Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 21:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://s.mhs.com/r5D8HeF
Resource
win10v2004-20240226-en
General
-
Target
http://s.mhs.com/r5D8HeF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133553573782247345" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1744 chrome.exe 1744 chrome.exe 5188 chrome.exe 5188 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1504 1744 chrome.exe 94 PID 1744 wrote to memory of 1504 1744 chrome.exe 94 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 3180 1744 chrome.exe 98 PID 1744 wrote to memory of 2724 1744 chrome.exe 99 PID 1744 wrote to memory of 2724 1744 chrome.exe 99 PID 1744 wrote to memory of 1968 1744 chrome.exe 100 PID 1744 wrote to memory of 1968 1744 chrome.exe 100 PID 1744 wrote to memory of 1968 1744 chrome.exe 100 PID 1744 wrote to memory of 1968 1744 chrome.exe 100 PID 1744 wrote to memory of 1968 1744 chrome.exe 100 PID 1744 wrote to memory of 1968 1744 chrome.exe 100 PID 1744 wrote to memory of 1968 1744 chrome.exe 100 PID 1744 wrote to memory of 1968 1744 chrome.exe 100 PID 1744 wrote to memory of 1968 1744 chrome.exe 100 PID 1744 wrote to memory of 1968 1744 chrome.exe 100 PID 1744 wrote to memory of 1968 1744 chrome.exe 100 PID 1744 wrote to memory of 1968 1744 chrome.exe 100 PID 1744 wrote to memory of 1968 1744 chrome.exe 100 PID 1744 wrote to memory of 1968 1744 chrome.exe 100 PID 1744 wrote to memory of 1968 1744 chrome.exe 100 PID 1744 wrote to memory of 1968 1744 chrome.exe 100 PID 1744 wrote to memory of 1968 1744 chrome.exe 100 PID 1744 wrote to memory of 1968 1744 chrome.exe 100 PID 1744 wrote to memory of 1968 1744 chrome.exe 100 PID 1744 wrote to memory of 1968 1744 chrome.exe 100 PID 1744 wrote to memory of 1968 1744 chrome.exe 100 PID 1744 wrote to memory of 1968 1744 chrome.exe 100
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://s.mhs.com/r5D8HeF1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc2919758,0x7ffcc2919768,0x7ffcc29197782⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=1872,i,10239404445219818455,4189737302747752687,131072 /prefetch:22⤵PID:3180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1872,i,10239404445219818455,4189737302747752687,131072 /prefetch:82⤵PID:2724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1872,i,10239404445219818455,4189737302747752687,131072 /prefetch:82⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1872,i,10239404445219818455,4189737302747752687,131072 /prefetch:12⤵PID:3252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=1872,i,10239404445219818455,4189737302747752687,131072 /prefetch:12⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3856 --field-trial-handle=1872,i,10239404445219818455,4189737302747752687,131072 /prefetch:82⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 --field-trial-handle=1872,i,10239404445219818455,4189737302747752687,131072 /prefetch:82⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4580 --field-trial-handle=1872,i,10239404445219818455,4189737302747752687,131072 /prefetch:12⤵PID:5220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1692 --field-trial-handle=1872,i,10239404445219818455,4189737302747752687,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5188
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3372
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4128 --field-trial-handle=2268,i,8796662530135712346,11409037572378858775,262144 --variations-seed-version /prefetch:81⤵PID:1372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD55d390723d7987f904158eed1c9468aff
SHA18b80e2cb54f37d0dd573de6ee9ed5e252957c52c
SHA25667e6ef0f6fca52067ca00a6b59bc7efe6ad08dc83775c1276a43e3e0e1648746
SHA512bec32a6f0bcd94ea4c40605ecac5b09cd3b0de40c38e67369519f271a14d4664ebcabd4500dca13551e9f56738fddba360e2519b67893ed05d813092e9f93fe7
-
Filesize
1KB
MD5dfb005122c2a9ee25b350dd0a8220b3f
SHA1a52529b1b164099914c3e800481b199a7d1e1970
SHA25647917136c676e4c336f97dbb83f89ea762f1d432956c14a4969c155b04e79e31
SHA5123cc17cf99256642d6fec88bd591ad6d2913042f6252fa18f3af6eb44354055002ecd317dd615016f7fd20fb049ef2230b0f61bf030f2821972154a38f12eb17a
-
Filesize
6KB
MD538d2a9563357efd8f002c513d6b668b3
SHA16fb39e408f283f07d3adbcb51819f922b476c8c5
SHA2566513beae3442aa7a2589b75937edad20be17291678de2fd4d7e31eb1c1d71372
SHA512ce07b57f7a5252afd59ac3daeb2c806e09b9b465807edc27253c3b11516adf18243bce575fa1ea6557ded6db9c1e2875bb2466a296bf654a18880002b3ec6f99
-
Filesize
128KB
MD572ec89dee89f12787fcabcaeafe3c39f
SHA1914aefbdf24681070e0af9dbc78fa46a3abb8aa9
SHA256f7b8164be7e244457d0eb9d0cb95a6762cbeafb572ceb53476b90633eeefab40
SHA5128421379be67048dcd89993666db5df87e1a7f319bc2190c3dc1b0f1e4ae1a82d2bb0116eff9fdd61cf00a7f11ea165e799bdbb984586462bf9be1d02a0b0bab8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84