Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2024 17:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://lir.ae
Resource
win10v2004-20240226-en
General
-
Target
http://lir.ae
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133545645055296547" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3308 chrome.exe 3308 chrome.exe 2852 chrome.exe 2852 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe Token: SeShutdownPrivilege 3308 chrome.exe Token: SeCreatePagefilePrivilege 3308 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe 3308 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3308 wrote to memory of 2672 3308 chrome.exe 87 PID 3308 wrote to memory of 2672 3308 chrome.exe 87 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 4888 3308 chrome.exe 89 PID 3308 wrote to memory of 3612 3308 chrome.exe 90 PID 3308 wrote to memory of 3612 3308 chrome.exe 90 PID 3308 wrote to memory of 3572 3308 chrome.exe 91 PID 3308 wrote to memory of 3572 3308 chrome.exe 91 PID 3308 wrote to memory of 3572 3308 chrome.exe 91 PID 3308 wrote to memory of 3572 3308 chrome.exe 91 PID 3308 wrote to memory of 3572 3308 chrome.exe 91 PID 3308 wrote to memory of 3572 3308 chrome.exe 91 PID 3308 wrote to memory of 3572 3308 chrome.exe 91 PID 3308 wrote to memory of 3572 3308 chrome.exe 91 PID 3308 wrote to memory of 3572 3308 chrome.exe 91 PID 3308 wrote to memory of 3572 3308 chrome.exe 91 PID 3308 wrote to memory of 3572 3308 chrome.exe 91 PID 3308 wrote to memory of 3572 3308 chrome.exe 91 PID 3308 wrote to memory of 3572 3308 chrome.exe 91 PID 3308 wrote to memory of 3572 3308 chrome.exe 91 PID 3308 wrote to memory of 3572 3308 chrome.exe 91 PID 3308 wrote to memory of 3572 3308 chrome.exe 91 PID 3308 wrote to memory of 3572 3308 chrome.exe 91 PID 3308 wrote to memory of 3572 3308 chrome.exe 91 PID 3308 wrote to memory of 3572 3308 chrome.exe 91 PID 3308 wrote to memory of 3572 3308 chrome.exe 91 PID 3308 wrote to memory of 3572 3308 chrome.exe 91 PID 3308 wrote to memory of 3572 3308 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://lir.ae1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c0ee9758,0x7ff9c0ee9768,0x7ff9c0ee97782⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1876,i,13148426701678899016,4804719428722662294,131072 /prefetch:22⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1876,i,13148426701678899016,4804719428722662294,131072 /prefetch:82⤵PID:3612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1876,i,13148426701678899016,4804719428722662294,131072 /prefetch:82⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2848 --field-trial-handle=1876,i,13148426701678899016,4804719428722662294,131072 /prefetch:12⤵PID:436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2864 --field-trial-handle=1876,i,13148426701678899016,4804719428722662294,131072 /prefetch:12⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4036 --field-trial-handle=1876,i,13148426701678899016,4804719428722662294,131072 /prefetch:12⤵PID:1576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2876 --field-trial-handle=1876,i,13148426701678899016,4804719428722662294,131072 /prefetch:12⤵PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 --field-trial-handle=1876,i,13148426701678899016,4804719428722662294,131072 /prefetch:82⤵PID:4036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 --field-trial-handle=1876,i,13148426701678899016,4804719428722662294,131072 /prefetch:82⤵PID:2536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3852 --field-trial-handle=1876,i,13148426701678899016,4804719428722662294,131072 /prefetch:12⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2340 --field-trial-handle=1876,i,13148426701678899016,4804719428722662294,131072 /prefetch:12⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3464 --field-trial-handle=1876,i,13148426701678899016,4804719428722662294,131072 /prefetch:12⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4100 --field-trial-handle=1876,i,13148426701678899016,4804719428722662294,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2852
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD548dc2df8b29e5af127c1464d45153404
SHA14802e661f234bd5bbed0bc32fdab75a1be47c5f2
SHA256e5d6214139ea0142b324227cbf9b42a03e71a787644dd92e165a4e616f7d862a
SHA5124d67ae5d3d4711a9b77d275ad078af68dd17293737db9f273ce59e5edd6e6d4aeb2db2a5dc8db8331f98badf5b3b073cbb40e203db5845650decf0b9744ea37b
-
Filesize
6KB
MD5e4c61220b365f28c7ce4a53b63fd5c78
SHA19f63dac1c29d10f87a1e3070346123bc41ea7973
SHA25683153bbd41af5009f3fa7e431e194de8f9f19b3c58993d5c9bfe3b2f927ad834
SHA512c142e31550009921685a45e546b4beae983d546cab088069eb842e38b5426a480870d542841f0bb234392763231cb7cdcd432ee8dade47e8b84ba723115e2065
-
Filesize
253KB
MD5c64004efd213d9ee40b757c53370e78a
SHA1068f9fe9010bb0f2ebc3b4920e98bbc8ee1b4f5a
SHA25654a8d464f635b640e106db2224ecb7ee42b99cceb65e470791fc180770411d44
SHA51284978a77101e9152b95f79c61ad085290579453b5b3d2900a6f83a05362e225b4dcfb38aa642d353f4848c7c15fa9f26cb450089084968ab5eff25d26568df04
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd