Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-03-2024 04:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://steam-card50.com/50
Resource
win10v2004-20240226-en
General
-
Target
https://steam-card50.com/50
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133544316361104654" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 1428 chrome.exe 1428 chrome.exe 3856 chrome.exe 3856 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 1428 chrome.exe 1428 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
Processes:
chrome.exepid process 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1428 wrote to memory of 2280 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 2280 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1200 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 4604 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 4604 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1236 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1236 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1236 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1236 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1236 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1236 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1236 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1236 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1236 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1236 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1236 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1236 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1236 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1236 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1236 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1236 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1236 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1236 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1236 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1236 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1236 1428 chrome.exe chrome.exe PID 1428 wrote to memory of 1236 1428 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://steam-card50.com/501⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd11369758,0x7ffd11369768,0x7ffd113697782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1856,i,16700499519496544317,9833073542354578408,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1856,i,16700499519496544317,9833073542354578408,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1856,i,16700499519496544317,9833073542354578408,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3208 --field-trial-handle=1856,i,16700499519496544317,9833073542354578408,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3236 --field-trial-handle=1856,i,16700499519496544317,9833073542354578408,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 --field-trial-handle=1856,i,16700499519496544317,9833073542354578408,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 --field-trial-handle=1856,i,16700499519496544317,9833073542354578408,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2516 --field-trial-handle=1856,i,16700499519496544317,9833073542354578408,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
648B
MD54d3f03587a84b1e5d901c840399a9819
SHA15276c2f19743bad2490e4363bfe48cfaf3bac34e
SHA2567cdf1b950192c65e5ecfc42d0c3d47c75fa16a0b744c8335ea85b56ef928ac8f
SHA512b79ac33b71a7ede15a99da4f6e1b4d54b6071de713b3728f116450971cc6b064f9cf8e8775464ae91214af1cd0d22ba87b59f667565dc46f0b39fd7bc9656d4a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
624B
MD5e75d3a0ff6fb0266bb2f711ef7ca6115
SHA12d68af1d64aed51d93f2c4974f12dd4f107b0ae7
SHA2560ef6914e57fc4882ce68466cc7148e3e72c963030615da85615e021a29ef8af4
SHA512a22bcbdb2ab1c2399c906b1724b2d311caf7f6a2776e86c93a0861ea5286e598338146068f00c3f2220787f24ffec2f0f2659abe1e65398181005f5594e1f0f8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD5e681925891ab172453bb326c26cf2eda
SHA12653143955fd38ba5b26ef7cb80629e5d3d954fd
SHA256b9deda68702b3c4154800eb240382ab14973c048437304504b287544a802f0ed
SHA512376afaa6ae14f8594f938cff7402178601ea91852600c16590a8f78fdd8de954e4bb7546de9d40799a7b4e754ca8a904c29c10cbaac5f0fe7ab5bea504bd5a82
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
874B
MD5724fb524e7e20e90c142e2c36a244c4e
SHA10b5c0d1fc31a4e5e9c19e6d9149058acd974ba44
SHA256da66e0342d55af5d66b6a7f00bb90905b72e35f41e3ea90542dac780c8ddea69
SHA512f920c3b176febf26c61a4353ee33c9c6e23916273db08d1060ef1172af485426325dfe1d94dad4fc73a1807786c539f01e4f9b0423da7230821ee3642c445e21
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5fa07984fcd4a6d53ff9eebdfb6f563e4
SHA15066e7fb481faca1a10679abe7ede6e0517520ff
SHA256fdf111ee56d9aaabfdaa080190bfa8dea15dbbe63ebd39294e49dc61aa228b28
SHA5127edfe415cca378816c15d3d8f8da3497087f0aab96506077abeac27e0ff3787e52c44c90d12dc840ec763a2b18dc02157878c8aeaf5f3c85a76cfe2cedc96e2c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD55d29391c1fbc3e1e37464cc4d02093d5
SHA1d9fd12a747a586bcd998b2a136e2a6589e3d5eba
SHA25691b43f375af1f15c514d7adbc371b8461b9d67727b04a1ea66164b2d2ceb9d5c
SHA5125b55e59fa1b876d6a16db0dd9d09cc37735b5256bd83d0c5c83fba66508d8350f35665e88e274fdacae8fa6f2ae8ebab3aa426987cd45bf80c1dc8d809f284fc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
128KB
MD533331d105bc54f9e8c99568cf66c2f82
SHA1e90ab047932a00038f14ef9e6cf06d89d5b15fb3
SHA256f84b15c11d4e671d410f20c0f47b09ace3fb07bb315fb4210227a5af6cb6e749
SHA5127eab48a7d09cc44cc8a8202f1881d85f11ee27aecc35ff3844ca16ff81cb6c46e9f7022276709cba038ed8cff392b359c273314b8449ed86e821bf8282a0f49c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
128KB
MD5048259a9516b0eefa8113e0ce3902aba
SHA187e450266ac8fc8f2e35e9f36c1178a0b62e5a90
SHA256bdddfb637059ae70fc60693b244b1782f964cfef24deaa70cc10a82a9a852825
SHA5122072ec1e5a908fc92253d770b3011e4fef032a12d90be0c09a4fa709936c94a17df53ff471d50260f5474985e7a808ec113292a74a1f925bc09b0c08f7661caf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_1428_ILWVRLFHONLPQHCQMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e