Analysis
-
max time kernel
299s -
max time network
245s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2024 14:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://100.100.100.200/latest/api/token
Resource
win10v2004-20231215-en
General
-
Target
http://100.100.100.200/latest/api/token
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133560246368666245" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2280 chrome.exe 2280 chrome.exe 4888 chrome.exe 4888 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe Token: SeShutdownPrivilege 2280 chrome.exe Token: SeCreatePagefilePrivilege 2280 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe 2280 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2280 wrote to memory of 3404 2280 chrome.exe 85 PID 2280 wrote to memory of 3404 2280 chrome.exe 85 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 216 2280 chrome.exe 87 PID 2280 wrote to memory of 620 2280 chrome.exe 88 PID 2280 wrote to memory of 620 2280 chrome.exe 88 PID 2280 wrote to memory of 3992 2280 chrome.exe 89 PID 2280 wrote to memory of 3992 2280 chrome.exe 89 PID 2280 wrote to memory of 3992 2280 chrome.exe 89 PID 2280 wrote to memory of 3992 2280 chrome.exe 89 PID 2280 wrote to memory of 3992 2280 chrome.exe 89 PID 2280 wrote to memory of 3992 2280 chrome.exe 89 PID 2280 wrote to memory of 3992 2280 chrome.exe 89 PID 2280 wrote to memory of 3992 2280 chrome.exe 89 PID 2280 wrote to memory of 3992 2280 chrome.exe 89 PID 2280 wrote to memory of 3992 2280 chrome.exe 89 PID 2280 wrote to memory of 3992 2280 chrome.exe 89 PID 2280 wrote to memory of 3992 2280 chrome.exe 89 PID 2280 wrote to memory of 3992 2280 chrome.exe 89 PID 2280 wrote to memory of 3992 2280 chrome.exe 89 PID 2280 wrote to memory of 3992 2280 chrome.exe 89 PID 2280 wrote to memory of 3992 2280 chrome.exe 89 PID 2280 wrote to memory of 3992 2280 chrome.exe 89 PID 2280 wrote to memory of 3992 2280 chrome.exe 89 PID 2280 wrote to memory of 3992 2280 chrome.exe 89 PID 2280 wrote to memory of 3992 2280 chrome.exe 89 PID 2280 wrote to memory of 3992 2280 chrome.exe 89 PID 2280 wrote to memory of 3992 2280 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://100.100.100.200/latest/api/token1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff1ad49758,0x7fff1ad49768,0x7fff1ad497782⤵PID:3404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1848,i,3553876741081929868,6836730165138430605,131072 /prefetch:22⤵PID:216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1848,i,3553876741081929868,6836730165138430605,131072 /prefetch:82⤵PID:620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1848,i,3553876741081929868,6836730165138430605,131072 /prefetch:82⤵PID:3992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2668 --field-trial-handle=1848,i,3553876741081929868,6836730165138430605,131072 /prefetch:12⤵PID:60
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2676 --field-trial-handle=1848,i,3553876741081929868,6836730165138430605,131072 /prefetch:12⤵PID:2636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 --field-trial-handle=1848,i,3553876741081929868,6836730165138430605,131072 /prefetch:82⤵PID:4068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3872 --field-trial-handle=1848,i,3553876741081929868,6836730165138430605,131072 /prefetch:82⤵PID:3384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4948 --field-trial-handle=1848,i,3553876741081929868,6836730165138430605,131072 /prefetch:12⤵PID:4048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3220 --field-trial-handle=1848,i,3553876741081929868,6836730165138430605,131072 /prefetch:12⤵PID:2972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=1628 --field-trial-handle=1848,i,3553876741081929868,6836730165138430605,131072 /prefetch:12⤵PID:848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3704 --field-trial-handle=1848,i,3553876741081929868,6836730165138430605,131072 /prefetch:12⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6060 --field-trial-handle=1848,i,3553876741081929868,6836730165138430605,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2784 --field-trial-handle=1848,i,3553876741081929868,6836730165138430605,131072 /prefetch:12⤵PID:4052
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
823B
MD5a2d0968c1753560e622381ac7933f3b1
SHA10a432c920691583593f846caa3b01c6a1aa57a9b
SHA2565a46993d0254d714916eac8cfd59be1fffa5118c043ffd4fec51d50259af9890
SHA51219d51d0c7c61aa57267a46a746e87d760de57366c410949176ce28da9c82b04aad0129091d35ab7ee025e6524a5ee7b54e07a2083a00bebaf573908d61291acb
-
Filesize
6KB
MD5d51f9fbd651e5e756f79e19dab28d1d2
SHA13434a53ecc86b13b59ce33751168eaf120fbfead
SHA2562c843c1225722c09cda91b997779616f07090c13b2d7bbcfcc4b10c744b884a2
SHA5122cc36d28c842d9fd204f921d5bbfcb784f05259aa9310fa55370144d5d0e5dfa5869f30819ea3ef50c8c6d8eb714870c4fd1e06013c29db3b2a066942dedb5b1
-
Filesize
6KB
MD53481a85c11569c744c8f2b229431a4d5
SHA1d7787cacf2bcf6da2717829565043f38d0b719b5
SHA256c1f0892bb7d5c991638f22c69a11d80f6fbd124fd451fe52e48a3edf1735545f
SHA51236dd319880d90777c05ab8f7d399945fce576f0fc35cc749891ace8f62f99520ffccaefc0d9532fa7bf2951f896992a37906d8d8ffb1846afd3c4a83ae4684ed
-
Filesize
114KB
MD5c435945112317ae260b61f268624fa68
SHA187067ac8be91a92d397f6b8834407e982172ad47
SHA25630fb1d6dd08c8f2b1f8e442eeebe3e4f0952a9ec5a862297301e098fa2081b8c
SHA5127473b2921d839bc43fea7386fdbe1be68ed8b1241b90533da85bddc2a8d882b9d99fc12e2cd925b5d3e49f237c692dc97ef876f6626d3f313a51e3baf4e4297e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd