Analysis
-
max time kernel
20s -
max time network
25s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 16:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://files.catbox.moe/vbnyn7.zip
Resource
win10v2004-20240319-en
General
-
Target
https://files.catbox.moe/vbnyn7.zip
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133559453004599439" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4000 chrome.exe 4000 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeShutdownPrivilege 4000 chrome.exe Token: SeCreatePagefilePrivilege 4000 chrome.exe Token: SeShutdownPrivilege 4000 chrome.exe Token: SeCreatePagefilePrivilege 4000 chrome.exe Token: SeShutdownPrivilege 4000 chrome.exe Token: SeCreatePagefilePrivilege 4000 chrome.exe Token: SeShutdownPrivilege 4000 chrome.exe Token: SeCreatePagefilePrivilege 4000 chrome.exe Token: SeShutdownPrivilege 4000 chrome.exe Token: SeCreatePagefilePrivilege 4000 chrome.exe Token: SeShutdownPrivilege 4000 chrome.exe Token: SeCreatePagefilePrivilege 4000 chrome.exe Token: SeShutdownPrivilege 4000 chrome.exe Token: SeCreatePagefilePrivilege 4000 chrome.exe Token: SeShutdownPrivilege 4000 chrome.exe Token: SeCreatePagefilePrivilege 4000 chrome.exe Token: SeShutdownPrivilege 4000 chrome.exe Token: SeCreatePagefilePrivilege 4000 chrome.exe Token: SeShutdownPrivilege 4000 chrome.exe Token: SeCreatePagefilePrivilege 4000 chrome.exe Token: SeShutdownPrivilege 4000 chrome.exe Token: SeCreatePagefilePrivilege 4000 chrome.exe Token: SeShutdownPrivilege 4000 chrome.exe Token: SeCreatePagefilePrivilege 4000 chrome.exe Token: SeShutdownPrivilege 4000 chrome.exe Token: SeCreatePagefilePrivilege 4000 chrome.exe Token: SeShutdownPrivilege 4000 chrome.exe Token: SeCreatePagefilePrivilege 4000 chrome.exe Token: SeShutdownPrivilege 4000 chrome.exe Token: SeCreatePagefilePrivilege 4000 chrome.exe Token: SeShutdownPrivilege 4000 chrome.exe Token: SeCreatePagefilePrivilege 4000 chrome.exe Token: SeShutdownPrivilege 4000 chrome.exe Token: SeCreatePagefilePrivilege 4000 chrome.exe Token: SeShutdownPrivilege 4000 chrome.exe Token: SeCreatePagefilePrivilege 4000 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe 4000 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4000 wrote to memory of 2780 4000 chrome.exe 94 PID 4000 wrote to memory of 2780 4000 chrome.exe 94 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1996 4000 chrome.exe 97 PID 4000 wrote to memory of 1964 4000 chrome.exe 98 PID 4000 wrote to memory of 1964 4000 chrome.exe 98 PID 4000 wrote to memory of 492 4000 chrome.exe 99 PID 4000 wrote to memory of 492 4000 chrome.exe 99 PID 4000 wrote to memory of 492 4000 chrome.exe 99 PID 4000 wrote to memory of 492 4000 chrome.exe 99 PID 4000 wrote to memory of 492 4000 chrome.exe 99 PID 4000 wrote to memory of 492 4000 chrome.exe 99 PID 4000 wrote to memory of 492 4000 chrome.exe 99 PID 4000 wrote to memory of 492 4000 chrome.exe 99 PID 4000 wrote to memory of 492 4000 chrome.exe 99 PID 4000 wrote to memory of 492 4000 chrome.exe 99 PID 4000 wrote to memory of 492 4000 chrome.exe 99 PID 4000 wrote to memory of 492 4000 chrome.exe 99 PID 4000 wrote to memory of 492 4000 chrome.exe 99 PID 4000 wrote to memory of 492 4000 chrome.exe 99 PID 4000 wrote to memory of 492 4000 chrome.exe 99 PID 4000 wrote to memory of 492 4000 chrome.exe 99 PID 4000 wrote to memory of 492 4000 chrome.exe 99 PID 4000 wrote to memory of 492 4000 chrome.exe 99 PID 4000 wrote to memory of 492 4000 chrome.exe 99 PID 4000 wrote to memory of 492 4000 chrome.exe 99 PID 4000 wrote to memory of 492 4000 chrome.exe 99 PID 4000 wrote to memory of 492 4000 chrome.exe 99
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://files.catbox.moe/vbnyn7.zip1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffac3349758,0x7ffac3349768,0x7ffac33497782⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1872,i,6359615791957299767,11715255748569768910,131072 /prefetch:22⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1872,i,6359615791957299767,11715255748569768910,131072 /prefetch:82⤵PID:1964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1872,i,6359615791957299767,11715255748569768910,131072 /prefetch:82⤵PID:492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1872,i,6359615791957299767,11715255748569768910,131072 /prefetch:12⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3020 --field-trial-handle=1872,i,6359615791957299767,11715255748569768910,131072 /prefetch:12⤵PID:4032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4356 --field-trial-handle=1872,i,6359615791957299767,11715255748569768910,131072 /prefetch:82⤵PID:1276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4416 --field-trial-handle=1872,i,6359615791957299767,11715255748569768910,131072 /prefetch:82⤵PID:3824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4840 --field-trial-handle=1872,i,6359615791957299767,11715255748569768910,131072 /prefetch:12⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3012 --field-trial-handle=1872,i,6359615791957299767,11715255748569768910,131072 /prefetch:12⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5084 --field-trial-handle=1872,i,6359615791957299767,11715255748569768910,131072 /prefetch:12⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5b571e343148dd970e7f79706aeb64095
SHA1b2754a2d070131df6f814a2202cf711417d53e6d
SHA2566d16a7352a2ada737987936604f682fa408e8379862eb0ceb9355c07ec7c9464
SHA512afc91acc2da76d0dacdb15644e624c8443f2c586e331b1767fa80248d3d57165eb1b6cf53fe6be30511295cb668bda4f75628e905ba630cdb30bd5dbb5e0aa73
-
Filesize
137KB
MD55e8b5f3bfe553b9542ba4bae4b30462b
SHA10b5f1e891103e2752b1b5f410079c838f0ded529
SHA2560418bcb969540edb7c5e9a9ac934787d7f7a513887743ce2a9f98685f3ef4811
SHA512e8ddc3b7789c55727b50e1c15f624d6f9fdc8fa7a684ddc18f853fe4b1ef728fa287ebca75ff5ddc3a8b02322a82286d55f2c54e0f3ce9d77edea42c18fe7ea5
-
Filesize
136KB
MD508d388d2db8009e5875a39c1483f4e4f
SHA1bd256a71dad4a5888059f793c6a7330130e98ad9
SHA2567ad3211e54b011318e1bb69f040ddd09c55ed8480530040fa810c51476d69f18
SHA5124176f8ef8be552328079b2383e1577a77481c3a0b18bd7ced41c3fa7362097454d9eac6a56edee5d0882ba349222d4277b46bd92c147c89d8e48a6c0b2b18549
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd