Analysis
-
max time kernel
170s -
max time network
169s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
13-03-2024 04:42
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://lhoiu.mypi.co/top/top.php?main_domain=http://mail.aaaaaaa.aaa.aa&[email protected]&subdomain=http://mail.aaaaaaa.aaa.aa
Resource
win10-20240221-en
General
-
Target
https://lhoiu.mypi.co/top/top.php?main_domain=http://mail.aaaaaaa.aaa.aa&[email protected]&subdomain=http://mail.aaaaaaa.aaa.aa
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133547785599523152" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3088 chrome.exe 3088 chrome.exe 1948 chrome.exe 1948 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3088 wrote to memory of 812 3088 chrome.exe 75 PID 3088 wrote to memory of 812 3088 chrome.exe 75 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3656 3088 chrome.exe 77 PID 3088 wrote to memory of 3528 3088 chrome.exe 78 PID 3088 wrote to memory of 3528 3088 chrome.exe 78 PID 3088 wrote to memory of 3484 3088 chrome.exe 79 PID 3088 wrote to memory of 3484 3088 chrome.exe 79 PID 3088 wrote to memory of 3484 3088 chrome.exe 79 PID 3088 wrote to memory of 3484 3088 chrome.exe 79 PID 3088 wrote to memory of 3484 3088 chrome.exe 79 PID 3088 wrote to memory of 3484 3088 chrome.exe 79 PID 3088 wrote to memory of 3484 3088 chrome.exe 79 PID 3088 wrote to memory of 3484 3088 chrome.exe 79 PID 3088 wrote to memory of 3484 3088 chrome.exe 79 PID 3088 wrote to memory of 3484 3088 chrome.exe 79 PID 3088 wrote to memory of 3484 3088 chrome.exe 79 PID 3088 wrote to memory of 3484 3088 chrome.exe 79 PID 3088 wrote to memory of 3484 3088 chrome.exe 79 PID 3088 wrote to memory of 3484 3088 chrome.exe 79 PID 3088 wrote to memory of 3484 3088 chrome.exe 79 PID 3088 wrote to memory of 3484 3088 chrome.exe 79 PID 3088 wrote to memory of 3484 3088 chrome.exe 79 PID 3088 wrote to memory of 3484 3088 chrome.exe 79 PID 3088 wrote to memory of 3484 3088 chrome.exe 79 PID 3088 wrote to memory of 3484 3088 chrome.exe 79 PID 3088 wrote to memory of 3484 3088 chrome.exe 79 PID 3088 wrote to memory of 3484 3088 chrome.exe 79
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://lhoiu.mypi.co/top/top.php?main_domain=http://mail.aaaaaaa.aaa.aa&[email protected]&subdomain=http://mail.aaaaaaa.aaa.aa1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffddb809758,0x7ffddb809768,0x7ffddb8097782⤵PID:812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1836,i,1501998099722054287,14472189429564244419,131072 /prefetch:22⤵PID:3656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1796 --field-trial-handle=1836,i,1501998099722054287,14472189429564244419,131072 /prefetch:82⤵PID:3528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2052 --field-trial-handle=1836,i,1501998099722054287,14472189429564244419,131072 /prefetch:82⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2864 --field-trial-handle=1836,i,1501998099722054287,14472189429564244419,131072 /prefetch:12⤵PID:4360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2872 --field-trial-handle=1836,i,1501998099722054287,14472189429564244419,131072 /prefetch:12⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4388 --field-trial-handle=1836,i,1501998099722054287,14472189429564244419,131072 /prefetch:12⤵PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4880 --field-trial-handle=1836,i,1501998099722054287,14472189429564244419,131072 /prefetch:82⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 --field-trial-handle=1836,i,1501998099722054287,14472189429564244419,131072 /prefetch:82⤵PID:592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4908 --field-trial-handle=1836,i,1501998099722054287,14472189429564244419,131072 /prefetch:12⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4964 --field-trial-handle=1836,i,1501998099722054287,14472189429564244419,131072 /prefetch:12⤵PID:3356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4340 --field-trial-handle=1836,i,1501998099722054287,14472189429564244419,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD5df073928fd5523d3f9e5f6c56d39aeaf
SHA1104d376f852dc9b7efb20a06455a27a60f87172d
SHA256a7072c2a54d66a41ab7a7659d6a3c56c2aabce216b71d8fbbe0b7fb2d3b17da3
SHA5127bb1e5ce7b467ec15030c19e3385d84368bd42cd35cc577c026b24ca3667df61688e9fc9317ab2b40a249ecc7951bb2f51a0aca982cd5e06b1b9f7a354b6b3e3
-
Filesize
1KB
MD5d5c91446bc81ffd182ff8b6b1c0a3953
SHA1633f9bf1831c2d0f1ca56a9ab7adbc88db6d169a
SHA25694fb0ade7cdf159c2862a575590976e57ca82a7dc8fa6eae44206f172e0b1403
SHA51245a68f22de03806d92d6e16d4d5da557d6bfe864265e8667f74b894dd1d2cdbd86b182a6d3027e3f7ad06c2286e99f9af62d2d2ed472bf887e1a2f040ef79646
-
Filesize
5KB
MD5af46c75a9fcf60970698a639091db8f6
SHA10bf36df9569022f8bf0c738e2de78134997a5985
SHA25694387f9151744995759cdc800772e35b09bae69e362ddda861f20ca742b3acd5
SHA5127d2523aab22507fbc4987ec1b288fd98d7a01adea4d06fd3eb57451a5028abf86353f2d7cce67f79dddd93802b019fd23e3901616ee6203366ab74c68efacdf4
-
Filesize
8KB
MD58ca3be1ee4b380a82fcc44a38537b373
SHA13a083d9d220155789d444d652cf0486396e98464
SHA25623d071343aec3bdf5675d89b91e8c58bdcd8cd2f2ef92d9ba67d31c3aa9cc903
SHA512c0d32d99224dabe2e5c2f8b1a554f09149f49813084c0467ec8e70de5e775f05982edf126fc2449d95a663f957d5ebab12efdd109589f00481579f2412cd8764
-
Filesize
9KB
MD5302c9b4d1ca73d290a3fd51efe19f316
SHA155c8b38e1de75de5589a7837bb3ce336d07feeb2
SHA256d5ab6e38283b9758afb486d3f70072e0a2e7d17a7fc323b09b90b2e7ef129d74
SHA512c3d7397a8bee25ae1732dfcfbb8257a0d5959d81a415e563b35ca57c3a0473ceef0cda58ec7bf0afb7af00118421072e6457268ac1239c0a441c76608906770d
-
Filesize
9KB
MD5c87c706da33daa645ae8e61f235ac9e5
SHA161e529fa17c78af6fb397d25b5e9c23106a85d28
SHA25609fe0f8aa5c115916d2ff5700551f27e5da2879f26ce21493ec82f81f56e41ca
SHA512004355ceab35080ad6bc2b1c569401fbe858bb4eab8af79a7cf8ee767b46a97515100a139cac181842f17172498dedf05c256435b72c199f65dbe5a58103dace
-
Filesize
9KB
MD59d06a7d0f943efe235d28f6e979ece09
SHA1b1ec7260ad5916ac6e0311a2e30a2b70de58a15b
SHA2568e84ff26cb3fe05c2997c529ccd20bcb1b26377eda4e90c5531f58cca7a4cd31
SHA5124a92820273e0a7a4b581902b646dd193308709f0d2056bc69f94eedee8971c851923b2e20070e149807e362a0d8b67a7ea23f24f31804d9b4b55df0ee7822fe6
-
Filesize
254KB
MD53b78ddbbf6a3ccd86635370de7488150
SHA163ff7a3f3695c6121d03ef8b37b58878bb802a2f
SHA25610475189c604426bf54069be2d55b3405666379cb9b7de6921259f4ed28615ad
SHA512c76b209dbc530c61e1f6dd78f0d06ab27d5d789a98ffb5dceb91db0b4bd51164fad6ee3879252a5efb220b724b95eba8fde21f29e68464dab9a9fa6c794965bf
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd