Analysis
-
max time kernel
1799s -
max time network
1685s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 18:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://itch.io
Resource
win10v2004-20240226-en
General
-
Target
http://itch.io
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133543976987104545" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe 4020 chrome.exe 4020 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe Token: SeShutdownPrivilege 4868 chrome.exe Token: SeCreatePagefilePrivilege 4868 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe 4868 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4868 wrote to memory of 4052 4868 chrome.exe 89 PID 4868 wrote to memory of 4052 4868 chrome.exe 89 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 472 4868 chrome.exe 92 PID 4868 wrote to memory of 2656 4868 chrome.exe 93 PID 4868 wrote to memory of 2656 4868 chrome.exe 93 PID 4868 wrote to memory of 1172 4868 chrome.exe 94 PID 4868 wrote to memory of 1172 4868 chrome.exe 94 PID 4868 wrote to memory of 1172 4868 chrome.exe 94 PID 4868 wrote to memory of 1172 4868 chrome.exe 94 PID 4868 wrote to memory of 1172 4868 chrome.exe 94 PID 4868 wrote to memory of 1172 4868 chrome.exe 94 PID 4868 wrote to memory of 1172 4868 chrome.exe 94 PID 4868 wrote to memory of 1172 4868 chrome.exe 94 PID 4868 wrote to memory of 1172 4868 chrome.exe 94 PID 4868 wrote to memory of 1172 4868 chrome.exe 94 PID 4868 wrote to memory of 1172 4868 chrome.exe 94 PID 4868 wrote to memory of 1172 4868 chrome.exe 94 PID 4868 wrote to memory of 1172 4868 chrome.exe 94 PID 4868 wrote to memory of 1172 4868 chrome.exe 94 PID 4868 wrote to memory of 1172 4868 chrome.exe 94 PID 4868 wrote to memory of 1172 4868 chrome.exe 94 PID 4868 wrote to memory of 1172 4868 chrome.exe 94 PID 4868 wrote to memory of 1172 4868 chrome.exe 94 PID 4868 wrote to memory of 1172 4868 chrome.exe 94 PID 4868 wrote to memory of 1172 4868 chrome.exe 94 PID 4868 wrote to memory of 1172 4868 chrome.exe 94 PID 4868 wrote to memory of 1172 4868 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://itch.io1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed3699758,0x7ffed3699768,0x7ffed36997782⤵PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1896,i,3757649246250635427,11340658527581019266,131072 /prefetch:22⤵PID:472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1896,i,3757649246250635427,11340658527581019266,131072 /prefetch:82⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1896,i,3757649246250635427,11340658527581019266,131072 /prefetch:82⤵PID:1172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2832 --field-trial-handle=1896,i,3757649246250635427,11340658527581019266,131072 /prefetch:12⤵PID:4668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2848 --field-trial-handle=1896,i,3757649246250635427,11340658527581019266,131072 /prefetch:12⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4592 --field-trial-handle=1896,i,3757649246250635427,11340658527581019266,131072 /prefetch:12⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 --field-trial-handle=1896,i,3757649246250635427,11340658527581019266,131072 /prefetch:82⤵PID:4548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5004 --field-trial-handle=1896,i,3757649246250635427,11340658527581019266,131072 /prefetch:82⤵PID:1852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3092 --field-trial-handle=1896,i,3757649246250635427,11340658527581019266,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4020
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4464
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4800
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5feb77242f14982680c92a8adf419572c
SHA1f3aed34b03b4e272c5bb4bbc60fc6649c9c77c19
SHA256ee556fb2a6669d88652337c667734a3ad596f7357283f2ca55984f986d967885
SHA5127811cc8437f52115c40919aa05c4f89499900ee644c337d605ccc05d7157824708c9b68feeb06f30c6921602b11c9e00332f41c65f729cbe2c4fc974eebd9951
-
Filesize
144B
MD5a29df751beb2679328c0313ccac3f17b
SHA1892b25059900d619ab001ba6bd3e22dddda4682e
SHA256416fc5feb25ccc7c95bc5b4dddbe8006160703ba54e78c06f11d811b5d129e0f
SHA5127d77b1d5b79e617d3d6d6057f72c3a5eb27886fad4606c4f3b5e93cb6d30f49496f8cd043f9b02249169da70101b5125a5f383278b900f0ac7c3b5bae080426d
-
Filesize
1KB
MD5aedb5544a4f3815ea87acf3764cdaa12
SHA14a69c93cf48821b79007713e578c01487058b462
SHA25658e54060c3a8f523e4ff4944a2a66d0770cbed70d0c290823f4abbdd87d1a9b8
SHA512ca423eb1fdd40d858157b618428ddd72f621a7ebb0a158c07bf2322d8f13679f70f97d5130268d20f10b2a5f01431823716abd8ab33d4e4c1c641bd83d6d0873
-
Filesize
538B
MD5efebf209341467396a293421c517a88a
SHA1e2633d6a7a018421369ce0dcfb571e47f2583fd2
SHA256d195ca639609f49bb1f669924d45f04993bc46a0667c877b9678a57425985602
SHA5120221c494bffd21a7987152c7b0c5e9462909173c66ab84fd1f83515b29fcf6e9a6404cd3fe90801939b3330d673aecb5e54d22dab0e041596f90778322e5e298
-
Filesize
6KB
MD500a159bdc2e3fc74e988cb2e9e1d5318
SHA11f335b471f7e50da120cab073a6cd9dd22e1e03b
SHA2565b676ea27a118860eed62b252b7a6579185949392146b7b2210e3b217859e379
SHA5126d6d1e56fc56604abcfcd82ccb6faa5cb0a6907f93e60a341df930a0dc5f2781e09a663b6ec727716711463b63ee96730bbece8048044e20e247e35526b4a971
-
Filesize
128KB
MD555c17420a9a1a3c152f0cd9a292043a7
SHA1688a1b9bd4916af74634f831b3279d91a35ca2b5
SHA2564145502af2af1be7de382c780da23555d102cd6de4f6f4b0467845561a4a4555
SHA5129785696df7c6601a70db28f356bda1109fe545b5a619c22963a2566977b93212759cc5798548f3f9c6cf11445f3b153f985798c666855cd6e535193e45229072
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd