Analysis
-
max time kernel
1799s -
max time network
1684s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
12/03/2024, 18:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://project-splinta.itch.io/mapbundlebaldi
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
https://project-splinta.itch.io/mapbundlebaldi
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
https://project-splinta.itch.io/mapbundlebaldi
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
https://project-splinta.itch.io/mapbundlebaldi
Resource
win11-20240221-en
General
-
Target
https://project-splinta.itch.io/mapbundlebaldi
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133547433988741640" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3488 chrome.exe 3488 chrome.exe 4364 chrome.exe 4364 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3488 chrome.exe 3488 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe Token: SeShutdownPrivilege 3488 chrome.exe Token: SeCreatePagefilePrivilege 3488 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe 3488 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3488 wrote to memory of 1376 3488 chrome.exe 74 PID 3488 wrote to memory of 1376 3488 chrome.exe 74 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 2828 3488 chrome.exe 76 PID 3488 wrote to memory of 4556 3488 chrome.exe 77 PID 3488 wrote to memory of 4556 3488 chrome.exe 77 PID 3488 wrote to memory of 3620 3488 chrome.exe 78 PID 3488 wrote to memory of 3620 3488 chrome.exe 78 PID 3488 wrote to memory of 3620 3488 chrome.exe 78 PID 3488 wrote to memory of 3620 3488 chrome.exe 78 PID 3488 wrote to memory of 3620 3488 chrome.exe 78 PID 3488 wrote to memory of 3620 3488 chrome.exe 78 PID 3488 wrote to memory of 3620 3488 chrome.exe 78 PID 3488 wrote to memory of 3620 3488 chrome.exe 78 PID 3488 wrote to memory of 3620 3488 chrome.exe 78 PID 3488 wrote to memory of 3620 3488 chrome.exe 78 PID 3488 wrote to memory of 3620 3488 chrome.exe 78 PID 3488 wrote to memory of 3620 3488 chrome.exe 78 PID 3488 wrote to memory of 3620 3488 chrome.exe 78 PID 3488 wrote to memory of 3620 3488 chrome.exe 78 PID 3488 wrote to memory of 3620 3488 chrome.exe 78 PID 3488 wrote to memory of 3620 3488 chrome.exe 78 PID 3488 wrote to memory of 3620 3488 chrome.exe 78 PID 3488 wrote to memory of 3620 3488 chrome.exe 78 PID 3488 wrote to memory of 3620 3488 chrome.exe 78 PID 3488 wrote to memory of 3620 3488 chrome.exe 78 PID 3488 wrote to memory of 3620 3488 chrome.exe 78 PID 3488 wrote to memory of 3620 3488 chrome.exe 78
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://project-splinta.itch.io/mapbundlebaldi1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff9d8c59758,0x7ff9d8c59768,0x7ff9d8c597782⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1780,i,2684210516344078390,5609814587121809149,131072 /prefetch:22⤵PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1816 --field-trial-handle=1780,i,2684210516344078390,5609814587121809149,131072 /prefetch:82⤵PID:4556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2068 --field-trial-handle=1780,i,2684210516344078390,5609814587121809149,131072 /prefetch:82⤵PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2860 --field-trial-handle=1780,i,2684210516344078390,5609814587121809149,131072 /prefetch:12⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2868 --field-trial-handle=1780,i,2684210516344078390,5609814587121809149,131072 /prefetch:12⤵PID:2612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 --field-trial-handle=1780,i,2684210516344078390,5609814587121809149,131072 /prefetch:82⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 --field-trial-handle=1780,i,2684210516344078390,5609814587121809149,131072 /prefetch:82⤵PID:4904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4428 --field-trial-handle=1780,i,2684210516344078390,5609814587121809149,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4364
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD54685380ea450c24156aed680acc4ca43
SHA17c0e0b7cb2352ca3a8ab37a323eb2c6660a688ad
SHA25651d11ab88b4ace291062d24f062ee27354b0c4bce1f92e0f7db3a04ac9c4032a
SHA51240e9ea1fc79a79caf19ca1ca365e1ee307dd0ba4a348639762123faed62e6f5ede70938833b5d885ec270b2cf9238e061836a1ac3372e9ae1936e3c5ace41dce
-
Filesize
1KB
MD5a320765a9570c4072eb37ef60c8c447f
SHA1def4f2e9707d9df2d2742bf3895e5fe2c8538947
SHA256808f5e777ef70e03f150d550611ce35eb6c1841a578cccb9e46d9f3e40cc0f35
SHA5122976d0671ae71672695c13bc0cdfe17332d7ef8b75c28771f8366141db9e239ae4dc755df38b5060ea8967a94dda2d6a85f9886f27d8d7622d4b9e9c1f2ddeec
-
Filesize
538B
MD5ff85bca8519d7381af5f1e8dc5564162
SHA13d5e4403930795bb97935e09ff9fe4947aec7ea6
SHA25676282d769ff0130659f6ce057244440debd61d5bdfc9f1a65d622700786173cf
SHA5120e4edc1b3c9b1067afba4a6b78ac292c3d7d42fbab216d7e577014a9d4fc4421a987b2f9e11354e89155e7efd23702c644b23da4f18ff7248fb0750c5719861e
-
Filesize
6KB
MD5cce37bfb3e7ebf8a32208f80936f6868
SHA1053fc6ddb43cb7081ec0f289fb26441c5d375262
SHA256df32ba8e1c6b9bc430cebb6376a14735f118e81ccf9981fcf85e8c5392be185f
SHA512fa3a50412f89b84fcc00437d36dffc514bbb7e4509616c298716a4e935915ca3b4238beb6bdf963c2fe475c4ccd455e4a1d31971f691d626e30a218e710df29b
-
Filesize
130KB
MD565e7e9f7bfa9319b76f123dcdb437a1f
SHA105dc738939572db28fcf99d0de829b2df97d2d3d
SHA256e4b41453fc4ec77150de9724adb1e974b4842ebed459d51fff9564b95c386108
SHA5123cd036d2e0e1a2d91fd2c2a920237c07bc41d0b4aba67628e2a731518ced26c177c70927f57efb17256c2a09cafc2806276cda5b46a7b5e9541902373b6ef27a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd