Analysis
-
max time kernel
300s -
max time network
261s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 06:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ruperstat.ru/ext/datastore/pixel/img.php?src=index&domain_id=149194&visit_id=990587464&rand=4012605&ip=138.68.107.159&page=https%3a%2f%2fskysmart.ru%2farticles%2fenglish%2fmodalnyj-glagol-have-to%3fysclid%3dltsa7c5j4b132891890
Resource
win10v2004-20240226-en
General
-
Target
https://ruperstat.ru/ext/datastore/pixel/img.php?src=index&domain_id=149194&visit_id=990587464&rand=4012605&ip=138.68.107.159&page=https%3a%2f%2fskysmart.ru%2farticles%2fenglish%2fmodalnyj-glagol-have-to%3fysclid%3dltsa7c5j4b132891890
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133549592946245953" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1912 chrome.exe 1912 chrome.exe 1592 chrome.exe 1592 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1912 chrome.exe 1912 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1912 wrote to memory of 4500 1912 chrome.exe 88 PID 1912 wrote to memory of 4500 1912 chrome.exe 88 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 4064 1912 chrome.exe 90 PID 1912 wrote to memory of 3656 1912 chrome.exe 91 PID 1912 wrote to memory of 3656 1912 chrome.exe 91 PID 1912 wrote to memory of 1628 1912 chrome.exe 92 PID 1912 wrote to memory of 1628 1912 chrome.exe 92 PID 1912 wrote to memory of 1628 1912 chrome.exe 92 PID 1912 wrote to memory of 1628 1912 chrome.exe 92 PID 1912 wrote to memory of 1628 1912 chrome.exe 92 PID 1912 wrote to memory of 1628 1912 chrome.exe 92 PID 1912 wrote to memory of 1628 1912 chrome.exe 92 PID 1912 wrote to memory of 1628 1912 chrome.exe 92 PID 1912 wrote to memory of 1628 1912 chrome.exe 92 PID 1912 wrote to memory of 1628 1912 chrome.exe 92 PID 1912 wrote to memory of 1628 1912 chrome.exe 92 PID 1912 wrote to memory of 1628 1912 chrome.exe 92 PID 1912 wrote to memory of 1628 1912 chrome.exe 92 PID 1912 wrote to memory of 1628 1912 chrome.exe 92 PID 1912 wrote to memory of 1628 1912 chrome.exe 92 PID 1912 wrote to memory of 1628 1912 chrome.exe 92 PID 1912 wrote to memory of 1628 1912 chrome.exe 92 PID 1912 wrote to memory of 1628 1912 chrome.exe 92 PID 1912 wrote to memory of 1628 1912 chrome.exe 92 PID 1912 wrote to memory of 1628 1912 chrome.exe 92 PID 1912 wrote to memory of 1628 1912 chrome.exe 92 PID 1912 wrote to memory of 1628 1912 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ruperstat.ru/ext/datastore/pixel/img.php?src=index&domain_id=149194&visit_id=990587464&rand=4012605&ip=138.68.107.159&page=https%3a%2f%2fskysmart.ru%2farticles%2fenglish%2fmodalnyj-glagol-have-to%3fysclid%3dltsa7c5j4b1328918901⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc9c539758,0x7ffc9c539768,0x7ffc9c5397782⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1884,i,3475783680424766222,1551500159601273635,131072 /prefetch:22⤵PID:4064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1884,i,3475783680424766222,1551500159601273635,131072 /prefetch:82⤵PID:3656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2164 --field-trial-handle=1884,i,3475783680424766222,1551500159601273635,131072 /prefetch:82⤵PID:1628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3028 --field-trial-handle=1884,i,3475783680424766222,1551500159601273635,131072 /prefetch:12⤵PID:1812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3040 --field-trial-handle=1884,i,3475783680424766222,1551500159601273635,131072 /prefetch:12⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 --field-trial-handle=1884,i,3475783680424766222,1551500159601273635,131072 /prefetch:82⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 --field-trial-handle=1884,i,3475783680424766222,1551500159601273635,131072 /prefetch:82⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3800 --field-trial-handle=1884,i,3475783680424766222,1551500159601273635,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1592
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53fd6b2da8d849c1bd423224e5c111f5d
SHA1b0b8d2d53632ffd37daec660e20fa5b3c92c7ecb
SHA256bb6edbaeefa848d19e7831f49a988809fbadce85ace3cd02b1b260538ce10c1d
SHA512113f2d32880e44da78969f934d7ec125cc33a409dc71f4ca730f00a1edd2c46e02f0f322f96697dd859a9d9165848e245065a9c30e1da199d8dd955e6a1cfaba
-
Filesize
6KB
MD5ecdad39e5862618f8634ac4e66c5ed89
SHA1d38eb72f8aa12477eabd84c7f6a07a9f5e420a85
SHA256685beecbe53897eba98350c6c232c5eb67b6c23623bef5134f24783b4c8916a2
SHA512e00b91d8ad84c4d937f2f1e59d912477f68681ba88d68b83ac711374d12cc5a2a3673795b9f9f4042ffb1728215406ace65ca4db4a395c6d90a575cb0c32d27b
-
Filesize
6KB
MD50e88365907b14a816ac2ae135fd38ce2
SHA18f73413c81e7e6d6083469d2d4f69d76a3b3c8ff
SHA256c7714d5528110bf2d0713cf46f129d45b7d27040992d43e36b5b84795c8bf3f0
SHA512bead631f05a0e03977790fdd46d9cea05fc646013d3a7fb8840badede37e4d8b14a92a7c7816fd6c8837d54479cc18f7ebe31b93692dbca0b95fe09a46236207
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\e1cfc9f7-0e2f-4f11-83b5-1aa4bf709910.tmp
Filesize6KB
MD5cd27328384d5462e3f4f3710a6cb68ea
SHA1b8d741aae995f8373ab19eed64ebe8fcd58197e3
SHA2560d97f77fa8fa79673a2916a2df0cc7fbfe69f2f94e5e3f768d6d00f391381c76
SHA51225a96beaf48b4f3ac6e4a44bbe723bed49501d5db1ddb3f0ec45418bfdc54b8dc389b295142465362ce6b6ec10a3dfbe7a08adb482c227f99fe32017a98d6ccd
-
Filesize
128KB
MD5877f29611d728995c8acda84a71d3f0f
SHA10dc2dc2516f96a897b175ae791f964f9ef37bd3b
SHA256969a684d3c0d317f8a8cdd3b1cbc9c128a3498a7123f74f5796bc42bfb6d962b
SHA512e2906492d91d4bf503c2d8ea87c381e0764cb4e4a4e326555e69f97aeca7d8b9ae448229e5ef89cadb5d7169b9f3a322db514061f3d9f2f68a0b3c67409622b4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd