Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-1703_x64 -
resource
win10-20240214-en -
resource tags
arch:x64arch:x86image:win10-20240214-enlocale:en-usos:windows10-1703-x64system -
submitted
09/03/2024, 14:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://iris.dioptra.io
Resource
win10-20240214-en
General
-
Target
http://iris.dioptra.io
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133544695596608336" chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2020 chrome.exe 2020 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe Token: SeShutdownPrivilege 2520 chrome.exe Token: SeCreatePagefilePrivilege 2520 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe 2520 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2188 2520 chrome.exe 73 PID 2520 wrote to memory of 2188 2520 chrome.exe 73 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 4036 2520 chrome.exe 75 PID 2520 wrote to memory of 1168 2520 chrome.exe 76 PID 2520 wrote to memory of 1168 2520 chrome.exe 76 PID 2520 wrote to memory of 988 2520 chrome.exe 77 PID 2520 wrote to memory of 988 2520 chrome.exe 77 PID 2520 wrote to memory of 988 2520 chrome.exe 77 PID 2520 wrote to memory of 988 2520 chrome.exe 77 PID 2520 wrote to memory of 988 2520 chrome.exe 77 PID 2520 wrote to memory of 988 2520 chrome.exe 77 PID 2520 wrote to memory of 988 2520 chrome.exe 77 PID 2520 wrote to memory of 988 2520 chrome.exe 77 PID 2520 wrote to memory of 988 2520 chrome.exe 77 PID 2520 wrote to memory of 988 2520 chrome.exe 77 PID 2520 wrote to memory of 988 2520 chrome.exe 77 PID 2520 wrote to memory of 988 2520 chrome.exe 77 PID 2520 wrote to memory of 988 2520 chrome.exe 77 PID 2520 wrote to memory of 988 2520 chrome.exe 77 PID 2520 wrote to memory of 988 2520 chrome.exe 77 PID 2520 wrote to memory of 988 2520 chrome.exe 77 PID 2520 wrote to memory of 988 2520 chrome.exe 77 PID 2520 wrote to memory of 988 2520 chrome.exe 77 PID 2520 wrote to memory of 988 2520 chrome.exe 77 PID 2520 wrote to memory of 988 2520 chrome.exe 77 PID 2520 wrote to memory of 988 2520 chrome.exe 77 PID 2520 wrote to memory of 988 2520 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://iris.dioptra.io1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffcc0ad9758,0x7ffcc0ad9768,0x7ffcc0ad97782⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1688,i,5626256998035291774,14349423879861869518,131072 /prefetch:22⤵PID:4036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2000 --field-trial-handle=1688,i,5626256998035291774,14349423879861869518,131072 /prefetch:82⤵PID:1168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1656 --field-trial-handle=1688,i,5626256998035291774,14349423879861869518,131072 /prefetch:82⤵PID:988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2608 --field-trial-handle=1688,i,5626256998035291774,14349423879861869518,131072 /prefetch:12⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2616 --field-trial-handle=1688,i,5626256998035291774,14349423879861869518,131072 /prefetch:12⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4176 --field-trial-handle=1688,i,5626256998035291774,14349423879861869518,131072 /prefetch:82⤵PID:4188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4276 --field-trial-handle=1688,i,5626256998035291774,14349423879861869518,131072 /prefetch:82⤵PID:1448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4720 --field-trial-handle=1688,i,5626256998035291774,14349423879861869518,131072 /prefetch:12⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3212 --field-trial-handle=1688,i,5626256998035291774,14349423879861869518,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2020
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD57959d52dde4acf40e93493a671fd9b45
SHA1881535b36f3149bdc4ebbab4e0e9073e14f07293
SHA2562bfb3867354d3d8b407af42dd0b28a4911ae425ff939ac2cc88e0ad6eceb4614
SHA512fdd8a702b7308950c08b890cac750d3476e20c88da811741b6f35bb1c36ed0bcfa65e179039fbcd24de8bfcbb31af653787f17b62b997122b097938828da0b1b
-
Filesize
1KB
MD575cceb19c9155a85b2387901783c8ad0
SHA16de018c69c08a2c993624461293c2a42ce356134
SHA256d2a715572ea8f7304e63239fc627ec15bf0bbc2398e6900c03a8e97b4a72a098
SHA512f91130e77767b73578942f72ae74a5a5d06ca49be1a62313da5e6049b1475cfe5ecd115f383fa1d64a62f8ae7a47300acf51e970289adbc6ea13587b38d835b8
-
Filesize
539B
MD56ebd0463e2aa7eff925efa7bf94b33cf
SHA1785e397eb1aeaad53af7b9d432a2a0267ba4197f
SHA25662d0b872ea2489a3e0bda98b22b28ac4172270e7ba346ea46f9b7b7bd5b5d6b0
SHA5121ab39fbf729f5a02d7b49308cb90464938cb082c9f91b1b3dadbdb798dd3b79734a73c925c0e29cb8cf75156eb0a720719876887590dfef53d3d21320c80751b
-
Filesize
5KB
MD5519884fcf6618db779f31525b391a1b9
SHA11e60f715ced12aa69d4f620f1ba1a1bc3aa3805c
SHA2566665b7c5278c0f7f48d8a28045eb92fcf643197780ff8350cae87ed2e5d18509
SHA51218f0efe37b8e2fbc23ccbcceafc88a68bd868b3b07279d478ff5046d1aa3cf1e3f1b3c066c16510781edd3e51eee76a1a6e60a1db1435e664e9d37d5647a7e5e
-
Filesize
6KB
MD5e2cd89424a91241bff6b002f899b35c3
SHA10aab068f65ee9d073627543dd2f8dd94f76b71ad
SHA2564bef0a414fe2e7e72148a3598c6f6c623ab881f58a06a3895e470c2066cb4466
SHA51281cb643be0339f9b75edee26ab2df403ba7c950c8aa2ec3962c94b824de7ffcb086844db8fa6db686acc350d016697dcec9a21eb4819a0649cb97bec309921b3
-
Filesize
5KB
MD53d71236bf3b567a80c11b71e4ac03b38
SHA18d53f024d3958cab7e5336f6ff2c11a68e2137be
SHA2561b1a7276d7df974c58e771e78a6e62fc50e4754cd0cbd8050bcc8debb450bd09
SHA51241bdcc6bed01423804c53767d5ddb4c740ced8cadb801ca6ca88bb47879c352376e112399f8f85a43583875b4af1bddf1a6c1a8818dffc7e59e6623d9223ed62
-
Filesize
129KB
MD5cf04506992e7a4b341e26a111a4a999b
SHA1cbeefa82924b003a2f0b7dc39f1c3792cdb58f0b
SHA256a28e4fc23d290a4aacd02d09764609614eaca7c7fc1e078eaccb45861c18083d
SHA5127d35e21869aca9dc01d983de94e73b4ea2fff843abb973645af5ccc8f3d0f936b3931e27af1e6a1b4847d22c06d2884ae9623fb6c4c1613d6c758b181ffd01ef
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd