12⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3348 --field-trial-handle=1892,i,10024663383797160590,12516688494519904469,131072 /prefetch:12⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3728 --field-trial-handle=1892,i,10024663383797160590,12516688494519904469,131072 /prefetch:12⤵PID:876
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a51e0f411c3fade2cb84f42344cfa65b
SHA16a34250ca69c9a201fd4af424c01646811419ee3
SHA25655ab8ce1e4bd6b6c440e05deb179b75755b870d3f97945572e67b93029bcc8f4
SHA512576aaa9d7f0220be95cd01d50c5038dd20156575f8463164a98c629f808ec95f9e73603f34c78d5169b84f4caef41b921ada86faac5d732571b6b03c94ad2505
-
Filesize
6KB
MD5aaacdd930e957b3cf8dd4adaa0533f49
SHA1c2da68e9c9834b5d97efa995700552218b898b91
SHA256c713a01a8c50d1940bb94fc44b6fb9ceb61dae2b37f1845acddb1958357d9d33
SHA512e104ca52c7f41beab9277ae0d9c71c645987675e9d3c2d551a586775bea468df20bb3228527e0668a0afea79a7e517a9f8488502e86281256f17663b5dd6d869
-
Filesize
128KB
MD508977b5d0f3411ea073934cb57315716
SHA181f959428612893e76b9b1e97e44c82d8aba2a70
SHA2567fb77e17a31d3d94526ec433f1df9a33765ecdec1f986af636f33d599a011e5c
SHA512f9cefbed3200f9b5e3063def41f70ff2373a4ea9891dbc52ae11c6bac8d9bb2ee412aca327170264458365bf3c1f4a03a51713c75451258867c0bcfd823617c7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd