Analysis
-
max time kernel
270s -
max time network
269s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2024, 17:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://6-z.com/update1503/update1503.zip
Resource
win10v2004-20240226-en
General
-
Target
https://6-z.com/update1503/update1503.zip
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\(61eb106b5a095b730a38558041fcfea0)update1503.exe = "C:\\Users\\Public\\Libraries\\(61eb106b5a095b730a38558041fcfea0)update1503.exe" update1503.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\(61eb106b5a095b730a38558041fcfea0)update1503.exe = "C:\\Users\\Public\\Libraries\\(61eb106b5a095b730a38558041fcfea0)update1503.exe" update1503.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 544 set thread context of 4292 544 update1503.exe 110 PID 3040 set thread context of 888 3040 update1503.exe 113 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133567247005881713" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4112 chrome.exe 4112 chrome.exe 4192 chrome.exe 4192 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4112 chrome.exe 4112 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4112 wrote to memory of 116 4112 chrome.exe 85 PID 4112 wrote to memory of 116 4112 chrome.exe 85 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 5096 4112 chrome.exe 89 PID 4112 wrote to memory of 2120 4112 chrome.exe 90 PID 4112 wrote to memory of 2120 4112 chrome.exe 90 PID 4112 wrote to memory of 1852 4112 chrome.exe 91 PID 4112 wrote to memory of 1852 4112 chrome.exe 91 PID 4112 wrote to memory of 1852 4112 chrome.exe 91 PID 4112 wrote to memory of 1852 4112 chrome.exe 91 PID 4112 wrote to memory of 1852 4112 chrome.exe 91 PID 4112 wrote to memory of 1852 4112 chrome.exe 91 PID 4112 wrote to memory of 1852 4112 chrome.exe 91 PID 4112 wrote to memory of 1852 4112 chrome.exe 91 PID 4112 wrote to memory of 1852 4112 chrome.exe 91 PID 4112 wrote to memory of 1852 4112 chrome.exe 91 PID 4112 wrote to memory of 1852 4112 chrome.exe 91 PID 4112 wrote to memory of 1852 4112 chrome.exe 91 PID 4112 wrote to memory of 1852 4112 chrome.exe 91 PID 4112 wrote to memory of 1852 4112 chrome.exe 91 PID 4112 wrote to memory of 1852 4112 chrome.exe 91 PID 4112 wrote to memory of 1852 4112 chrome.exe 91 PID 4112 wrote to memory of 1852 4112 chrome.exe 91 PID 4112 wrote to memory of 1852 4112 chrome.exe 91 PID 4112 wrote to memory of 1852 4112 chrome.exe 91 PID 4112 wrote to memory of 1852 4112 chrome.exe 91 PID 4112 wrote to memory of 1852 4112 chrome.exe 91 PID 4112 wrote to memory of 1852 4112 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://6-z.com/update1503/update1503.zip1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa64369758,0x7ffa64369768,0x7ffa643697782⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1884,i,65351058461446452,10039158400798734774,131072 /prefetch:22⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1884,i,65351058461446452,10039158400798734774,131072 /prefetch:82⤵PID:2120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1828 --field-trial-handle=1884,i,65351058461446452,10039158400798734774,131072 /prefetch:82⤵PID:1852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2836 --field-trial-handle=1884,i,65351058461446452,10039158400798734774,131072 /prefetch:12⤵PID:828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2844 --field-trial-handle=1884,i,65351058461446452,10039158400798734774,131072 /prefetch:12⤵PID:228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4868 --field-trial-handle=1884,i,65351058461446452,10039158400798734774,131072 /prefetch:82⤵PID:556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 --field-trial-handle=1884,i,65351058461446452,10039158400798734774,131072 /prefetch:82⤵PID:1136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 --field-trial-handle=1884,i,65351058461446452,10039158400798734774,131072 /prefetch:82⤵PID:4192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4968 --field-trial-handle=1884,i,65351058461446452,10039158400798734774,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4192
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2400
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\Temp1_update1503.zip\update1503.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_update1503.zip\update1503.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:544 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵PID:4292
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_update1503.zip\update1503.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_update1503.zip\update1503.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:3040 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵PID:888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
677B
MD5a524d86fafff2f921ce4e1f9695ad828
SHA12ce2097c5ddfeb387e73ac2f78fcfc5100f19242
SHA2566025b6b38018c5df14676186489623eeff045f4888bae77ef78c8b50bae8ec26
SHA512c16f0bc8678314c1b7316d75cc4f7ea76800971eba7fcf9d0ee4fdf416037065f3e38065897cb2ca421d4dd8aab0c27b00a74a339a25a2a8a76c48a90b3e33c7
-
Filesize
6KB
MD557fb55734900b06617c3dde00433b944
SHA1d3a26d91fd83b16594d4f79d09f7b8a52e37ff09
SHA256dba320f2da09a69d4e27151a6fef4e81b147908778b524ea1d329ee822b23db4
SHA51208421ec93e0e003ee67f1d8fdf151f0dc7c9666e0e43de8c6c680094dcd9917e9d7ff7aef68d917a03d46048ffa656716b027e6970e0b21f9c261e702445ca69
-
Filesize
128KB
MD531a9e19ed3cdd2f8d6f60d9b870952db
SHA18623683a7e4c621d9ca70060e2bc4c35240e4d1c
SHA2569b1d31157f57b547eaa05fa412811aa78a3959700e424a4bb0fb60d07f4b84f0
SHA5124484f21258b4c8a49ce8fe5507cdaf28fc6947668817c39264da953dd04d0e5cf31db8c928fbe93dad7ead2591104999997f4800a8aeed2686d4cb17ea61dc5f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
4.9MB
MD5b5d1d1ca6a3f8f49b61ca8282bab8ec7
SHA109da9b11a343be0e9d6981bea21a10abe068bb21
SHA256cbf149dc8de16a3e1cb44b9dd9215212e10f13a52dc04667a2031cd339c558ee
SHA512d2148c8741d3931c5a71348799e119441c91b87d3e11d3c54cb5fc9664cf221dc77fed7e31c6a4b83801d3be82d63af8c65348aea8db203be6d43e2f9119625d
-
Filesize
15.0MB
MD561eb106b5a095b730a38558041fcfea0
SHA1e13541f9cef1125938f8f22da771bca407d6a20d
SHA256294c0953a6612a5030e2eb8ccb7470ed36860e0df809c5c01798b082e35ad421
SHA5125fecae7b0db7972b3d78ce01591d15c1caf0ece1b7496e3104805e01c362fcdacbefe0fd69bcf8f7299c1ed5c4b5015eaf4570dcc2c9657d105edd552eb6525c