Analysis
-
max time kernel
29s -
max time network
23s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
27/03/2024, 14:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://awxdk.r.ag.d.sendibm3.com/mk/un/li/sh/SMJz09a0vkbXpHKqdFu1WM5nNLZm/aIxuG4tcwyZp
Resource
win11-20240221-en
General
-
Target
https://awxdk.r.ag.d.sendibm3.com/mk/un/li/sh/SMJz09a0vkbXpHKqdFu1WM5nNLZm/aIxuG4tcwyZp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133560243265698669" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2930051783-2551506282-3430162621-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 440 chrome.exe 440 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 440 chrome.exe 440 chrome.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe Token: SeShutdownPrivilege 440 chrome.exe Token: SeCreatePagefilePrivilege 440 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe 440 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3880 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 440 wrote to memory of 1844 440 chrome.exe 77 PID 440 wrote to memory of 1844 440 chrome.exe 77 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 4924 440 chrome.exe 79 PID 440 wrote to memory of 2964 440 chrome.exe 80 PID 440 wrote to memory of 2964 440 chrome.exe 80 PID 440 wrote to memory of 4516 440 chrome.exe 81 PID 440 wrote to memory of 4516 440 chrome.exe 81 PID 440 wrote to memory of 4516 440 chrome.exe 81 PID 440 wrote to memory of 4516 440 chrome.exe 81 PID 440 wrote to memory of 4516 440 chrome.exe 81 PID 440 wrote to memory of 4516 440 chrome.exe 81 PID 440 wrote to memory of 4516 440 chrome.exe 81 PID 440 wrote to memory of 4516 440 chrome.exe 81 PID 440 wrote to memory of 4516 440 chrome.exe 81 PID 440 wrote to memory of 4516 440 chrome.exe 81 PID 440 wrote to memory of 4516 440 chrome.exe 81 PID 440 wrote to memory of 4516 440 chrome.exe 81 PID 440 wrote to memory of 4516 440 chrome.exe 81 PID 440 wrote to memory of 4516 440 chrome.exe 81 PID 440 wrote to memory of 4516 440 chrome.exe 81 PID 440 wrote to memory of 4516 440 chrome.exe 81 PID 440 wrote to memory of 4516 440 chrome.exe 81 PID 440 wrote to memory of 4516 440 chrome.exe 81 PID 440 wrote to memory of 4516 440 chrome.exe 81 PID 440 wrote to memory of 4516 440 chrome.exe 81 PID 440 wrote to memory of 4516 440 chrome.exe 81 PID 440 wrote to memory of 4516 440 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://awxdk.r.ag.d.sendibm3.com/mk/un/li/sh/SMJz09a0vkbXpHKqdFu1WM5nNLZm/aIxuG4tcwyZp1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff885df9758,0x7ff885df9768,0x7ff885df97782⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1808,i,13325468209315121453,8303635077003271468,131072 /prefetch:22⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 --field-trial-handle=1808,i,13325468209315121453,8303635077003271468,131072 /prefetch:82⤵PID:2964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2148 --field-trial-handle=1808,i,13325468209315121453,8303635077003271468,131072 /prefetch:82⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1808,i,13325468209315121453,8303635077003271468,131072 /prefetch:12⤵PID:604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2964 --field-trial-handle=1808,i,13325468209315121453,8303635077003271468,131072 /prefetch:12⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 --field-trial-handle=1808,i,13325468209315121453,8303635077003271468,131072 /prefetch:82⤵PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4668 --field-trial-handle=1808,i,13325468209315121453,8303635077003271468,131072 /prefetch:82⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4032
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130KB
MD5f731082ad59b4626d83868b9c0f63c7b
SHA1d2e0a771d7bd084982401be21798d6bc35797164
SHA25665456541664f1bd0a34d7a51a2162dc437cd0a1e221181c049485ca8cfd8328e
SHA5123275b3fbccf353ac2250e1c9508908d47d37d5c4d29264b95e2d5f852c4ee04ae67ac6ff767b0d22e68431dbc8228bd485157e4887eac1acc5195bb24852d0d5
-
Filesize
1KB
MD53261c8557e6698580b49904ec5e38c25
SHA180dd4913129ee6cbaf35cda31e21d2bfb7daf0b7
SHA25621e38c4e876fafa27b1f0fdfd3f200de9302b34fec0bf623be17b61dc2af15ad
SHA512202befb1cd13101fba6b261c1d2fa50be8e7e34e376e97cad765aec2db124e8bac57db90e752c4759d052ad93a6bdcea39af101b5240345290f94ee9371e9327
-
Filesize
6KB
MD50c61776624e0fdac8d7ccc1b98e4af2e
SHA1afaf561d7c911086e999b37d60ab9ab2030483c3
SHA25621b51e3a54ae8ef2cee52370838f5a03405bd989043fed48a242a0e2a3cf51b5
SHA5128139cf6a32b17acadbb17db1316c75950a220746d8fa7210032cff0f82986d3fe002ad675e936745ad2d51adf5ad31c4fcf8dba348059399765528912de31b2e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5eebfb84605e05222e3ad98f4b9f62db2
SHA136ddd440df5b2776281ad245a6a57e7a183c09a0
SHA2564a9b70f7113d5c252937ad9bbfa110031124ffe3643648db3f944111b61bd559
SHA51290e6f46d36c30783af4032f72beb58eb157849a8197e39945542da8a0c1313cb87e91f18a732f5718ec6a676fcd790458419bcc22c608824416fa6df14bf5ba6