Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 12:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://scriptium.nl
Resource
win10v2004-20240226-en
General
-
Target
http://scriptium.nl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133553237584848960" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3956 chrome.exe 3956 chrome.exe 2708 chrome.exe 2708 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe Token: SeShutdownPrivilege 3956 chrome.exe Token: SeCreatePagefilePrivilege 3956 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3956 wrote to memory of 2460 3956 chrome.exe 96 PID 3956 wrote to memory of 2460 3956 chrome.exe 96 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 3608 3956 chrome.exe 100 PID 3956 wrote to memory of 4176 3956 chrome.exe 101 PID 3956 wrote to memory of 4176 3956 chrome.exe 101 PID 3956 wrote to memory of 4764 3956 chrome.exe 102 PID 3956 wrote to memory of 4764 3956 chrome.exe 102 PID 3956 wrote to memory of 4764 3956 chrome.exe 102 PID 3956 wrote to memory of 4764 3956 chrome.exe 102 PID 3956 wrote to memory of 4764 3956 chrome.exe 102 PID 3956 wrote to memory of 4764 3956 chrome.exe 102 PID 3956 wrote to memory of 4764 3956 chrome.exe 102 PID 3956 wrote to memory of 4764 3956 chrome.exe 102 PID 3956 wrote to memory of 4764 3956 chrome.exe 102 PID 3956 wrote to memory of 4764 3956 chrome.exe 102 PID 3956 wrote to memory of 4764 3956 chrome.exe 102 PID 3956 wrote to memory of 4764 3956 chrome.exe 102 PID 3956 wrote to memory of 4764 3956 chrome.exe 102 PID 3956 wrote to memory of 4764 3956 chrome.exe 102 PID 3956 wrote to memory of 4764 3956 chrome.exe 102 PID 3956 wrote to memory of 4764 3956 chrome.exe 102 PID 3956 wrote to memory of 4764 3956 chrome.exe 102 PID 3956 wrote to memory of 4764 3956 chrome.exe 102 PID 3956 wrote to memory of 4764 3956 chrome.exe 102 PID 3956 wrote to memory of 4764 3956 chrome.exe 102 PID 3956 wrote to memory of 4764 3956 chrome.exe 102 PID 3956 wrote to memory of 4764 3956 chrome.exe 102
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://scriptium.nl1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea4379758,0x7ffea4379768,0x7ffea43797782⤵PID:2460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1852,i,5504345201245686208,9183640906467321719,131072 /prefetch:22⤵PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1852,i,5504345201245686208,9183640906467321719,131072 /prefetch:82⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1852,i,5504345201245686208,9183640906467321719,131072 /prefetch:82⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3052 --field-trial-handle=1852,i,5504345201245686208,9183640906467321719,131072 /prefetch:12⤵PID:452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3228 --field-trial-handle=1852,i,5504345201245686208,9183640906467321719,131072 /prefetch:12⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4340 --field-trial-handle=1852,i,5504345201245686208,9183640906467321719,131072 /prefetch:82⤵PID:2104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4440 --field-trial-handle=1852,i,5504345201245686208,9183640906467321719,131072 /prefetch:82⤵PID:3680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4556 --field-trial-handle=1852,i,5504345201245686208,9183640906467321719,131072 /prefetch:12⤵PID:5712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3408 --field-trial-handle=1852,i,5504345201245686208,9183640906467321719,131072 /prefetch:12⤵PID:5800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3948 --field-trial-handle=1852,i,5504345201245686208,9183640906467321719,131072 /prefetch:12⤵PID:3832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4672 --field-trial-handle=1852,i,5504345201245686208,9183640906467321719,131072 /prefetch:12⤵PID:5456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3432 --field-trial-handle=1852,i,5504345201245686208,9183640906467321719,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2708
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:212
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4112 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:81⤵PID:984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD501e05b3bd84f2df319414c3f19594e75
SHA1d3d2ef8082de6aedf3a4bbc16d4c14263bd63bab
SHA256146a2963129a578af41b8f5e1221ea4d93190cdbf82267fa296de3cb9ba2d8e3
SHA51292e2c0ec3575431d467443bac45b221fab231fa76c56476993ddc634ed2ce2afa0134dd896ffdb0195b25a13841e6654e3dad76053d8c63cec1aa554937e0984
-
Filesize
5KB
MD5e7b3766925aa8bb41534becb50061f2c
SHA10cf7ae7b281046104da5c8603e31bc00e2708d1e
SHA256325fbcc3a36648d15a451fdb053a2a70c8a052e6afa04ca1d964b1ca7c5b1822
SHA5125781df0d0492887bef9d9ad0110330b115abbcf6daa4a9f00ac61024f9fb5ab638f24fc1b48412d05f5d3d69e97b29b201f2ee4e0eb37d4788ddee454e1d729c
-
Filesize
5KB
MD5fe3310baf33f79192a058ee36296fc13
SHA1196c20ea6b5c4d8e2ea400e98ff56df435248a4c
SHA256283b99e630a45af2326f4bab2e5c40fa779d9ca02b07d6d0342e79aff2dbb016
SHA5129565e2b7be61e588dee5b7abbeb07622108e9c6075155a9c845b812a4b8ee957bd9750215f2bae6fcefc90a1a47b66a044b3104268b44178271efc97e40e2c03
-
Filesize
128KB
MD56a802a5a5f0243616e2b650ea6e00ed6
SHA1d0cc9918c86dcaa330ca675c77cac5d904e2919b
SHA256a1fabbf703c24e378862b66f99387bea26235cd3947c2d581ec5fdf5a8079ad1
SHA5125829d027ad4dab7da3e42f2e5b419cf36dfb45c26954099015353b964e48a35c4c1ca6e563aa3804e0cdeb506b56693acdff4d545d3ccabb38b0748709528647
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd