Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2024 02:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://team.hex.tech/t/107712/opt_out/b5ed9d22-8426-4f20-bd06-7b17474de653
Resource
win10v2004-20240226-en
General
-
Target
https://team.hex.tech/t/107712/opt_out/b5ed9d22-8426-4f20-bd06-7b17474de653
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133545123931989941" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 624 chrome.exe 624 chrome.exe 1112 chrome.exe 1112 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 624 chrome.exe 624 chrome.exe 624 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 624 wrote to memory of 4044 624 chrome.exe 89 PID 624 wrote to memory of 4044 624 chrome.exe 89 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 1488 624 chrome.exe 91 PID 624 wrote to memory of 4364 624 chrome.exe 92 PID 624 wrote to memory of 4364 624 chrome.exe 92 PID 624 wrote to memory of 4600 624 chrome.exe 93 PID 624 wrote to memory of 4600 624 chrome.exe 93 PID 624 wrote to memory of 4600 624 chrome.exe 93 PID 624 wrote to memory of 4600 624 chrome.exe 93 PID 624 wrote to memory of 4600 624 chrome.exe 93 PID 624 wrote to memory of 4600 624 chrome.exe 93 PID 624 wrote to memory of 4600 624 chrome.exe 93 PID 624 wrote to memory of 4600 624 chrome.exe 93 PID 624 wrote to memory of 4600 624 chrome.exe 93 PID 624 wrote to memory of 4600 624 chrome.exe 93 PID 624 wrote to memory of 4600 624 chrome.exe 93 PID 624 wrote to memory of 4600 624 chrome.exe 93 PID 624 wrote to memory of 4600 624 chrome.exe 93 PID 624 wrote to memory of 4600 624 chrome.exe 93 PID 624 wrote to memory of 4600 624 chrome.exe 93 PID 624 wrote to memory of 4600 624 chrome.exe 93 PID 624 wrote to memory of 4600 624 chrome.exe 93 PID 624 wrote to memory of 4600 624 chrome.exe 93 PID 624 wrote to memory of 4600 624 chrome.exe 93 PID 624 wrote to memory of 4600 624 chrome.exe 93 PID 624 wrote to memory of 4600 624 chrome.exe 93 PID 624 wrote to memory of 4600 624 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://team.hex.tech/t/107712/opt_out/b5ed9d22-8426-4f20-bd06-7b17474de6531⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xe4,0x100,0x104,0xd8,0x108,0x7ff8f4479758,0x7ff8f4479768,0x7ff8f44797782⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1688 --field-trial-handle=1884,i,14835123289768103436,293667183900660493,131072 /prefetch:22⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2012 --field-trial-handle=1884,i,14835123289768103436,293667183900660493,131072 /prefetch:82⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1884,i,14835123289768103436,293667183900660493,131072 /prefetch:82⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3008 --field-trial-handle=1884,i,14835123289768103436,293667183900660493,131072 /prefetch:12⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3016 --field-trial-handle=1884,i,14835123289768103436,293667183900660493,131072 /prefetch:12⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3976 --field-trial-handle=1884,i,14835123289768103436,293667183900660493,131072 /prefetch:12⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 --field-trial-handle=1884,i,14835123289768103436,293667183900660493,131072 /prefetch:82⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 --field-trial-handle=1884,i,14835123289768103436,293667183900660493,131072 /prefetch:82⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4808 --field-trial-handle=1884,i,14835123289768103436,293667183900660493,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1112
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD50449a08dbfb1395033e5f2e8fd34fb6d
SHA13d3375eb19da53590dfd1d493a1b455bbd1dcbd3
SHA2565bc231b2f29145810c3b1d97f16fdccc7a9e9691e2acf218512244aea542f2dc
SHA512b5c3832b73a71afdbfe39abe2264152b08f3166eedfdfd37d5d91186d5012489b9c08b92ac6a44e70bb9179a3ce1652d147ccfd61deecfef4a8ef3388ef0f49f
-
Filesize
1KB
MD5d405b26a963b3c73a7726eb4ef036dab
SHA10e5f1dd1138f4dd12e74f48925c526defdc49f48
SHA2567f79aa3b871584ab36b5032808867f442c8ba3a9aacff5c928245e34253c1ddc
SHA512877fd5b88a08bf3f30db7a20ea4e83367a340d06792c736f8d8847b867044dd3a11874738f795a8d9ee90cf8b118f09f3cee613bc4f73e522778a1df4253cb7b
-
Filesize
1KB
MD5c8e4b473c4addcde76248a24d37a3552
SHA10341ab14059389ed0102cba797f085373f83f90b
SHA256a5e954ae8de3b34bd82276210619335d321a573ace1bdab245dc202c8c1209dc
SHA512e01fc71845487ff18635bea133a3cd895db6f31df584fdab42366e8a08feab6b22a5d9a843116a44c258a45005e282e5abdcb694203825ef3de421e72db4678b
-
Filesize
6KB
MD59b3c154c91931100a28d68ab15c6fc0d
SHA18d85cfcdcaf7a16e063bb221369cadf73b241b8b
SHA256cd63672d97948a3a97287bd2361551775ad3d6b36e2378d8d91ff6b6e7df1313
SHA5126fba586f39fedf5d59a5837226f86c30ee61add64d84e9456692828aa08034fcc5f6af59be31c5efdad68a7f3e113e70e725609f0e5751fd1658f2f969e69afb
-
Filesize
128KB
MD5e542196a1329b56e2b5ebc9aec47dd08
SHA166d221264be472a144509f5c0d2c57dec83ccffb
SHA256d0ca11fc04a43c1380b696eff7cc66aa9bf418e315f9a61f9e2dc96a0a3324cd
SHA5126dbd856e796ccc30d982743d4d3ad170b3099ea725adfe6f358e1712352112c20969a0c257b24763189aad0673fac5bfececd6f5cf977571d715631ec0167ec5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd