Resubmissions
25-03-2024 13:44
240325-q1zwmahg25 130-01-2024 18:38
240130-w984jscadp 116-12-2023 06:33
231216-hbmwrscbg4 1016-12-2023 06:32
231216-halx3scbg2 129-11-2023 11:21
231129-nf7pmafg82 129-11-2023 11:20
231129-nfv1tsfg79 526-11-2023 08:21
231126-j9fqsafg43 715-11-2023 08:37
231115-kjdzyagd3v 808-11-2023 14:49
231108-r7gt3adf67 102-11-2023 11:19
231102-nex4ssah71 10Analysis
-
max time kernel
1801s -
max time network
1802s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-03-2024 13:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://t.me/excellent_stalcraft
Resource
win10v2004-20240226-en
General
-
Target
http://t.me/excellent_stalcraft
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133558496967122946" chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 5920 chrome.exe 5920 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe Token: SeShutdownPrivilege 4480 chrome.exe Token: SeCreatePagefilePrivilege 4480 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe 4480 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4480 wrote to memory of 3656 4480 chrome.exe 95 PID 4480 wrote to memory of 3656 4480 chrome.exe 95 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2260 4480 chrome.exe 98 PID 4480 wrote to memory of 2004 4480 chrome.exe 99 PID 4480 wrote to memory of 2004 4480 chrome.exe 99 PID 4480 wrote to memory of 2880 4480 chrome.exe 100 PID 4480 wrote to memory of 2880 4480 chrome.exe 100 PID 4480 wrote to memory of 2880 4480 chrome.exe 100 PID 4480 wrote to memory of 2880 4480 chrome.exe 100 PID 4480 wrote to memory of 2880 4480 chrome.exe 100 PID 4480 wrote to memory of 2880 4480 chrome.exe 100 PID 4480 wrote to memory of 2880 4480 chrome.exe 100 PID 4480 wrote to memory of 2880 4480 chrome.exe 100 PID 4480 wrote to memory of 2880 4480 chrome.exe 100 PID 4480 wrote to memory of 2880 4480 chrome.exe 100 PID 4480 wrote to memory of 2880 4480 chrome.exe 100 PID 4480 wrote to memory of 2880 4480 chrome.exe 100 PID 4480 wrote to memory of 2880 4480 chrome.exe 100 PID 4480 wrote to memory of 2880 4480 chrome.exe 100 PID 4480 wrote to memory of 2880 4480 chrome.exe 100 PID 4480 wrote to memory of 2880 4480 chrome.exe 100 PID 4480 wrote to memory of 2880 4480 chrome.exe 100 PID 4480 wrote to memory of 2880 4480 chrome.exe 100 PID 4480 wrote to memory of 2880 4480 chrome.exe 100 PID 4480 wrote to memory of 2880 4480 chrome.exe 100 PID 4480 wrote to memory of 2880 4480 chrome.exe 100 PID 4480 wrote to memory of 2880 4480 chrome.exe 100
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://t.me/excellent_stalcraft1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea4379758,0x7ffea4379768,0x7ffea43797782⤵PID:3656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1888,i,15227051914995998451,5072193204737205674,131072 /prefetch:22⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1888,i,15227051914995998451,5072193204737205674,131072 /prefetch:82⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1888,i,15227051914995998451,5072193204737205674,131072 /prefetch:82⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2956 --field-trial-handle=1888,i,15227051914995998451,5072193204737205674,131072 /prefetch:12⤵PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1888,i,15227051914995998451,5072193204737205674,131072 /prefetch:12⤵PID:2700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4620 --field-trial-handle=1888,i,15227051914995998451,5072193204737205674,131072 /prefetch:12⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3440 --field-trial-handle=1888,i,15227051914995998451,5072193204737205674,131072 /prefetch:12⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 --field-trial-handle=1888,i,15227051914995998451,5072193204737205674,131072 /prefetch:82⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 --field-trial-handle=1888,i,15227051914995998451,5072193204737205674,131072 /prefetch:82⤵PID:4112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2672 --field-trial-handle=1888,i,15227051914995998451,5072193204737205674,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5920
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4580
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4036 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:81⤵PID:6028
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4088 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:81⤵PID:908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD5c49ec5ef75a8697ba95b6b9004669e06
SHA1accfb297b70af91d12ebf8d8a93bec8df3c40603
SHA256f503acf8b8f847be8e2e3661c930b4e661d1fec18c33a2010e36aca3cfc770cf
SHA51214c286b48a5d4cf09c9dba13221245278318fa3a1c274c6cf9d41ce04df09b524e1d7fd1a7f9abc469f643bdca1c0983169adc6a629964f54d206d968f930c53
-
Filesize
1KB
MD5605c1132030909b6fe631e056581f0f0
SHA1d20b1b8894a22ba211105ac76d785ca67331dff7
SHA25615129d466978fcf85dd7d738f234d2e5d7292e5a19d43f24f5bcaea84a7e0c05
SHA51267f5a5610a1603b9db598e05c5535306d0f2f55000f095c85f815b3c166becd0f68e1e92f278a4aee54e1b0c31262d6a9b444f8ff327d4584e241eec855b5d0f
-
Filesize
871B
MD50cac079aa66262a3df3dfa4ebeb0b0c3
SHA16f679cd010f267e2078c246fe82c4db432915c46
SHA256de1ca8c969b837d7a20affe8692432bd833445258db667ffe47859b90ba6ec54
SHA512ea914bfb76379841b89c6f8cbd278138e894f9af2dabbf15f232dd95f08e83572993f0443a27e98678cebb308e36b1ed32645a807da3c5e5c0bdcf6c5bbf2c36
-
Filesize
5KB
MD567c8f3d037e5cbaa8593f49d6cd14878
SHA13bd89fbffa3765df86f55d3c47c01f319420ff51
SHA256d25aa1a72fc71e78444efcb0c21e541be6d9c02661e4a51ae30df9c730d0b67f
SHA512c21d0955a1e035907fdc670666a5147cef301cf58dda6b5198be10efc7f72031e021647db2d3d5853181c1a2ad6df48ee5ce86698e7e9139bd5c4e6363df0db9
-
Filesize
6KB
MD50b5736ec3aa8cf9aa390783ea273f2a3
SHA107e114595ce384face3f179fa1cc5046f2ec7035
SHA2569776246601d344dc21a29aed52ffce1a9df7872284b703bd85900e4512ff3a60
SHA512e1918c02f2ffce9dfbb169c1cd0978cb0dbce2b9097e44821a01fa5c15d91665faced338e35dd6912559b29608715f847850005278ee1fd746728173a1dbc0df
-
Filesize
5KB
MD5e4ffe37797e894fb3918acce21c6b50f
SHA1a1ef550f9bdf7690b61f8ca1a5c1029e29f47eb8
SHA256a1606702f77f2b2933657e88d23aa5134b32564533dd4c178e12d7bc07405d37
SHA512d5d9f5ae831b495dad6a8da5ed05dd572f222f63df80ebe695750cbe766b8a1f8bc8a733d1cec95d7c5499a294642925615aeabf6e27d24d9ef8e6fd094f34cf
-
Filesize
128KB
MD5ffd89d1238ba76b1b8d70218cf83caab
SHA10f0339c7122a20494a97a14bfa5fdc260bed327d
SHA25626300d1c033389798a4e2620093bb2b902041846f0ca0c10be4fbed901c711b4
SHA512d78b6a5a2acd4d0282cfeae1501b4554b57713baa757856fadd3b89a5809b3b91a82b38872faee72d070c8408bacd437085a649d81decec094f3783a75992f6c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd