Analysis
-
max time kernel
24s -
max time network
23s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2024, 22:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://of-l34kszz.blogspot.com/ https://of-l34kszz.blogspot.com/ https://of-l34kszz.blogspot.com/ https://of-l34kszz.blogspot.com/
Resource
win10v2004-20240226-en
General
-
Target
https://of-l34kszz.blogspot.com/ https://of-l34kszz.blogspot.com/ https://of-l34kszz.blogspot.com/ https://of-l34kszz.blogspot.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133567429674563391" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4688 chrome.exe 4688 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4688 wrote to memory of 1000 4688 chrome.exe 85 PID 4688 wrote to memory of 1000 4688 chrome.exe 85 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 312 4688 chrome.exe 89 PID 4688 wrote to memory of 2044 4688 chrome.exe 90 PID 4688 wrote to memory of 2044 4688 chrome.exe 90 PID 4688 wrote to memory of 3036 4688 chrome.exe 91 PID 4688 wrote to memory of 3036 4688 chrome.exe 91 PID 4688 wrote to memory of 3036 4688 chrome.exe 91 PID 4688 wrote to memory of 3036 4688 chrome.exe 91 PID 4688 wrote to memory of 3036 4688 chrome.exe 91 PID 4688 wrote to memory of 3036 4688 chrome.exe 91 PID 4688 wrote to memory of 3036 4688 chrome.exe 91 PID 4688 wrote to memory of 3036 4688 chrome.exe 91 PID 4688 wrote to memory of 3036 4688 chrome.exe 91 PID 4688 wrote to memory of 3036 4688 chrome.exe 91 PID 4688 wrote to memory of 3036 4688 chrome.exe 91 PID 4688 wrote to memory of 3036 4688 chrome.exe 91 PID 4688 wrote to memory of 3036 4688 chrome.exe 91 PID 4688 wrote to memory of 3036 4688 chrome.exe 91 PID 4688 wrote to memory of 3036 4688 chrome.exe 91 PID 4688 wrote to memory of 3036 4688 chrome.exe 91 PID 4688 wrote to memory of 3036 4688 chrome.exe 91 PID 4688 wrote to memory of 3036 4688 chrome.exe 91 PID 4688 wrote to memory of 3036 4688 chrome.exe 91 PID 4688 wrote to memory of 3036 4688 chrome.exe 91 PID 4688 wrote to memory of 3036 4688 chrome.exe 91 PID 4688 wrote to memory of 3036 4688 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://of-l34kszz.blogspot.com/ https://of-l34kszz.blogspot.com/ https://of-l34kszz.blogspot.com/ https://of-l34kszz.blogspot.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec85e9758,0x7ffec85e9768,0x7ffec85e97782⤵PID:1000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1844,i,1977101073526040223,17750050277664945869,131072 /prefetch:22⤵PID:312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1844,i,1977101073526040223,17750050277664945869,131072 /prefetch:82⤵PID:2044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1844,i,1977101073526040223,17750050277664945869,131072 /prefetch:82⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1844,i,1977101073526040223,17750050277664945869,131072 /prefetch:12⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3060 --field-trial-handle=1844,i,1977101073526040223,17750050277664945869,131072 /prefetch:12⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 --field-trial-handle=1844,i,1977101073526040223,17750050277664945869,131072 /prefetch:82⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 --field-trial-handle=1844,i,1977101073526040223,17750050277664945869,131072 /prefetch:82⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5104 --field-trial-handle=1844,i,1977101073526040223,17750050277664945869,131072 /prefetch:12⤵PID:3776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4104 --field-trial-handle=1844,i,1977101073526040223,17750050277664945869,131072 /prefetch:12⤵PID:2680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4576 --field-trial-handle=1844,i,1977101073526040223,17750050277664945869,131072 /prefetch:12⤵PID:3624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5048 --field-trial-handle=1844,i,1977101073526040223,17750050277664945869,131072 /prefetch:12⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4596 --field-trial-handle=1844,i,1977101073526040223,17750050277664945869,131072 /prefetch:12⤵PID:3992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3308 --field-trial-handle=1844,i,1977101073526040223,17750050277664945869,131072 /prefetch:12⤵PID:916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5752 --field-trial-handle=1844,i,1977101073526040223,17750050277664945869,131072 /prefetch:12⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD5c0baba77c31d83ed6efc7b83cbb0b81c
SHA1db36dbba82fe07adda1ccf5c8f3077de5fe64e99
SHA2564440ba1782475af0d7e8a33013b8a5536de072500eb5f990b1037a43f8cd3b47
SHA51253fd7a330847dcf5c1dc53d21005ef92e8c00c04c083ea702df25cb1386ea53c2ebad222ef84430606a941b27fdd4359f14cd6298c24353113c9792c91afe52c
-
Filesize
198KB
MD5319e0c36436ee0bf24476acbcc83565c
SHA1fb2658d5791fe5b37424119557ab8cee30acdc54
SHA256f6562ea52e056b979d6f52932ae57b7afb04486b10b0ebde22c5b51f502c69d1
SHA512ad902b9a010cf99bdedba405cad0387890a9ff90a9c91f6a3220cdceec1b08ecb97a326aef01b28d8d0aacb5f2a16f02f673e196bdb69fc68b3f636139059902
-
Filesize
873B
MD5c71264a493df6379b0cf5ad96c9ceb02
SHA164de692e8f00e45bf3e19672fbcb3ece84d47887
SHA256845f8a717cb2e4be7302612f85f598e030fd7515ddeb840aac5264f22aff60cd
SHA51251e9aaea20a9fea5867a011f6c2ff173f7a64dc5db2e92d808b2a5b0fa361819044f1fc49a5995e03769445c1c25a10b3929de37a7a8baddb4d86fd065625fad
-
Filesize
6KB
MD52f5f7eb7386995cfb98553525a609e94
SHA1a9490189d6e23e8138421126cd081bbcc3e9cb8a
SHA25611e830a208cdf75c5e3363d09f2ae4c14160834f983af1bfcd0456d980a227f6
SHA51201a0d381e3975b93ad18736fb8122cc17ca63dd10f60d7f5f53984449f9440cba5daf2e0c744f36114edca548940043cc77a1deca86a0cbada5cd1ba330f7307
-
Filesize
128KB
MD51bccfc4151eb430803aaba49f48f8b78
SHA1a17024d83206e748a490c5f00777525be2658b51
SHA256a7a015221fc69d11b8a9bae1461c34789a61155ec4d3ae9c1e9fccc117fef84c
SHA512eef76158e832a44741ca216b6f8e1693768562cc666e30f99d9fa09459bc4c342de14beaba2f6475f10b1e02ea1535d28f990d91074bf6209ef181b5bb372f48
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd