Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
25-03-2024 20:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://riming-sinatra-3d78db53e449.herokuapp.com/u?mid=65f95eb99fda8d0007a5c57e
Resource
win10-20240221-en
General
-
Target
https://riming-sinatra-3d78db53e449.herokuapp.com/u?mid=65f95eb99fda8d0007a5c57e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133558714120940233" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4824 chrome.exe 4824 chrome.exe 868 chrome.exe 868 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4824 wrote to memory of 4316 4824 chrome.exe 75 PID 4824 wrote to memory of 4316 4824 chrome.exe 75 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 1136 4824 chrome.exe 77 PID 4824 wrote to memory of 5056 4824 chrome.exe 78 PID 4824 wrote to memory of 5056 4824 chrome.exe 78 PID 4824 wrote to memory of 2040 4824 chrome.exe 79 PID 4824 wrote to memory of 2040 4824 chrome.exe 79 PID 4824 wrote to memory of 2040 4824 chrome.exe 79 PID 4824 wrote to memory of 2040 4824 chrome.exe 79 PID 4824 wrote to memory of 2040 4824 chrome.exe 79 PID 4824 wrote to memory of 2040 4824 chrome.exe 79 PID 4824 wrote to memory of 2040 4824 chrome.exe 79 PID 4824 wrote to memory of 2040 4824 chrome.exe 79 PID 4824 wrote to memory of 2040 4824 chrome.exe 79 PID 4824 wrote to memory of 2040 4824 chrome.exe 79 PID 4824 wrote to memory of 2040 4824 chrome.exe 79 PID 4824 wrote to memory of 2040 4824 chrome.exe 79 PID 4824 wrote to memory of 2040 4824 chrome.exe 79 PID 4824 wrote to memory of 2040 4824 chrome.exe 79 PID 4824 wrote to memory of 2040 4824 chrome.exe 79 PID 4824 wrote to memory of 2040 4824 chrome.exe 79 PID 4824 wrote to memory of 2040 4824 chrome.exe 79 PID 4824 wrote to memory of 2040 4824 chrome.exe 79 PID 4824 wrote to memory of 2040 4824 chrome.exe 79 PID 4824 wrote to memory of 2040 4824 chrome.exe 79 PID 4824 wrote to memory of 2040 4824 chrome.exe 79 PID 4824 wrote to memory of 2040 4824 chrome.exe 79
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://riming-sinatra-3d78db53e449.herokuapp.com/u?mid=65f95eb99fda8d0007a5c57e1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff98b3a9758,0x7ff98b3a9768,0x7ff98b3a97782⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1544 --field-trial-handle=1984,i,9559331917000934653,5340194629652170874,131072 /prefetch:22⤵PID:1136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1792 --field-trial-handle=1984,i,9559331917000934653,5340194629652170874,131072 /prefetch:82⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1816 --field-trial-handle=1984,i,9559331917000934653,5340194629652170874,131072 /prefetch:82⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2940 --field-trial-handle=1984,i,9559331917000934653,5340194629652170874,131072 /prefetch:12⤵PID:4728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2948 --field-trial-handle=1984,i,9559331917000934653,5340194629652170874,131072 /prefetch:12⤵PID:4144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4560 --field-trial-handle=1984,i,9559331917000934653,5340194629652170874,131072 /prefetch:12⤵PID:2572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5040 --field-trial-handle=1984,i,9559331917000934653,5340194629652170874,131072 /prefetch:82⤵PID:1272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4812 --field-trial-handle=1984,i,9559331917000934653,5340194629652170874,131072 /prefetch:82⤵PID:4084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3696 --field-trial-handle=1984,i,9559331917000934653,5340194629652170874,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:868
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5a1f3219fa2f4e0b1371109609d75fbc7
SHA19288997a312a2cc52701b549108cc89c9411e5c8
SHA256c43afed58ebfae18a0c37e16887aeb3c2a057a16ca6d9f435217090949daf19e
SHA512207030abcc9188c09a176e5a88d835acac6c48233f25bc081f6cceb796492287f0489aa6515030999407d9bc83d73c8f79c37b433ee87aa810dd83977c95cd3c
-
Filesize
1012B
MD5164d1b7cbc3a48272370791206331523
SHA1a000dac1c1caa0c2acbea2a85c5c0b516efab4cb
SHA256004c37fc8709ddb6447753da15ab9ea121090f3b21e741439ef043276a7adda6
SHA512d0f89f2904a3b635940154adff1977362291343e980b53ab964b3da289f423552efea361fe09f5b4c0f6558156110aea4068f397c5ef9739b5325207a250ac68
-
Filesize
703B
MD58fc2da6e9bb522d9a7a7fa6d22f318a6
SHA1cbd3648afc1e9fe4dafc864fd0ea0b33cdf50302
SHA256f53c70d1d6606a4722649c926b93e889a832c2651c92cf20549a51029ef696be
SHA5127cb1c9b3bcb9cdd128ed1ba3e4e5fa7e914bd598e569e745d1c9fecfa6dfc0f172ef7b578b7347b2ff768fa88e60e7d9a0145d10908e993ccd6812c1beac2c35
-
Filesize
6KB
MD582e24992bebbb7d93f668380e7e05f44
SHA1cdac48f4d7aaf71de52b95d9472bb147c27caca2
SHA25686532d3e5f597137acf8efef69b6588b68b59b49dbea9161d4e5a4069eada027
SHA512a8c78e28bd0f314285f8b337d73dea01004451541770dc95fbf4ff7dba45241177e982e338ac4c86a1dabe7879443441b7a8b76b6b24a3761a1de39e4be2ad57
-
Filesize
6KB
MD521e4d2fe4cea752e87a664ce58c5f576
SHA1af2b7701a23b157418a91476ee3fe2e1e8e17d0f
SHA25664c02ad0c5c3095fef43b6ef1cc3feaf6ed223fbc876b59bb9fc233162e1c4d9
SHA512e3c076fbc474b4c34bfe7c9bc0ca4bcf93000052b49337427d2f02e5dc2fbd110e15a4c209db19dcb85339ad14850bf2b94bd7051b6c4155e8519ef5b1d45898
-
Filesize
6KB
MD523cd42db19daf14c0bb48ce37484294b
SHA10f9fab02636a5af697a298c3eea72299b8aa16c5
SHA256f914f678984acbcb408c2035dc80ef2b00b5dd7f149bf92b8dc71fcece095833
SHA512dfd6a953faf33b25278e3f72b2a3900717edad0b2992cba575a7d44ea4a83e01c96111c3499e787c97b6323946145ef714b05590895c32439097c06dcf181706
-
Filesize
130KB
MD53853950ffc2a35653237bf05d1f47ce0
SHA14163b719572102014c91c29ed2e7d51a25777331
SHA2566b5f977862db7adbb33c0c49765ded4a58c360cddad6df451ccd38d6d594be09
SHA5124ad5cb2ed4de8f3ac0c167675146b6c79dfa0d80783caa9acb17fa54f6368a8c98b9b4a2df13a4abd1b4c401fde230ea1fcf910e1ea8c76d520245da655cbb50
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd