Analysis
-
max time kernel
65s -
max time network
68s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 20:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbVJzOHZYcEd2dHBGZmF0Ml9PLXV2ZGFyUC1iQXxBQ3Jtc0tsb1RqaTV6YWtrVEtFOG1fNlQ5UDdMbl95aTU3eXpXR216d1pqMXRVQ3kxbkNOc2NLV3BYTDhYdEo1Ymw4UXZwT1dBSmxFenZwUVdOY1RBblprU0o1WG0zc1dVOXRXQ2RIR2JEUGJ4VmZGNDU1WFdscw&q=https%3A%2F%2Fmon.im%2Fbad_apple.exe&v=EZpZwunMzuE
Resource
win10v2004-20240226-en
General
-
Target
https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbVJzOHZYcEd2dHBGZmF0Ml9PLXV2ZGFyUC1iQXxBQ3Jtc0tsb1RqaTV6YWtrVEtFOG1fNlQ5UDdMbl95aTU3eXpXR216d1pqMXRVQ3kxbkNOc2NLV3BYTDhYdEo1Ymw4UXZwT1dBSmxFenZwUVdOY1RBblprU0o1WG0zc1dVOXRXQ2RIR2JEUGJ4VmZGNDU1WFdscw&q=https%3A%2F%2Fmon.im%2Fbad_apple.exe&v=EZpZwunMzuE
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2084 bad_apple.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133542297536987341" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4424 chrome.exe 4424 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: SeShutdownPrivilege 4424 chrome.exe Token: SeCreatePagefilePrivilege 4424 chrome.exe Token: 33 3792 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3792 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe 4424 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4424 wrote to memory of 1628 4424 chrome.exe 88 PID 4424 wrote to memory of 1628 4424 chrome.exe 88 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 2928 4424 chrome.exe 90 PID 4424 wrote to memory of 4288 4424 chrome.exe 91 PID 4424 wrote to memory of 4288 4424 chrome.exe 91 PID 4424 wrote to memory of 2660 4424 chrome.exe 92 PID 4424 wrote to memory of 2660 4424 chrome.exe 92 PID 4424 wrote to memory of 2660 4424 chrome.exe 92 PID 4424 wrote to memory of 2660 4424 chrome.exe 92 PID 4424 wrote to memory of 2660 4424 chrome.exe 92 PID 4424 wrote to memory of 2660 4424 chrome.exe 92 PID 4424 wrote to memory of 2660 4424 chrome.exe 92 PID 4424 wrote to memory of 2660 4424 chrome.exe 92 PID 4424 wrote to memory of 2660 4424 chrome.exe 92 PID 4424 wrote to memory of 2660 4424 chrome.exe 92 PID 4424 wrote to memory of 2660 4424 chrome.exe 92 PID 4424 wrote to memory of 2660 4424 chrome.exe 92 PID 4424 wrote to memory of 2660 4424 chrome.exe 92 PID 4424 wrote to memory of 2660 4424 chrome.exe 92 PID 4424 wrote to memory of 2660 4424 chrome.exe 92 PID 4424 wrote to memory of 2660 4424 chrome.exe 92 PID 4424 wrote to memory of 2660 4424 chrome.exe 92 PID 4424 wrote to memory of 2660 4424 chrome.exe 92 PID 4424 wrote to memory of 2660 4424 chrome.exe 92 PID 4424 wrote to memory of 2660 4424 chrome.exe 92 PID 4424 wrote to memory of 2660 4424 chrome.exe 92 PID 4424 wrote to memory of 2660 4424 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbVJzOHZYcEd2dHBGZmF0Ml9PLXV2ZGFyUC1iQXxBQ3Jtc0tsb1RqaTV6YWtrVEtFOG1fNlQ5UDdMbl95aTU3eXpXR216d1pqMXRVQ3kxbkNOc2NLV3BYTDhYdEo1Ymw4UXZwT1dBSmxFenZwUVdOY1RBblprU0o1WG0zc1dVOXRXQ2RIR2JEUGJ4VmZGNDU1WFdscw&q=https%3A%2F%2Fmon.im%2Fbad_apple.exe&v=EZpZwunMzuE1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc2d619758,0x7ffc2d619768,0x7ffc2d6197782⤵PID:1628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1824,i,15144843089934185014,10338898504947868614,131072 /prefetch:22⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1968 --field-trial-handle=1824,i,15144843089934185014,10338898504947868614,131072 /prefetch:82⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2088 --field-trial-handle=1824,i,15144843089934185014,10338898504947868614,131072 /prefetch:82⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1824,i,15144843089934185014,10338898504947868614,131072 /prefetch:12⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3040 --field-trial-handle=1824,i,15144843089934185014,10338898504947868614,131072 /prefetch:12⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=1824,i,15144843089934185014,10338898504947868614,131072 /prefetch:82⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 --field-trial-handle=1824,i,15144843089934185014,10338898504947868614,131072 /prefetch:82⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3792 --field-trial-handle=1824,i,15144843089934185014,10338898504947868614,131072 /prefetch:12⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5356 --field-trial-handle=1824,i,15144843089934185014,10338898504947868614,131072 /prefetch:82⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5380 --field-trial-handle=1824,i,15144843089934185014,10338898504947868614,131072 /prefetch:82⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5580 --field-trial-handle=1824,i,15144843089934185014,10338898504947868614,131072 /prefetch:82⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3076 --field-trial-handle=1824,i,15144843089934185014,10338898504947868614,131072 /prefetch:82⤵PID:732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5564 --field-trial-handle=1824,i,15144843089934185014,10338898504947868614,131072 /prefetch:82⤵PID:4580
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5060
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3064
-
C:\Users\Admin\Desktop\bad_apple.exe"C:\Users\Admin\Desktop\bad_apple.exe"1⤵
- Executes dropped EXE
PID:2084
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f4 0x4101⤵
- Suspicious use of AdjustPrivilegeToken
PID:3792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD513ade3186a0fd4b8684f8fa2ed2d0aa4
SHA11714aa1892fe4b9f0e86372574049dff55371c83
SHA2561e14b0d9f5303cc3a507aec801d2bb9f1d76578d7a546590cb00693d69814b6d
SHA512b57c74d368d0d5381b25ddbf4ac09add3e81cb638db0153e57fbd855c02064313e314d6ba90876502308bfdea1c46576f5e76c016db574d0176d8b0d138765a7
-
Filesize
537B
MD5f9d87407fa86fe8566eb9e37d2941969
SHA1dd3f7bb2d034be12d1667199d9377a509a2b2237
SHA256942171195fc2f208c47c8952c0f6332f7193bd1210f87e4aafa981864902f3a5
SHA512192376e15578764a2bfdcacecb4ee185bf7fe23a466edf6233e798a7e8239049e8f0e1f6cb3976fd682bbd1cad546efcbbb35a68503f1ec8baceeccf3689cbee
-
Filesize
7KB
MD567535643514c50ed45076ea04604011b
SHA18513d3fd1b5f18e1ad9d15e137e6de21c074c44c
SHA2567d3cade247bb9f549b3d219e4516b0ff02909536029e19b8c66b0d277b9fbde9
SHA512a1fd2949bcbe0fd9f327ab5b95267f96a2195a11383133d39cf5ea14c92e449b1816a86b14a990fd590c8789bc63d07d9f289e495687264ff694e8246e172a92
-
Filesize
6KB
MD5348ec34b012291a4b10bd6dbf9a0ee7b
SHA1ebfb0d494d797f3ca51ffaa845be2c22d918ab37
SHA2568e5a0021d3f252ea80bafe8c1731a1c0bab322ff18620eff9a6b21abc78522ab
SHA512e62457c44d261746902dc857d7908ea3bca02396342fcc2ba71f46b202ec79425d711b6e4ff8d4010c47a74e9b8f13bdfcf75207dfcdbdfa246718d4e1e30b4e
-
Filesize
128KB
MD51215b52e74c56a111052ca9944b8f60f
SHA101c0a2501ea94fb7555bc0e30c8428855b1fb617
SHA256ae2c01a596e373cc68f4a0a6e1b1da5b1a8bdd0e42e19419ad0cfffbb163970a
SHA5123b44f658097ba744ca52d819bf2e8fd47bff489f0d495de94cf99c0430a6c0a19a9e19f5184f31058b09709d5fdb9a982db8d37c819144ab2f2d881b7ca48a5a
-
Filesize
128KB
MD56b9c5884c664a7f6056e649cd1d8d02d
SHA101e798d77407d8a16edb364b87d720877d36a216
SHA256cb2e00efe2d74a962a732f22e0eefcfc821aee5de44207615e0495b5d2e8429e
SHA51258ebdb617f304dc2c95403f1594a78230e3bbd97913d2895633f61da8cc3fdf529cb49f8f721d7c3e02dc8f568c3a688af63dd36bb6942dc77a2a13b42efdd97
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
4.8MB
MD56a022e937a774f6da038da4634b0fc40
SHA1f204d69f3a78629a85f10bd7d2768b6fc3cbd7db
SHA2566927cb7245652a3b66f1a4517189c7cd08056875e09e267a29fe13f1d3bd4d1d
SHA512752643d0bc50dd82d7cb82dd8e7acea72859a1f57eff9635fcac0950e73bc2fda1228e8e1405a6cc92ea364f8026e24f4fb88d55f5e92bfe82214dffbe76ca4d