Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-04-2024 12:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://zimano.wiki/#cl/3016_md/69/695/739/28/568256
Resource
win10v2004-20240226-en
General
-
Target
http://zimano.wiki/#cl/3016_md/69/695/739/28/568256
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133567943894506080" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 820 chrome.exe 820 chrome.exe 3124 chrome.exe 3124 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe Token: SeShutdownPrivilege 820 chrome.exe Token: SeCreatePagefilePrivilege 820 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe 820 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 820 wrote to memory of 4656 820 chrome.exe 86 PID 820 wrote to memory of 4656 820 chrome.exe 86 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 4044 820 chrome.exe 90 PID 820 wrote to memory of 1668 820 chrome.exe 91 PID 820 wrote to memory of 1668 820 chrome.exe 91 PID 820 wrote to memory of 3048 820 chrome.exe 92 PID 820 wrote to memory of 3048 820 chrome.exe 92 PID 820 wrote to memory of 3048 820 chrome.exe 92 PID 820 wrote to memory of 3048 820 chrome.exe 92 PID 820 wrote to memory of 3048 820 chrome.exe 92 PID 820 wrote to memory of 3048 820 chrome.exe 92 PID 820 wrote to memory of 3048 820 chrome.exe 92 PID 820 wrote to memory of 3048 820 chrome.exe 92 PID 820 wrote to memory of 3048 820 chrome.exe 92 PID 820 wrote to memory of 3048 820 chrome.exe 92 PID 820 wrote to memory of 3048 820 chrome.exe 92 PID 820 wrote to memory of 3048 820 chrome.exe 92 PID 820 wrote to memory of 3048 820 chrome.exe 92 PID 820 wrote to memory of 3048 820 chrome.exe 92 PID 820 wrote to memory of 3048 820 chrome.exe 92 PID 820 wrote to memory of 3048 820 chrome.exe 92 PID 820 wrote to memory of 3048 820 chrome.exe 92 PID 820 wrote to memory of 3048 820 chrome.exe 92 PID 820 wrote to memory of 3048 820 chrome.exe 92 PID 820 wrote to memory of 3048 820 chrome.exe 92 PID 820 wrote to memory of 3048 820 chrome.exe 92 PID 820 wrote to memory of 3048 820 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://zimano.wiki/#cl/3016_md/69/695/739/28/5682561⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb1b849758,0x7ffb1b849768,0x7ffb1b8497782⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1868,i,15739624724233838922,4030276453077856844,131072 /prefetch:22⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1868,i,15739624724233838922,4030276453077856844,131072 /prefetch:82⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1868,i,15739624724233838922,4030276453077856844,131072 /prefetch:82⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2852 --field-trial-handle=1868,i,15739624724233838922,4030276453077856844,131072 /prefetch:12⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2860 --field-trial-handle=1868,i,15739624724233838922,4030276453077856844,131072 /prefetch:12⤵PID:3992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4892 --field-trial-handle=1868,i,15739624724233838922,4030276453077856844,131072 /prefetch:12⤵PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4768 --field-trial-handle=1868,i,15739624724233838922,4030276453077856844,131072 /prefetch:12⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5108 --field-trial-handle=1868,i,15739624724233838922,4030276453077856844,131072 /prefetch:12⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 --field-trial-handle=1868,i,15739624724233838922,4030276453077856844,131072 /prefetch:82⤵PID:4904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 --field-trial-handle=1868,i,15739624724233838922,4030276453077856844,131072 /prefetch:82⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3796 --field-trial-handle=1868,i,15739624724233838922,4030276453077856844,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3124
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD5e83a580d0715ab14f4d161d9f2728b67
SHA102e667d428f3a9800a73207e4fe263ae1ab04161
SHA256da916ecb33b4e1ad9e5c8495a30e3bb70c773600f9f3809c93ee94657164302e
SHA512cd4b78aef07af0f83b64af0f8ab2cb5dbebbfd1685980cadd64e4fab6bc41fc768b97fa22a2b9b4270e9304c0fe9c0c4ea0f6d37f9b7c448d7c4578c9e5972c6
-
Filesize
4KB
MD5908a155c083949135d16ee5793cbe1da
SHA1ce54589eab2312ac0ad532a63da7e0672c027634
SHA256a88e36ba08d785985fd1999836c86d370430829be24d408c529c880f106b8279
SHA512d62222b8a57ffc3c8f72c5a9d61e5f71ad14aa9fd13f1a6a8bb2a5a6ddf096f55444fdb350294581fbdf768eec40d8f4be258abb5e601e5de207c08141987c59
-
Filesize
4KB
MD53d1264a8108fcaa37d22213309fc315e
SHA19a11aab22ed01b5b3dc3d6e1992f68d0c3f26091
SHA256dbce802d130a5fe852e19c98d164dca3e80317a69838fbff68c9bd73cded40ca
SHA512ad2ae4338865fae17316c217f39b741e8722c650e5a153d75868b3bbbd7b0945d9536a35a9eaecb8d336e4a8c02d23a8bcf2b1be095487f524f557a420de8796
-
Filesize
2KB
MD5fdc86c30236aa6632d7140690557927a
SHA1cda87dd85c239bfb7bad8e4cec917e1141cee35a
SHA25673d5df27d0af68f663f4fd487760fdf5e967dd5ae704bc8ceb6dcd6ecd83d8d9
SHA5120699c36004b7d91f2aea6b3cccdf3f90001819e0b8772fb3b9435d077c3dc819af09ce0924b1a7cd186c87e26f7e118b4fdddb8be45285d9389a74a24e415bfc
-
Filesize
2KB
MD5f9eeb22145afd90492ba54449cc19b2a
SHA1ca169ea3decc38e1461f8a6de8675be5f08b0ef3
SHA256342a1b992580774149eb15d4bb720ec7e787e3a9d5d545b4729f37f94ab13ad6
SHA512ef75f7a88a3b1e7ede3b379fef2885c4c4fc45eca8108d757b338d917c321eb32c2d03fae2255edd021fe095b219fc5eb048975e5e1c36256e3833064529aecf
-
Filesize
7KB
MD51b321bf5cbc3e5094bb34b4b8be09f62
SHA16dff595b1ff15b4463221cee5f645dfd6c4e9531
SHA256c402897da2899ddeb6368146edc5e6b8ebe353a2cd209fbf3160b2f2e808114e
SHA5122deedd7f8a4a57c4d3a182af5c8ab4abc41c5c32715af9989d874ba78a82a6c72ea3b255453ed243ea463be7576bf8d2837cd643da1c137c38670268a63c7392
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5de9979ccd81203fa0952641cc202b4de
SHA18827c5e52bc560eb836a6a0f49c6da84f8225fdf
SHA256d36a349159fc2688a181c32398fe3ba829c3df2d045f7b2f70533201b0d0af22
SHA51281b20c89538282fba876c02598954e27c1b1834ccd838f216e26c3d87623c86658860385387bf283c3f7638e5b484a5fac5681050fd1f12c61137be77683c038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57a345.TMP
Filesize48B
MD5319071248e741be7a7dc338bb012952b
SHA1e226f3a253e3a65bd00f21bb46185b2ad2f344c5
SHA2564a86a2065b84328b856627152b0a013829ac0b814c90c51c4c324147805b5533
SHA512613725d70ae8657eb2d2d7d2ca56a7c06cebf56b17b889c6513f55938f5cb0cd1fdedbfc70e83086909e87af84c926859b6e06a9772d5fc63e30278be7bdd628
-
Filesize
128KB
MD5af7fbb92cbec17031ce691674d67a34e
SHA1b1dcd423e543bd3c3b7dde407a0cd99e1c93ea91
SHA256c00df9d78efd20f50d707afd635e2c64717f652963096747d77228d2da8ef621
SHA512edcdfb399a2b075c244812b517e02e45b7769b62f7c78a763caa66a13dfa6400dc1e1303ceaea7932f24dc836d8b9f3ed47dfb110dbb839cbabc06576d6da098
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd