Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 17:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://details-he.re/9VfeSE
Resource
win10v2004-20240226-en
General
-
Target
http://details-he.re/9VfeSE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133543074515251161" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3592 chrome.exe 3592 chrome.exe 2360 chrome.exe 2360 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe Token: SeShutdownPrivilege 3592 chrome.exe Token: SeCreatePagefilePrivilege 3592 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3592 wrote to memory of 2544 3592 chrome.exe 86 PID 3592 wrote to memory of 2544 3592 chrome.exe 86 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 4376 3592 chrome.exe 89 PID 3592 wrote to memory of 1384 3592 chrome.exe 90 PID 3592 wrote to memory of 1384 3592 chrome.exe 90 PID 3592 wrote to memory of 8 3592 chrome.exe 91 PID 3592 wrote to memory of 8 3592 chrome.exe 91 PID 3592 wrote to memory of 8 3592 chrome.exe 91 PID 3592 wrote to memory of 8 3592 chrome.exe 91 PID 3592 wrote to memory of 8 3592 chrome.exe 91 PID 3592 wrote to memory of 8 3592 chrome.exe 91 PID 3592 wrote to memory of 8 3592 chrome.exe 91 PID 3592 wrote to memory of 8 3592 chrome.exe 91 PID 3592 wrote to memory of 8 3592 chrome.exe 91 PID 3592 wrote to memory of 8 3592 chrome.exe 91 PID 3592 wrote to memory of 8 3592 chrome.exe 91 PID 3592 wrote to memory of 8 3592 chrome.exe 91 PID 3592 wrote to memory of 8 3592 chrome.exe 91 PID 3592 wrote to memory of 8 3592 chrome.exe 91 PID 3592 wrote to memory of 8 3592 chrome.exe 91 PID 3592 wrote to memory of 8 3592 chrome.exe 91 PID 3592 wrote to memory of 8 3592 chrome.exe 91 PID 3592 wrote to memory of 8 3592 chrome.exe 91 PID 3592 wrote to memory of 8 3592 chrome.exe 91 PID 3592 wrote to memory of 8 3592 chrome.exe 91 PID 3592 wrote to memory of 8 3592 chrome.exe 91 PID 3592 wrote to memory of 8 3592 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://details-he.re/9VfeSE1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc45839758,0x7ffc45839768,0x7ffc458397782⤵PID:2544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1792,i,6445405666367626972,9929624308711086716,131072 /prefetch:22⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1792,i,6445405666367626972,9929624308711086716,131072 /prefetch:82⤵PID:1384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1792,i,6445405666367626972,9929624308711086716,131072 /prefetch:82⤵PID:8
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3144 --field-trial-handle=1792,i,6445405666367626972,9929624308711086716,131072 /prefetch:12⤵PID:4012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3176 --field-trial-handle=1792,i,6445405666367626972,9929624308711086716,131072 /prefetch:12⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4852 --field-trial-handle=1792,i,6445405666367626972,9929624308711086716,131072 /prefetch:12⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 --field-trial-handle=1792,i,6445405666367626972,9929624308711086716,131072 /prefetch:82⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3424 --field-trial-handle=1792,i,6445405666367626972,9929624308711086716,131072 /prefetch:82⤵PID:3976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4764 --field-trial-handle=1792,i,6445405666367626972,9929624308711086716,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2360
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59e1b82a8c41d9f716eedba6f14bda58a
SHA184082f1a2e957a165081f991482d9e18b2002fc1
SHA256e25a98d193ddd69e86d8203d4082304335d5d5ec056140fd18f4f09d834fc2c3
SHA512718dd20d57555b8f17b7343719274db54d0e263180ba49e7b0491074233d435ef55492f2d67f12cb7e426b1ff47fb5e1db3e9027c0449805883fcee91906c5e5
-
Filesize
706B
MD565ad7a4ab652098e121ffde2c6e5317e
SHA18ff91b02eea0bdcddb014f92cea434f866a3e112
SHA2563e504fca0808b3a3ce42ef55fde6eb0c751924757c9c418547b3317fbc271463
SHA512251a1254036c3ea8488987381264d2a2a6ef449aa61808db7e2750a96468d9f564297466e6c14aad8c5094d887178c774957b6c93126a86f80fdc7c287453abd
-
Filesize
6KB
MD5c20474ff63efb28fa85c9fbb446b9fb4
SHA11b3763f16faddebe603c8deb1476019078043335
SHA256e7e82df8b599ce95aad9f93ef584bc9c305ae3d2fed6378827017d8c036c0c71
SHA512b209feb022d64514c30e38eb02a2e113e4139f227d953dcd1a63ec45b7c79516c603aebcb2974943ca9fa2e5ee79e6b15782c15eb60fdb0014f10993588b112b
-
Filesize
128KB
MD5a3802803364e3c8f0341ed86ae69122b
SHA17677db2599732096a9c569127b48e05b055a0c5d
SHA2569c61d44e86871fcedb2f0f38c9b7a0ceacc2b0735b942ae0ee0ec08057c7c1cc
SHA512d5b01e304df563ec97efbe661a872214501c7fdb25e50fa6e36d852917cc1cb07d49d1c666e2d90f74914f7c4bdf4e2ecbd63872bcf6874e0dc70947af83ea04
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd