Analysis
-
max time kernel
82s -
max time network
87s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-03-2024 22:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://easymc.io
Resource
win11-20240221-en
General
-
Target
http://easymc.io
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133559667604429086" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 676 chrome.exe 676 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe Token: SeShutdownPrivilege 676 chrome.exe Token: SeCreatePagefilePrivilege 676 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe 676 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 676 wrote to memory of 1048 676 chrome.exe 80 PID 676 wrote to memory of 1048 676 chrome.exe 80 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 3440 676 chrome.exe 82 PID 676 wrote to memory of 2432 676 chrome.exe 83 PID 676 wrote to memory of 2432 676 chrome.exe 83 PID 676 wrote to memory of 2276 676 chrome.exe 84 PID 676 wrote to memory of 2276 676 chrome.exe 84 PID 676 wrote to memory of 2276 676 chrome.exe 84 PID 676 wrote to memory of 2276 676 chrome.exe 84 PID 676 wrote to memory of 2276 676 chrome.exe 84 PID 676 wrote to memory of 2276 676 chrome.exe 84 PID 676 wrote to memory of 2276 676 chrome.exe 84 PID 676 wrote to memory of 2276 676 chrome.exe 84 PID 676 wrote to memory of 2276 676 chrome.exe 84 PID 676 wrote to memory of 2276 676 chrome.exe 84 PID 676 wrote to memory of 2276 676 chrome.exe 84 PID 676 wrote to memory of 2276 676 chrome.exe 84 PID 676 wrote to memory of 2276 676 chrome.exe 84 PID 676 wrote to memory of 2276 676 chrome.exe 84 PID 676 wrote to memory of 2276 676 chrome.exe 84 PID 676 wrote to memory of 2276 676 chrome.exe 84 PID 676 wrote to memory of 2276 676 chrome.exe 84 PID 676 wrote to memory of 2276 676 chrome.exe 84 PID 676 wrote to memory of 2276 676 chrome.exe 84 PID 676 wrote to memory of 2276 676 chrome.exe 84 PID 676 wrote to memory of 2276 676 chrome.exe 84 PID 676 wrote to memory of 2276 676 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://easymc.io1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb4ffb9758,0x7ffb4ffb9768,0x7ffb4ffb97782⤵PID:1048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1960,i,7211138819542333070,16386009305845134198,131072 /prefetch:22⤵PID:3440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1836 --field-trial-handle=1960,i,7211138819542333070,16386009305845134198,131072 /prefetch:82⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2152 --field-trial-handle=1960,i,7211138819542333070,16386009305845134198,131072 /prefetch:82⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2824 --field-trial-handle=1960,i,7211138819542333070,16386009305845134198,131072 /prefetch:12⤵PID:4028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2832 --field-trial-handle=1960,i,7211138819542333070,16386009305845134198,131072 /prefetch:12⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4416 --field-trial-handle=1960,i,7211138819542333070,16386009305845134198,131072 /prefetch:12⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3172 --field-trial-handle=1960,i,7211138819542333070,16386009305845134198,131072 /prefetch:12⤵PID:1328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5152 --field-trial-handle=1960,i,7211138819542333070,16386009305845134198,131072 /prefetch:12⤵PID:2964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5420 --field-trial-handle=1960,i,7211138819542333070,16386009305845134198,131072 /prefetch:12⤵PID:4060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5908 --field-trial-handle=1960,i,7211138819542333070,16386009305845134198,131072 /prefetch:82⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 --field-trial-handle=1960,i,7211138819542333070,16386009305845134198,131072 /prefetch:82⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4780 --field-trial-handle=1960,i,7211138819542333070,16386009305845134198,131072 /prefetch:82⤵PID:3292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4884 --field-trial-handle=1960,i,7211138819542333070,16386009305845134198,131072 /prefetch:82⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
792B
MD5c519930f54d5c7f60d1adc8d37505e84
SHA16b85fdbfa71cc4983e8623090ca4d185fb15c0ae
SHA2565c04eb676c5b8c4171c881d91f21b537a654e0cf9a91ca25df585cecc4619990
SHA512b0a5b2200d1460127b11ae1642a08cb018f67f503eaf58a7425129c6b62b1c0e4f2865c62a1851f26c5aee10c10b82b614176b4bca2a86ed9714fe2b5a44b3cb
-
Filesize
4KB
MD59995f46beff61e9fd0955ba0a5441e91
SHA15f9b2fe11d43311a88b5ba21d45e86a203b756ed
SHA256e13c554c774719cb73634669ac82a383c7dc3002e55e36069e1e0d208cc9321e
SHA5120ec9dc43cf0683f71c0ffac8f85ef2d0164ddfc28391990269e49b2481e98efd0f7363e0cb768b0af8309efd32a38a3525d61ea556d94142391e10fc42b1b0fc
-
Filesize
869B
MD55c35da1d1e5544ff73075eb3157f1683
SHA1eabb775c819132f6492ba0159032a37aec365fec
SHA2568d472ef77d9a26a74656a0b2ba5877f5564c6f4f21ca9f780d1a4d5e6834c637
SHA512781120a13544e162fd6ee164590599d2c2228af6ed369f932879cc9699882a7bc29124db7c099fa7674cf36fcba36f7801c3ec22a2dcef9f9ab520d767f5273b
-
Filesize
6KB
MD5f73e0cc8988d4d486d10d61d4efb8264
SHA15b5106eafc0c534b890e2eece0b4323085ae02ba
SHA256ec9b0565f49d05b80130dc2eb9b09d217a59dfbdc18d9c557f40525aac60e069
SHA51278243c7219ec135436958377b3b399f01b6211f34eabea315add2c79a122bebaaaf98e39cf16a8216998b30ae2085966bb808960ab3736102a7eed932f4b931c
-
Filesize
6KB
MD5744a8f258f95b80945271629dec4ecab
SHA11c60fa52d2274270172e778e428adbecd524f9cd
SHA2567c35f6554afc6e6febf21404056a4ab13b1f16d8382f95551e9f57bcd3fb5255
SHA51209e8c4dee7a3cfa01f74152bedea133f4571d83f2f113aec2dd000c059e30f4b5040e7605ba069080af660918230e43985be90a3fe660eba3f316f81529f71a4
-
Filesize
6KB
MD5917f6cdd9d9bb3d95015916e0b802733
SHA18b95646a564502cf61d272a8319752e3152a2d06
SHA256d018cf5f1431ab3f4267b93cc4df18aa198e48e517f4a0d3c8ce79039014860b
SHA51247e81dfe75ac5ccb6783d6fe1327c5a758c58bdda2f048d938bfc75543748cd30f4e3662b1f6ea0e55723dc8b483546b0038634f28ac69872edbfa69e2c29e04
-
Filesize
130KB
MD566a3a02d6f99b14847a44ca2615abcd3
SHA1462a292ccc3d170ee8df85436a74f493f7ca8de6
SHA256a071006ce9bc69fa840ea3769f49bf3ddfc1960e67768398b76679155fc77b84
SHA512c919185342384cba6090ab246b41dff67c0f40b1985f9549ce1b1e4bdcf6384a386156de2aed08396791590a8e0b5ce9fb52c82b33c23f60d66723235cd36fe1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd