Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2024 06:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://kuognogj.emltrk.com
Resource
win10v2004-20240319-en
General
-
Target
http://kuognogj.emltrk.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133565997322028580" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
chrome.exechrome.exepid process 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 5516 chrome.exe 5516 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 4356 chrome.exe 4356 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4356 wrote to memory of 2756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4124 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 864 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 864 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2612 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2612 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2612 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2612 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2612 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2612 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2612 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2612 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2612 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2612 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2612 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2612 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2612 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2612 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2612 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2612 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2612 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2612 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2612 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2612 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2612 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2612 4356 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://kuognogj.emltrk.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb9d169758,0x7ffb9d169768,0x7ffb9d1697782⤵PID:2756
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1912,i,13111318149792140004,1380734557360524324,131072 /prefetch:22⤵PID:4124
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1912,i,13111318149792140004,1380734557360524324,131072 /prefetch:82⤵PID:864
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1912,i,13111318149792140004,1380734557360524324,131072 /prefetch:82⤵PID:2612
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2956 --field-trial-handle=1912,i,13111318149792140004,1380734557360524324,131072 /prefetch:12⤵PID:4364
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2988 --field-trial-handle=1912,i,13111318149792140004,1380734557360524324,131072 /prefetch:12⤵PID:4564
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 --field-trial-handle=1912,i,13111318149792140004,1380734557360524324,131072 /prefetch:82⤵PID:2628
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 --field-trial-handle=1912,i,13111318149792140004,1380734557360524324,131072 /prefetch:82⤵PID:1272
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 --field-trial-handle=1912,i,13111318149792140004,1380734557360524324,131072 /prefetch:82⤵PID:5920
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 --field-trial-handle=1912,i,13111318149792140004,1380734557360524324,131072 /prefetch:82⤵PID:5928
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2336 --field-trial-handle=1912,i,13111318149792140004,1380734557360524324,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5516
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4400
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3256 --field-trial-handle=2288,i,10301911031503898037,2997280636231771547,262144 --variations-seed-version /prefetch:81⤵PID:5128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5573bee22e00054a54ce43a2ac23439ae
SHA11b45a7639c60b39d83f0e662616157da6f35eb16
SHA25609daef0d41d14425f7010301beb822110f2a0d82b8b452c7f6bcc5b85c776534
SHA512104c594a3ed9a5a30ac06efdddfd4470e4eaf386e613810b77757c9c64dd5ad8880fdb889feeebc2961295a137583253083d18539624e2a43f3f86c78c8fd7c7
-
Filesize
159KB
MD592661af83806bb541c2afc657baa1c39
SHA1b28615abac5cfe43b8c30fc76be502b116f6a34f
SHA2566802170153d6ea3c53bc9ad410131a58f0f12cdf977c82b2c0983de95e040238
SHA512b50dadb69702b2dc08a5895dea5001330b71eda1be3cf6dd17c93d36f80560fb0e36f41c2589070a6b5d6aefbe974ad4a4275d18287a2db8898d179e3d8cf766
-
Filesize
136KB
MD54ddb162ae08dda1976c514b2ea71e1e1
SHA1e17aa83d1fade465c3e0e4e854220ce2946a4415
SHA256a21d13914b0ee97d2a3ba669509c1313f3d7c18cac51e2ec9e58b0b8aa49b747
SHA5129f3de9e1bf468b41713c16b80ce766b26d399a81236bba9527fd15c1f9e2adf2af2a0cd9a853996a2e675461901b06abd1d4d43e8730802e64aeb75f1354ea26
-
Filesize
136KB
MD50c79c4283927c54ec1b62628dd352693
SHA1906818ebafaf139655a26e26b6c8428828b09722
SHA25613af2c77cb14fed529fa31c4ff1a343260a3b7cfbbd88a5b9b0b02b1496d280e
SHA512242a50a82a5d63656164e021979e242f5aace570370cc1f5eb424bfd52cfa5dd86ecabae8acb1406317769220bac3aec4708aa42bc48de649a57f7b0beec75c9
-
Filesize
136KB
MD564071e091e34cd4897ea96db7e1576d7
SHA1519cdb6e8ef0468757391eccc3c61968a5db8df8
SHA2566cc5e8147210436306170e0f14bb4577a2ecb9ac71c28f0d8c3dd4ad16f7087b
SHA512e686230e31adcf7cc2f9649582f459cca62ffe414d37cff383fd19d8dbc2a0b7adcc38a1fd30de01884c318c793b0300a477537068c2da1ec4c14009c6fa4ee2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e