Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 11:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://hotelmain26march.blogspot.com/////////////////////////////////hoho
Resource
win10v2004-20240226-en
General
-
Target
http://hotelmain26march.blogspot.com/////////////////////////////////hoho
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 27 bitbucket.org 30 bitbucket.org -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133560140391044613" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2616 chrome.exe 2616 chrome.exe 4620 chrome.exe 4620 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe Token: SeShutdownPrivilege 2616 chrome.exe Token: SeCreatePagefilePrivilege 2616 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe 2616 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2616 wrote to memory of 4436 2616 chrome.exe 87 PID 2616 wrote to memory of 4436 2616 chrome.exe 87 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3516 2616 chrome.exe 89 PID 2616 wrote to memory of 3668 2616 chrome.exe 90 PID 2616 wrote to memory of 3668 2616 chrome.exe 90 PID 2616 wrote to memory of 1344 2616 chrome.exe 91 PID 2616 wrote to memory of 1344 2616 chrome.exe 91 PID 2616 wrote to memory of 1344 2616 chrome.exe 91 PID 2616 wrote to memory of 1344 2616 chrome.exe 91 PID 2616 wrote to memory of 1344 2616 chrome.exe 91 PID 2616 wrote to memory of 1344 2616 chrome.exe 91 PID 2616 wrote to memory of 1344 2616 chrome.exe 91 PID 2616 wrote to memory of 1344 2616 chrome.exe 91 PID 2616 wrote to memory of 1344 2616 chrome.exe 91 PID 2616 wrote to memory of 1344 2616 chrome.exe 91 PID 2616 wrote to memory of 1344 2616 chrome.exe 91 PID 2616 wrote to memory of 1344 2616 chrome.exe 91 PID 2616 wrote to memory of 1344 2616 chrome.exe 91 PID 2616 wrote to memory of 1344 2616 chrome.exe 91 PID 2616 wrote to memory of 1344 2616 chrome.exe 91 PID 2616 wrote to memory of 1344 2616 chrome.exe 91 PID 2616 wrote to memory of 1344 2616 chrome.exe 91 PID 2616 wrote to memory of 1344 2616 chrome.exe 91 PID 2616 wrote to memory of 1344 2616 chrome.exe 91 PID 2616 wrote to memory of 1344 2616 chrome.exe 91 PID 2616 wrote to memory of 1344 2616 chrome.exe 91 PID 2616 wrote to memory of 1344 2616 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://hotelmain26march.blogspot.com/////////////////////////////////hoho1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffa63229758,0x7ffa63229768,0x7ffa632297782⤵PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1868,i,4490400064398716069,14706336549755515890,131072 /prefetch:22⤵PID:3516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1868,i,4490400064398716069,14706336549755515890,131072 /prefetch:82⤵PID:3668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1868,i,4490400064398716069,14706336549755515890,131072 /prefetch:82⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3012 --field-trial-handle=1868,i,4490400064398716069,14706336549755515890,131072 /prefetch:12⤵PID:4468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3028 --field-trial-handle=1868,i,4490400064398716069,14706336549755515890,131072 /prefetch:12⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4868 --field-trial-handle=1868,i,4490400064398716069,14706336549755515890,131072 /prefetch:82⤵PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 --field-trial-handle=1868,i,4490400064398716069,14706336549755515890,131072 /prefetch:82⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5088 --field-trial-handle=1868,i,4490400064398716069,14706336549755515890,131072 /prefetch:12⤵PID:3480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2344 --field-trial-handle=1868,i,4490400064398716069,14706336549755515890,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4620
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59ffe34873c9509ef5d4235414b0663cc
SHA1cc1c00b5d20d61680f8d81667f13f095bc38e2bd
SHA25678bcbb6c6553a2ae6a314bc37e43bf4e2f3dd7e25d8ac92dd3ec533d225208f1
SHA512dfe2c444c964c463791d7fcc2e45e5be69b42dbe5a68be1f97f87d68e4542340abcdcbf8f07813f0efaa5d481432981f3556fdbaed04c59a26513ae83050a2d0
-
Filesize
1KB
MD5471ec1d2ffe136e6bb016bda244f7d39
SHA161bb261555b91f7c780b4e0935c89c3e4e1110e6
SHA25601cfef146c12accea85d0c4fafd9b0097bad01c3fc73184d1aef037db6fa0f6d
SHA5125ae9aea7177430d4814d3407e5fc899cee432c9ab0dda2c2f49ece559e65fbc09c2e2d0c88306ce0995c597e1c8438e7fb3d80edab78dd1694dfe84d0312f09c
-
Filesize
534B
MD539dbbca11ac96ee6dfe9626176261c17
SHA1a93a168e4ba92cc581a5df5c924c52fa8f55c1f4
SHA2567d315fb572bcf037727e9e87ac7287955adddae0685add70ef2aa7f2d1e52310
SHA5120f4a66e6b12275b29a1eed618c55977236ef8b55fe38b0b26a8668da691b1b2ebecde4ebb6590a95946d89d57cd3152d987be30fac4f2e4ff101aab16b3458c1
-
Filesize
534B
MD5b8cba8ee256fc772dd7efeebfbf03242
SHA12af8603b83bb2e9ebacf61f8e553c5d8063c795b
SHA256dbb201afb6bbf0ea8c40e04d61f562e1427c8cf72e34e224102c9d4a6281bb30
SHA512d93a63d94b4aaf1d66ce573489da6a9a44c1072ca0771b38bec85b0e9ca00abcf5acfb5abcbde3881c164bb702ca59e58ca2d71d9605dd25d3b05fba58961923
-
Filesize
6KB
MD5555b690fa0a54f53ee78be6b92364ed0
SHA10b83b3a5f60191cba5f18aad24083d651f3f1681
SHA256a18dd23edcb86322e2c2f596c5b43e681bc3a83220777d064c053e792767a0b4
SHA5125a3f5fae649ee8277bf9036340bc95ba0abc79e4e925a728b5dbcb54b76f63528c6d051b66ca8adf69a2cc89c63ce27a0e2b1e5d2c2b23786bfae00d41c692f5
-
Filesize
6KB
MD5cdc8bd0b0be37889629c24c252fc65b9
SHA12ff281928d706e58ec5eff014664b73125420af3
SHA2563cabfa8ebc3ad9987e30dbbb1854fd81213f378013a05258fd3a62337de639a4
SHA5123c3879f51e6d0540ce8b004d23ef6123fd35ea011b701156c29f2e450798bf3836ddd65423dc5f6989dd3a8ddd8489d6f338d7d644c41ec0e4b813c704a784ae
-
Filesize
6KB
MD562dd10801cbd07b275a3c83dc029cbfd
SHA18403d5bc8e6d1725b9e62fb9141aec795d0ecfc2
SHA256d38077aa129f0f33a66d903ff6bbcaa32c9499e0a974512a8e0cadea8a626e7a
SHA512cfc5b83f8e1ca19641f51d8e78c846f9c5e4f56c5457608a746413164524ff7a9468b2542ed6937518cdb7ff5da3bad3946ee1c929d36e7f5c7dd07a56becef3
-
Filesize
6KB
MD54c548b582b8f923056b9e9be265816b9
SHA10204083bc50aabad0b56d4d22aff3293ddb64509
SHA256f52214ee51029a9104aaba362a551386bcfe143c478e21d004520c998acf6566
SHA51270f4b7c844be584e0faf43d01c892cf35d03d239d4f6a387058fc9f6d01dfd65467f05d2e06b9b6fc658c2a7dea2ac66819011265d99eb7e9d2b0177075a040d
-
Filesize
253KB
MD58781c4a9324a08073ee5bc9564632ab0
SHA18c9af5148cd64e2133950a74eec7cb61fa254d7c
SHA2568d1084571cdf2ce5513790484bcf7d8ab2ec9d1cd7c374c49362acc96e3fb231
SHA51278826e71e75c1a385546380776ea7139bbd713517f663fc3303c400b63e6c0b3f4471f58c031875c228fd688a2ea1d927b9610a23aab6f4fe9cdfcc6b1afa096
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd