Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 05:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://g6hg7ppw.r.us-east-1.awstrack.me/L0/https:%2F%2Flihi.cc%2FKfOsp%2Fzh-hk/1/0100018e0c05d401-8a797b48-df23-4f36-9a09-35522746baa0-000000/ztYfA_897sqpGq7V8f8dNM7Rvko=363
Resource
win10v2004-20240226-en
General
-
Target
https://g6hg7ppw.r.us-east-1.awstrack.me/L0/https:%2F%2Flihi.cc%2FKfOsp%2Fzh-hk/1/0100018e0c05d401-8a797b48-df23-4f36-9a09-35522746baa0-000000/ztYfA_897sqpGq7V8f8dNM7Rvko=363
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133549555848977834" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4644 chrome.exe 4644 chrome.exe 4168 chrome.exe 4168 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4644 wrote to memory of 548 4644 chrome.exe 89 PID 4644 wrote to memory of 548 4644 chrome.exe 89 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 3940 4644 chrome.exe 91 PID 4644 wrote to memory of 5108 4644 chrome.exe 92 PID 4644 wrote to memory of 5108 4644 chrome.exe 92 PID 4644 wrote to memory of 3028 4644 chrome.exe 93 PID 4644 wrote to memory of 3028 4644 chrome.exe 93 PID 4644 wrote to memory of 3028 4644 chrome.exe 93 PID 4644 wrote to memory of 3028 4644 chrome.exe 93 PID 4644 wrote to memory of 3028 4644 chrome.exe 93 PID 4644 wrote to memory of 3028 4644 chrome.exe 93 PID 4644 wrote to memory of 3028 4644 chrome.exe 93 PID 4644 wrote to memory of 3028 4644 chrome.exe 93 PID 4644 wrote to memory of 3028 4644 chrome.exe 93 PID 4644 wrote to memory of 3028 4644 chrome.exe 93 PID 4644 wrote to memory of 3028 4644 chrome.exe 93 PID 4644 wrote to memory of 3028 4644 chrome.exe 93 PID 4644 wrote to memory of 3028 4644 chrome.exe 93 PID 4644 wrote to memory of 3028 4644 chrome.exe 93 PID 4644 wrote to memory of 3028 4644 chrome.exe 93 PID 4644 wrote to memory of 3028 4644 chrome.exe 93 PID 4644 wrote to memory of 3028 4644 chrome.exe 93 PID 4644 wrote to memory of 3028 4644 chrome.exe 93 PID 4644 wrote to memory of 3028 4644 chrome.exe 93 PID 4644 wrote to memory of 3028 4644 chrome.exe 93 PID 4644 wrote to memory of 3028 4644 chrome.exe 93 PID 4644 wrote to memory of 3028 4644 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://g6hg7ppw.r.us-east-1.awstrack.me/L0/https:%2F%2Flihi.cc%2FKfOsp%2Fzh-hk/1/0100018e0c05d401-8a797b48-df23-4f36-9a09-35522746baa0-000000/ztYfA_897sqpGq7V8f8dNM7Rvko=3631⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa41449758,0x7ffa41449768,0x7ffa414497782⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1896,i,9774525520820317042,6320841963015903923,131072 /prefetch:22⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2020 --field-trial-handle=1896,i,9774525520820317042,6320841963015903923,131072 /prefetch:82⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2112 --field-trial-handle=1896,i,9774525520820317042,6320841963015903923,131072 /prefetch:82⤵PID:3028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2956 --field-trial-handle=1896,i,9774525520820317042,6320841963015903923,131072 /prefetch:12⤵PID:3592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2964 --field-trial-handle=1896,i,9774525520820317042,6320841963015903923,131072 /prefetch:12⤵PID:780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 --field-trial-handle=1896,i,9774525520820317042,6320841963015903923,131072 /prefetch:82⤵PID:1412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 --field-trial-handle=1896,i,9774525520820317042,6320841963015903923,131072 /prefetch:82⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5564 --field-trial-handle=1896,i,9774525520820317042,6320841963015903923,131072 /prefetch:12⤵PID:3212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4764 --field-trial-handle=1896,i,9774525520820317042,6320841963015903923,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4168
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD57dee5e737275cdcabf7086c19fcb4ed8
SHA19b7ad7d2813783b99560721c7b93bb1d8290f2a8
SHA256ac2cab567b8def82a88d6a3f592f7ae853285aeca9aa71e03c87515d7594acb2
SHA512453a2629f7234f8575067f8c2dfe46e051ba45d82588b197d14e5b3a53b5afd3e6b770f55cdded275cdb6e972ecfa0f2c6287b3da0b4b747caef6c31a1ab8a52
-
Filesize
1KB
MD5e3448c68c2385bb34da832ebbbad1138
SHA1bc3e90146dd1835a924262671fc86b886fb57d78
SHA25660226a70c39c39c0adfb93c4b42279a168885325a8c479b7121cda78ef5796bd
SHA5127c3c168aa85adbdaa29fdb32f708ad100ebf87b5ac6b02e3b7c64e5833183d842f391da3446ba456f223c5e09f39e31bd7c71f8d3896fe4aa01b1d43fc770deb
-
Filesize
2KB
MD5c4698675856187f72469863d64dc954b
SHA1ec992c0f7537b4f1e1fb22cb0960fd861a787157
SHA2560d55cde66fcc0be7923832c47bef53fbe0827f302493eeb2804eae2c99eec47d
SHA512ba79c88c538dbcb7c6621374215e39047453076dc9dc34604828cddaa68b1b3afa86e1b15ce1bc1751b4035e5c75b75072f7e7913b1e71a1bec87605838ae533
-
Filesize
706B
MD5fadb13e47c5c3ef616889c8e4b8e28c5
SHA1de6c51bd0578044699f5642508d46c20d4c32f34
SHA25606b7f6df00a505070fe0e521a4676fc9dbeb75db227ff3c11923caeb7b209f4d
SHA512456d50ad942d33c796c1a29bdc94be1f1da9fb4e8fea88868b48b7429f1c0d99ced8f021e4f837c54dae7ebe2d5bf91a660b174f18309b4011e535544bb7df6e
-
Filesize
6KB
MD526dbcdf8040d649456b0decaf499b747
SHA1d20f22a108123746218b23d397eed98f6fded61c
SHA2561462f5d96003c63c42bbff3d3ad53172b351d37fb87e5596a4b9cfcd73b77e28
SHA512c0a4bc61232474a323974c1aa3b2359642b73fd7135963c57ab47190f27a85c2f0cae0aef4ad4b7a692a79e5e6a74dba751ddbf5d97daac1aa809358a8a6f6f4
-
Filesize
128KB
MD5e79e07623546250a7fa4e4953f303813
SHA1bfd1782616d73dc2e865a13b5dec61b1fac2bdd6
SHA25660f5d352a5599267b749af5b71b72bbe9d34b449a058c54b52c10de5d21490fa
SHA5122a21a27722ea70eda0718908a69ec262e205e7a84ed5bbdd3578a322d5a7d5b60b4dfbebd22e88309a344c3a0514d3d85c0de6276f3090394ed2a66cead9b74d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd