Analysis
-
max time kernel
600s -
max time network
586s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2024 13:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://s.mhs.com/Fi87Hr
Resource
win10v2004-20240226-en
General
-
Target
http://s.mhs.com/Fi87Hr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133561064177957281" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1664 chrome.exe 1664 chrome.exe 1004 chrome.exe 1004 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeCreatePagefilePrivilege 1664 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1664 wrote to memory of 236 1664 chrome.exe 85 PID 1664 wrote to memory of 236 1664 chrome.exe 85 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 100 1664 chrome.exe 88 PID 1664 wrote to memory of 2052 1664 chrome.exe 89 PID 1664 wrote to memory of 2052 1664 chrome.exe 89 PID 1664 wrote to memory of 3480 1664 chrome.exe 90 PID 1664 wrote to memory of 3480 1664 chrome.exe 90 PID 1664 wrote to memory of 3480 1664 chrome.exe 90 PID 1664 wrote to memory of 3480 1664 chrome.exe 90 PID 1664 wrote to memory of 3480 1664 chrome.exe 90 PID 1664 wrote to memory of 3480 1664 chrome.exe 90 PID 1664 wrote to memory of 3480 1664 chrome.exe 90 PID 1664 wrote to memory of 3480 1664 chrome.exe 90 PID 1664 wrote to memory of 3480 1664 chrome.exe 90 PID 1664 wrote to memory of 3480 1664 chrome.exe 90 PID 1664 wrote to memory of 3480 1664 chrome.exe 90 PID 1664 wrote to memory of 3480 1664 chrome.exe 90 PID 1664 wrote to memory of 3480 1664 chrome.exe 90 PID 1664 wrote to memory of 3480 1664 chrome.exe 90 PID 1664 wrote to memory of 3480 1664 chrome.exe 90 PID 1664 wrote to memory of 3480 1664 chrome.exe 90 PID 1664 wrote to memory of 3480 1664 chrome.exe 90 PID 1664 wrote to memory of 3480 1664 chrome.exe 90 PID 1664 wrote to memory of 3480 1664 chrome.exe 90 PID 1664 wrote to memory of 3480 1664 chrome.exe 90 PID 1664 wrote to memory of 3480 1664 chrome.exe 90 PID 1664 wrote to memory of 3480 1664 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://s.mhs.com/Fi87Hr1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xd8,0x100,0x104,0xe4,0x108,0x7ffef88e9758,0x7ffef88e9768,0x7ffef88e97782⤵PID:236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1796,i,7327244003598554986,1719790645841935965,131072 /prefetch:22⤵PID:100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1916 --field-trial-handle=1796,i,7327244003598554986,1719790645841935965,131072 /prefetch:82⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1796,i,7327244003598554986,1719790645841935965,131072 /prefetch:82⤵PID:3480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2864 --field-trial-handle=1796,i,7327244003598554986,1719790645841935965,131072 /prefetch:12⤵PID:3832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2876 --field-trial-handle=1796,i,7327244003598554986,1719790645841935965,131072 /prefetch:12⤵PID:3268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4568 --field-trial-handle=1796,i,7327244003598554986,1719790645841935965,131072 /prefetch:12⤵PID:1180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3912 --field-trial-handle=1796,i,7327244003598554986,1719790645841935965,131072 /prefetch:82⤵PID:3504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 --field-trial-handle=1796,i,7327244003598554986,1719790645841935965,131072 /prefetch:82⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2012 --field-trial-handle=1796,i,7327244003598554986,1719790645841935965,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1004
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD54cdb95f452af83994948df19a3423870
SHA1ea44e09e1125b0b0824a5f25f33db93b2f856430
SHA25602dd4e24a01f39e2ac5a6e9e1034ff41845c96560b212837feb74d1e0e335b5a
SHA512ea355c06bf9e649ba85e9839b56520052f4bf4b54252273f01ec919a6552f01c858d76c9eb1a8948b791c1c56dae7e02e5b9276793a70389b06221f998da1767
-
Filesize
168B
MD558102cf1e297d7519e6ac9e5b020289d
SHA1728399b42db44675317c13f98b2f8020d9178616
SHA2562520e97f75f124da2960824bff96d3a1737a8a0ff6672fb4373067006e0116f8
SHA5121382490d449d7d90d8fd3df2f3d9f4ba720665f305c91e775abaac5131adbb61801e1a19a19127ca2a701de99a9cacb9644b6b2c93c33c76debd4da443b5efcc
-
Filesize
1KB
MD5c7a0f449d5703721d8143141aceac52e
SHA1b463b2709e2df730d03c5c6c78b6fcd34c89404e
SHA256c3e14306226fdf646405bf075e53df1e943e657cd0f3f94a73cd85914764cf0f
SHA512d2d57276f5677524ba553e53d699101d0fedcee6766c71602f6699e02f3290df5f3bc1ec6b57baf73cb5753f2ed62fb7c80f6d1204ed369af648a34933cae7df
-
Filesize
745B
MD5ab511fbdd0b10453bb6ce99a0aff25c2
SHA1b5312387c5338c5b81f74468b1cedce4bf717919
SHA2560b0209b6374cebbecbda39f287b70bb6719166db3b72feabf01512b325ff6880
SHA512dc7cf75ee0558368437cf9bd7c7e5538b940d207cda8fdda2d0bccd370282d3a06656af9ca1fa467f30ebf43482ab7059d47ccca8524c82be0560c9b037ac2f4
-
Filesize
952B
MD52f30f008c06400e06d2fee4a1c8564fd
SHA16756aae23f7c5ba90a45b817f58993cf7f60be05
SHA256140b9bbb38df79c645f61ae77fb440358b6e10ed4b9a66b4d1bbc065af456ebe
SHA512b1bfc6d47de8805fb3789a0ec632cd21932262b9ae2ee78ab9b0895bb695af645407624c90038bbfe16525c293cfeb75c4ea8cc34fb7907e471f214365012402
-
Filesize
539B
MD5b6ef63458433e11c45c7447267a951b3
SHA1e44e208a917cc083b9265ce047e0f3b6efe62680
SHA256f6459d96d65b7d8aa49a5636fc1f28ca4dca3ba997deb0b0f5f1d3d7065242c6
SHA5129ffdcb6d4f331414aa67b4ac5e6e5485a4a7df439136f32369c614ea9b063428c561af10e4c37cd39a30868f16497448d0cd18a47357bbb54411e02ba5dcd090
-
Filesize
539B
MD5491d10e83525357eeb22c2238b084590
SHA1e27829b9d6927fcb1d7e7d19733b97c574720727
SHA256735fbe851b7ef896616424cdbf99cea2887f9382e523e3b2e553726abba3a8a5
SHA51218c2b5447f7560a7054105fb807e6c29f2cd053f4f2f4671eea0424a430059a75bb252f5adf8ccbf45627aff356a9cd92fd63863b4caab2d9fc83dd51fe3b0d1
-
Filesize
6KB
MD5d62327c4a7847f21ce1674ec3f37b3b4
SHA16c3630711aa8458dbe507327e96fe2edc68826a8
SHA256b80c41d4578311f056b0c4546885d556321b5a0dc832caa0e42505e0e1faf258
SHA512d19476faee04be7dc259688d07447d4bc478e55dfc545aa01b08b0eb7d6c2c80248517f4c271e97ceb65a24a1eeaa235a83958f5ce8c1873bf05f5dbd7e17376
-
Filesize
6KB
MD56a1eda2fc48e946a4c19ebb40a986b18
SHA18b9d6e588a6d8e7c8bc51b31d6f00dad716bd050
SHA2565300dc7fe49948f62603a44d4c27708f8d061900abb8bb9a2cc84c701645ffb8
SHA512566ed3da07be03bfca1af990abe3ccb7009086eb57c53767df2e14ba2c8d6e2973d8b1dad59c06b8ceea55319437067e8f64b84554192a41b9d629ecefeb5ef0
-
Filesize
128KB
MD5dd6b58f6809f606a4a2838bbf5935696
SHA1f45415b8e4bc9fa2e62cfdae2cb907c66fe7ebbe
SHA2563e51775516016950e87763b5267e48d63f731a2709823a9c249092be437e06f7
SHA512eb1d1cdcc16551a53348bf919ad785d5b617d2b5110f6cc4c9411e174b85c2f8ed79c6cd251864d12fab3d4a95a538a5281f7088533379c4135bfb848fa2b53f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd