Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 08:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://r.mtdv.me/videos/i-have-dominus
Resource
win10v2004-20240226-en
General
-
Target
https://r.mtdv.me/videos/i-have-dominus
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133549665477810546" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 232 chrome.exe 232 chrome.exe 4268 chrome.exe 4268 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: 33 5528 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5528 AUDIODG.EXE Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe Token: SeShutdownPrivilege 232 chrome.exe Token: SeCreatePagefilePrivilege 232 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 232 wrote to memory of 1880 232 chrome.exe 86 PID 232 wrote to memory of 1880 232 chrome.exe 86 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 2636 232 chrome.exe 92 PID 232 wrote to memory of 4876 232 chrome.exe 93 PID 232 wrote to memory of 4876 232 chrome.exe 93 PID 232 wrote to memory of 4824 232 chrome.exe 94 PID 232 wrote to memory of 4824 232 chrome.exe 94 PID 232 wrote to memory of 4824 232 chrome.exe 94 PID 232 wrote to memory of 4824 232 chrome.exe 94 PID 232 wrote to memory of 4824 232 chrome.exe 94 PID 232 wrote to memory of 4824 232 chrome.exe 94 PID 232 wrote to memory of 4824 232 chrome.exe 94 PID 232 wrote to memory of 4824 232 chrome.exe 94 PID 232 wrote to memory of 4824 232 chrome.exe 94 PID 232 wrote to memory of 4824 232 chrome.exe 94 PID 232 wrote to memory of 4824 232 chrome.exe 94 PID 232 wrote to memory of 4824 232 chrome.exe 94 PID 232 wrote to memory of 4824 232 chrome.exe 94 PID 232 wrote to memory of 4824 232 chrome.exe 94 PID 232 wrote to memory of 4824 232 chrome.exe 94 PID 232 wrote to memory of 4824 232 chrome.exe 94 PID 232 wrote to memory of 4824 232 chrome.exe 94 PID 232 wrote to memory of 4824 232 chrome.exe 94 PID 232 wrote to memory of 4824 232 chrome.exe 94 PID 232 wrote to memory of 4824 232 chrome.exe 94 PID 232 wrote to memory of 4824 232 chrome.exe 94 PID 232 wrote to memory of 4824 232 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://r.mtdv.me/videos/i-have-dominus1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd414f9758,0x7ffd414f9768,0x7ffd414f97782⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=280,i,4998009322562780346,4324922048936945348,131072 /prefetch:22⤵PID:2636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=280,i,4998009322562780346,4324922048936945348,131072 /prefetch:82⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=280,i,4998009322562780346,4324922048936945348,131072 /prefetch:82⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=280,i,4998009322562780346,4324922048936945348,131072 /prefetch:12⤵PID:3972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=280,i,4998009322562780346,4324922048936945348,131072 /prefetch:12⤵PID:3176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4856 --field-trial-handle=280,i,4998009322562780346,4324922048936945348,131072 /prefetch:12⤵PID:1060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5304 --field-trial-handle=280,i,4998009322562780346,4324922048936945348,131072 /prefetch:12⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5440 --field-trial-handle=280,i,4998009322562780346,4324922048936945348,131072 /prefetch:12⤵PID:4060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6016 --field-trial-handle=280,i,4998009322562780346,4324922048936945348,131072 /prefetch:82⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4592 --field-trial-handle=280,i,4998009322562780346,4324922048936945348,131072 /prefetch:82⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3948 --field-trial-handle=280,i,4998009322562780346,4324922048936945348,131072 /prefetch:82⤵PID:5436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4780 --field-trial-handle=280,i,4998009322562780346,4324922048936945348,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4268
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3812
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x32c 0x1501⤵
- Suspicious use of AdjustPrivilegeToken
PID:5528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1024KB
MD5cf674d25cbb24c3a09e6020a9b816c35
SHA11562fe37225e0de27875d2b7cd6f18ce61a198b9
SHA256e69fda0fd04bc06d939cc566d67df0f1bb276c7702cf6497238e958edea058a6
SHA512f93755fb9269ba05d19841c9cc683ac7b65dea5419bd7be4a28b6528c27656ad52a872b6e7db8c1119abb2b1971e5cd85e1e01e8e28c8d1bd6f19eb8ff0fe3ea
-
Filesize
576B
MD5478acc643b2c57c5b85c2245966dc23e
SHA1a27b593b46cc6c90dfcc909b7ee8fd602aee0d7f
SHA25639ec6494762a29dba4be19b125673672aff940cf642e78425c28efdfb36df110
SHA512d2caa99fc64cc6c38a30fdd2097f94909d9a188ed442becfece922beb6fa39b211ec4072c3f35598097ebb0eec06e61f5ca85d9ef2251bcfcedb609413b8b88a
-
Filesize
3KB
MD5b4f7eef014c46c690281c97d029e3a8e
SHA1983ca819b65d06f319cf18c3dbfbdac72ce522a2
SHA25696cd0c0105dae8842fb0c2b05410360656d64d39aaad33f14497a61aebd0a64f
SHA512e0db71d769da22d0415be7cce0d83067bbd8500c7cc2cfc1f0b9b8eacd9b1975780ec1b8d3835f6481bb7bbf16d33fe75f93ae2afa6c1cd9ae4a6078f6574467
-
Filesize
1KB
MD5fa187f9470d75cce79d951a0a4a63ad1
SHA153624609aa2dbc7b662602fc96e5bb0264eed21f
SHA256d046e36a88adea4af08f6e4b8b444eb81b8e9b287e5c341c672d32c756987612
SHA512d29cf973451aa4d909e08f6aa87830efebc80ea81f8b13e78eb45861b5253ad758f64e2723271107a482e70a119247958ef4ee48347cdae415fe6725da94cdcc
-
Filesize
538B
MD5044df32c960029b181d89919ab5e287a
SHA10208840a5401b38bd243b9dba50183a41eecbe4f
SHA256cb71d0e525148667474c31ec03a16ab49c91812f20324dd771aa95cb900e05f8
SHA512240df47cdfe6f1274b714f799e2f50f2a1a4c0dfdc3eeaa97f2ee726e72374055ffe5aa99a7d117e6f29dbdad5e4502daa3aa2e3ee53f86bf89494762384b6f7
-
Filesize
6KB
MD538bed98adf0e0aa66d563892fc95fa40
SHA1dcbb9cd9887a7ac720424f68bdde79a344d2e1b7
SHA2565b362efee47466b09b0ab65ea5b870acd7a54415b3179fba9501d0197715738f
SHA512701c623d20fdca5c61cb8fc099bccb5d8ac58c817d4d42a946b6075a3a5ee19d7078d933f6bae98b6a0fe5b3ba956a6b320d85d53320a125945ffac0e4fbce00
-
Filesize
6KB
MD5653379b8a818412ab82106794c9befdd
SHA16a2710135cc09abfadad7cc655f0d676a437ba6d
SHA256321449f752cb83f73b3eeeb54d19f775a782dc5c08cfb1d6b85c4941dbe93603
SHA51284f6fd03675ca2758ce143b05d3359d894686b6000fee2ed77019442daa2904eb804f24593128058b3e7973ed23eba7afdd07521b9d7f06bb82fd0e3d17cd395
-
Filesize
6KB
MD5d49948eaa1e087c8f6e057bbb9220072
SHA1c8bcd72b9c50de0f6034faab420748c1d052f9c7
SHA25664e12a0ab8e65f7b0fddf3cb06cd5af1ab1b2ccfae7a9078267d6a609c030150
SHA5129272a8ca59ff4db810e45852e42e7c2bfd0705423f71f666afbcf048ccd64b296dfec11fff0f0a1043f07e543b577f9491647567455ed3081e780953dc4b1fc1
-
Filesize
128KB
MD57e30c09c4a47fa87729ba5a4c71ed9d2
SHA10723391284e91da07193777968c7ea77eb023868
SHA256e85cb2557f8cb5e4b8152174bc792a648c256c1691bbb4a41f4d15ea9b8b8fe2
SHA512ade49811dac747f06f87cc1452f33904e3acc203a2b7a88beba50ddb11c42f432b27a4cdeadacd9a24063124530f60b9671e38c09319eb022c62018e8d80ea79
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd