Analysis
-
max time kernel
59s -
max time network
60s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-03-2024 08:38
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://rcue-xmnxkjshie5638u3-mndjkdihje8737683yjbsvsygs09-mnxcjhduyi33.replit.app/#[email protected]
Resource
win11-20240214-en
General
-
Target
https://rcue-xmnxkjshie5638u3-mndjkdihje8737683yjbsvsygs09-mnxcjhduyi33.replit.app/#[email protected]
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133560023256835483" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 2524 chrome.exe 2524 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
chrome.exepid process 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2524 wrote to memory of 1460 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 1460 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3596 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 4160 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 4160 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3556 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3556 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3556 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3556 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3556 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3556 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3556 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3556 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3556 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3556 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3556 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3556 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3556 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3556 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3556 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3556 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3556 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3556 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3556 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3556 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3556 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3556 2524 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://rcue-xmnxkjshie5638u3-mndjkdihje8737683yjbsvsygs09-mnxcjhduyi33.replit.app/#[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb32e09758,0x7ffb32e09768,0x7ffb32e097782⤵PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 --field-trial-handle=1836,i,3522054742079768303,18194084985238903031,131072 /prefetch:22⤵PID:3596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1836,i,3522054742079768303,18194084985238903031,131072 /prefetch:82⤵PID:4160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2184 --field-trial-handle=1836,i,3522054742079768303,18194084985238903031,131072 /prefetch:82⤵PID:3556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1836,i,3522054742079768303,18194084985238903031,131072 /prefetch:12⤵PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1836,i,3522054742079768303,18194084985238903031,131072 /prefetch:12⤵PID:236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3944 --field-trial-handle=1836,i,3522054742079768303,18194084985238903031,131072 /prefetch:12⤵PID:1468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 --field-trial-handle=1836,i,3522054742079768303,18194084985238903031,131072 /prefetch:82⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 --field-trial-handle=1836,i,3522054742079768303,18194084985238903031,131072 /prefetch:82⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD5cb1198a566f60481fe9f783f6e87606b
SHA128cb0f054029d3006115fe6cf86f18dd7576b4c7
SHA256bf2e46ff5b5bf5adb0eef8ee54440335345cdbec28590f54e40775dbd93c517f
SHA512dcba3f30192a62daf5fdf0687a638684f79acafab4c8b0acf848cb7cbb449bb79d4b918008198fe294fa3dcb26060d8b4b28bff7ec6f605b0296555ed894eeee
-
Filesize
1KB
MD58bfc7b3164783bdbaea41232243594f8
SHA10c96365f8469856852e4206d481931e3989dbf07
SHA256785319b33eca28cc0873941897706ee7e0dc5546049da8f0b7eebcb5043f27cc
SHA51221548baed5f352ceb4d4bfce5e6d60065cadf1d84301d423f2e7136a91e398966c19068f07a6b2e0109d8ef35bfd2a3e32ec0f20a69dd90f0da068d3301ddd0b
-
Filesize
702B
MD5728569c5df5e1fb12390362bfb40b10a
SHA10a6fd5cc86c81cfdbc1190504d9048f59689bb49
SHA256392c8b3515a5c16288cd6a999fa7e90c534ecd29ceeea25d94716d90b0c78ea5
SHA512c99f43659a6814822fc1bfbd9c683108dabe00af40ab23d7a9379a2154bf9b2918e87986bf0910b4c276812fefe0dfbd8d7535585683b6e05233f0d29ea67581
-
Filesize
6KB
MD5dbbe755d7991a660526b00b10710649e
SHA13387f3cf047cdc9b2dccc1098982ff79b42a6dd3
SHA2565e51aed91ca94b491476146e0f1819baa15ee72e5ca9d15aa47fe8a93d45ed6c
SHA51294b020e16c6661af0ec3bfa411278ddb84d56462c3bb07551c4309c74f05a191a419fbe8cb71803018fa08672afaf2da1be6c4031d3b0afd5919e5c9a1fa8ae2
-
Filesize
129KB
MD5a52930dd95b1f01e0cc0047a1dc5c59e
SHA142baeb66b67d94cef17288e7175013f18005bae2
SHA256a7b1768914ddf9ffb1011a776fcaf48e6d47dd6066f6204e39d3f0bb10232705
SHA51282cd74f8b01b00f0f3e457f53d302f24f228c1227e75f015922ebe126ab4e525555077e8e8b57fd916046416c7df72e1e33c2c8c95c79648c3ea832aecc83833
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e