Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-04-2024 10:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://108.61.171.103
Resource
win10v2004-20240226-en
General
-
Target
https://108.61.171.103
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133570474298394179" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1532 chrome.exe 1532 chrome.exe 2932 chrome.exe 2932 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1532 wrote to memory of 3816 1532 chrome.exe 86 PID 1532 wrote to memory of 3816 1532 chrome.exe 86 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1968 1532 chrome.exe 90 PID 1532 wrote to memory of 1956 1532 chrome.exe 91 PID 1532 wrote to memory of 1956 1532 chrome.exe 91 PID 1532 wrote to memory of 1768 1532 chrome.exe 92 PID 1532 wrote to memory of 1768 1532 chrome.exe 92 PID 1532 wrote to memory of 1768 1532 chrome.exe 92 PID 1532 wrote to memory of 1768 1532 chrome.exe 92 PID 1532 wrote to memory of 1768 1532 chrome.exe 92 PID 1532 wrote to memory of 1768 1532 chrome.exe 92 PID 1532 wrote to memory of 1768 1532 chrome.exe 92 PID 1532 wrote to memory of 1768 1532 chrome.exe 92 PID 1532 wrote to memory of 1768 1532 chrome.exe 92 PID 1532 wrote to memory of 1768 1532 chrome.exe 92 PID 1532 wrote to memory of 1768 1532 chrome.exe 92 PID 1532 wrote to memory of 1768 1532 chrome.exe 92 PID 1532 wrote to memory of 1768 1532 chrome.exe 92 PID 1532 wrote to memory of 1768 1532 chrome.exe 92 PID 1532 wrote to memory of 1768 1532 chrome.exe 92 PID 1532 wrote to memory of 1768 1532 chrome.exe 92 PID 1532 wrote to memory of 1768 1532 chrome.exe 92 PID 1532 wrote to memory of 1768 1532 chrome.exe 92 PID 1532 wrote to memory of 1768 1532 chrome.exe 92 PID 1532 wrote to memory of 1768 1532 chrome.exe 92 PID 1532 wrote to memory of 1768 1532 chrome.exe 92 PID 1532 wrote to memory of 1768 1532 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://108.61.171.1031⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff97ae9758,0x7fff97ae9768,0x7fff97ae97782⤵PID:3816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1824,i,16881966201886075937,4125146799679711701,131072 /prefetch:22⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1824,i,16881966201886075937,4125146799679711701,131072 /prefetch:82⤵PID:1956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2188 --field-trial-handle=1824,i,16881966201886075937,4125146799679711701,131072 /prefetch:82⤵PID:1768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2948 --field-trial-handle=1824,i,16881966201886075937,4125146799679711701,131072 /prefetch:12⤵PID:1828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2960 --field-trial-handle=1824,i,16881966201886075937,4125146799679711701,131072 /prefetch:12⤵PID:4792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 --field-trial-handle=1824,i,16881966201886075937,4125146799679711701,131072 /prefetch:82⤵PID:3564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 --field-trial-handle=1824,i,16881966201886075937,4125146799679711701,131072 /prefetch:82⤵PID:2036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=6136 --field-trial-handle=1824,i,16881966201886075937,4125146799679711701,131072 /prefetch:12⤵PID:3268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3432 --field-trial-handle=1824,i,16881966201886075937,4125146799679711701,131072 /prefetch:12⤵PID:3912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3692 --field-trial-handle=1824,i,16881966201886075937,4125146799679711701,131072 /prefetch:12⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=6020 --field-trial-handle=1824,i,16881966201886075937,4125146799679711701,131072 /prefetch:12⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1588 --field-trial-handle=1824,i,16881966201886075937,4125146799679711701,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2932
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
678B
MD590694a072301c94d9096a3acc826632a
SHA144d79c433735cf893f388963153ec7357e31f2b0
SHA2563ccfa189dde7098e9938858ea278ce71a0183b6991f601df18a4bdf276c099e5
SHA512bb250550fe21f793697864c4dbd3ed72b7351328679d9cab17b88cd47f29f722aab68297c055ead8a272dac6eb2b788f67b33b2b38f337e7b159135c06955f10
-
Filesize
6KB
MD5185d3ad69b6f4c82295c80e572c670db
SHA1c16bfe872af0b8335d85012454c23eb86deb4d9f
SHA256e4063668f2648651a4d1472b72050704884756660421adccfee365cf6d3b4bab
SHA5123ee455dd74a0879d987a838a7217bf840f746dbcdf5e3474473b66d77440e2be0505d2287287cb8ab1795b1a50d55764e0d3c0602986da640e2e58cebb1c1a5d
-
Filesize
6KB
MD5a8b44f91a61a4507d978178664cabc0b
SHA137f7cef1e2c3c79e31380878a5436a28779736e1
SHA2566f107e015968010da2e5b03a814fc1b30e7bdc3295d8c926aae74ad54c0d5700
SHA5125c57093298f013ef3832c426aca6fc3bf60ceb3a6123910747078a2991d31ff97d93fd40d66b8ace6662f12ce6340c7bf355a5d7f98f577d1f069a5b527ff62e
-
Filesize
128KB
MD5ca9ed70e079341c80cdea06f089b62a6
SHA18ba4808ad5b0b0d34929d8e58562b78aae44da8b
SHA25670ec02f77585113f4218f2095cefd0eb746e3c07e989b05b96bf9e813d3ddb6e
SHA512ebbf276acb850723bd61e11094bb37448ecfa2a533dd0e8b01c0a031e45569065058ea6d50ffdd59c94ae9636d37a7c80a1ae884fb8e5574c919a8df2345e734
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd