Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 14:43
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cloudflare-ipfs.com/ipfs/bafkreifidxehgwm2bcooph6jl3ebeh4ssghxpgj7x57zpgr47e7lw3j3om?filename=Inbox.html#[email protected]
Resource
win10v2004-20240226-en
General
-
Target
https://cloudflare-ipfs.com/ipfs/bafkreifidxehgwm2bcooph6jl3ebeh4ssghxpgj7x57zpgr47e7lw3j3om?filename=Inbox.html#[email protected]
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
Processes:
flow ioc 5 cloudflare-ipfs.com 10 cloudflare-ipfs.com 11 cloudflare-ipfs.com 12 cloudflare-ipfs.com -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133549010550239562" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 1888 chrome.exe 1888 chrome.exe 5968 chrome.exe 5968 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 1888 chrome.exe 1888 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe Token: SeShutdownPrivilege 1888 chrome.exe Token: SeCreatePagefilePrivilege 1888 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe 1888 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1888 wrote to memory of 116 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 116 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1180 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1692 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 1692 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 2420 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 2420 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 2420 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 2420 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 2420 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 2420 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 2420 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 2420 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 2420 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 2420 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 2420 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 2420 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 2420 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 2420 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 2420 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 2420 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 2420 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 2420 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 2420 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 2420 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 2420 1888 chrome.exe chrome.exe PID 1888 wrote to memory of 2420 1888 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cloudflare-ipfs.com/ipfs/bafkreifidxehgwm2bcooph6jl3ebeh4ssghxpgj7x57zpgr47e7lw3j3om?filename=Inbox.html#[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbfab79758,0x7ffbfab79768,0x7ffbfab797782⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1844,i,9145777677187156075,15155065335551736427,131072 /prefetch:22⤵PID:1180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=1844,i,9145777677187156075,15155065335551736427,131072 /prefetch:82⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2164 --field-trial-handle=1844,i,9145777677187156075,15155065335551736427,131072 /prefetch:82⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3140 --field-trial-handle=1844,i,9145777677187156075,15155065335551736427,131072 /prefetch:12⤵PID:1752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3156 --field-trial-handle=1844,i,9145777677187156075,15155065335551736427,131072 /prefetch:12⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 --field-trial-handle=1844,i,9145777677187156075,15155065335551736427,131072 /prefetch:82⤵PID:4092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 --field-trial-handle=1844,i,9145777677187156075,15155065335551736427,131072 /prefetch:82⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4660 --field-trial-handle=1844,i,9145777677187156075,15155065335551736427,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5968
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3212
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:5716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD575c920564c4d8d0ec208af1e1201c9f7
SHA1a1c4cc275085b8634cd262d3f92a6e06f72a1bfa
SHA2569ee56ff498fee0f915cc73244ed7bb10aed3f088bd68fe990a47aacb1f1098bc
SHA51287c18b38cad97e15cc254bef46d9796e7be62c1d71446a493c638e2519fb0efa544f44381593c93c116c3819aa836b3fb45992e57c459e03227d1251b206a68e
-
Filesize
1KB
MD5842461c238487d68d23c8a5e672c02d4
SHA164e876c31d7bbc7ea1b4548b3a4d8ced671be2c7
SHA2560a85d491e01de0987a0f357d64848ed9574155ce938c9d4992b3004111e29547
SHA51203af1789d18585099a5690232e42eee088bceacda623d3ec45d10c3541814a9571e864e1fc2f3e483cacc074d87ee1864e05f9d98ef082bb163d3dae27bbf36c
-
Filesize
530B
MD545ef3b95a998bdc297ea58c7e9c365e8
SHA15a11a697157bd743e9ea10848815e8b516fddb72
SHA25600e5ea93efdb751794ae2ed197883212e35b75945e3e06415b3b3042d4352f2c
SHA5123227f8ac7f3296ec93940718296e2d66ace2d4eb6982fceb9fd94f88b70e7033646ebd96b11d24708723f85787e19d739f63d26b7ea41a9e7e4d68a67e413db1
-
Filesize
6KB
MD59709a62f79e0c0a4a4afa261adc83f5d
SHA169eea61ce26917b1811f2e049e345e2b34851e3c
SHA256e8a1c69d4843e85738b2026e0bf2c8ad6ed3eaf970c489cd6986c026e2ae9057
SHA5120bef5a788c6dbc0c834a12a28eb8ee9082de9f2aac761a402e1b4b93f43bb8b83fe7c057ebafa3e3e8308e18d6aee48324acbfa61c606670b97526baadc56997
-
Filesize
5KB
MD5a23b1ede11942460066cfce64462eae0
SHA14e5f7f7fb0bbd16b053d5e3724002bd5ff41b560
SHA256de66189bb1be720e74cf4519b9e6923b3ac9386e7e4b6c951d80d2a4e2b767f9
SHA51285c0122d9b608f771217edf4021fa7d2edd795af69f67fb83570e52caaadd692501de709fd0de418c3718fcfb4f487956d44a8fbf8ee754ae56f4cfe36316fdc
-
Filesize
5KB
MD50d193f37188162d3f9e76be3d8eb3d93
SHA14ed0833804c8d6c6491466d00e02590adf20324d
SHA25690e11cefad90995445373d558a7dc8c500bb60c152206dd645f41a562b1f2c4a
SHA5122a893c42e14f15c46ad57673a1aad6d38def73302f4b0f25bef8c0c88dac947c82fcce995596e68ec7075a6227b03bc55e693e74d4e0effe3632a662d8b16073
-
Filesize
128KB
MD55c9d44e79aefa9fb053e0955fc4dad94
SHA1e89b7f177b104ce0b8bbe47deb2eb5b912f5da18
SHA256b598ad5bc68e62b4e496791604b0f1fba6071b3e534aa9cdf32abc6139975bdf
SHA5125ce5147b4a2344d6196fb8c1abc09a7d0e45006bec34c750d931f48e3fdc211e35a9e13b840039a5021f330ede2499738cb429d487404ec6bff2659bf089991c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e