Analysis
-
max time kernel
36s -
max time network
37s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-04-2024 10:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.elite-valves.com
Resource
win11-20240214-en
General
-
Target
http://www.elite-valves.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133571310724390415" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 404 chrome.exe 404 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 404 chrome.exe 404 chrome.exe 404 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 404 wrote to memory of 1008 404 chrome.exe 76 PID 404 wrote to memory of 1008 404 chrome.exe 76 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1088 404 chrome.exe 78 PID 404 wrote to memory of 1852 404 chrome.exe 79 PID 404 wrote to memory of 1852 404 chrome.exe 79 PID 404 wrote to memory of 3676 404 chrome.exe 80 PID 404 wrote to memory of 3676 404 chrome.exe 80 PID 404 wrote to memory of 3676 404 chrome.exe 80 PID 404 wrote to memory of 3676 404 chrome.exe 80 PID 404 wrote to memory of 3676 404 chrome.exe 80 PID 404 wrote to memory of 3676 404 chrome.exe 80 PID 404 wrote to memory of 3676 404 chrome.exe 80 PID 404 wrote to memory of 3676 404 chrome.exe 80 PID 404 wrote to memory of 3676 404 chrome.exe 80 PID 404 wrote to memory of 3676 404 chrome.exe 80 PID 404 wrote to memory of 3676 404 chrome.exe 80 PID 404 wrote to memory of 3676 404 chrome.exe 80 PID 404 wrote to memory of 3676 404 chrome.exe 80 PID 404 wrote to memory of 3676 404 chrome.exe 80 PID 404 wrote to memory of 3676 404 chrome.exe 80 PID 404 wrote to memory of 3676 404 chrome.exe 80 PID 404 wrote to memory of 3676 404 chrome.exe 80 PID 404 wrote to memory of 3676 404 chrome.exe 80 PID 404 wrote to memory of 3676 404 chrome.exe 80 PID 404 wrote to memory of 3676 404 chrome.exe 80 PID 404 wrote to memory of 3676 404 chrome.exe 80 PID 404 wrote to memory of 3676 404 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.elite-valves.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0x48,0x10c,0x7ffc72689758,0x7ffc72689768,0x7ffc726897782⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1772,i,7332183767658537912,6209687401990345284,131072 /prefetch:22⤵PID:1088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=1772,i,7332183767658537912,6209687401990345284,131072 /prefetch:82⤵PID:1852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2144 --field-trial-handle=1772,i,7332183767658537912,6209687401990345284,131072 /prefetch:82⤵PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2772 --field-trial-handle=1772,i,7332183767658537912,6209687401990345284,131072 /prefetch:12⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2780 --field-trial-handle=1772,i,7332183767658537912,6209687401990345284,131072 /prefetch:12⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4752 --field-trial-handle=1772,i,7332183767658537912,6209687401990345284,131072 /prefetch:12⤵PID:3024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 --field-trial-handle=1772,i,7332183767658537912,6209687401990345284,131072 /prefetch:82⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4608 --field-trial-handle=1772,i,7332183767658537912,6209687401990345284,131072 /prefetch:82⤵PID:1620
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
768B
MD5691f2960cd8bcf9e59bfc8562813f9fb
SHA1f01b086812b5ef3cf0f64b1787e492386f8a90e3
SHA256fb77f993cbcc81411e99c76d56dedbd07a14e14a8efd1c992570269badddc76b
SHA512649a5c6ae9d676b4f4dc9b8f708b24a688262a750c75f04f42ee65b668e34678a31ba7a381f70ad1f26b7cd69cfca03d7ea0dc659c22fd7f3bc08903e24d81d9
-
Filesize
537B
MD5807ab469202dd149ef60cd8e5ecd1468
SHA1311847f71acaaadd22154367bcf6884866a25aa9
SHA2568d4ddc6ba90a3a48bf8badceb3745b91bf8abd530ca094452fe4d964a2c188ed
SHA512daa7018deefa60bb99007e9192a68afb9af6bcb4f1381c849b65d00947b5db3764e0d7562c5d240bf924cf42273d131ef7fbdc1d6c4df145e24705ae8d197f45
-
Filesize
6KB
MD55310ff171670a6bc24cf1732470db52b
SHA1e2e50d84caefa775692b9574075fd8e922ca5325
SHA2561314c9488beb8b8180acbbd14e39b15acfc9dccd9f7463d762398302a5ac154d
SHA512ae95a4bcc8b760865b4c456f71c6ca154bfed1bbfe23126c3ef44cf2bff6344d86eeb1ab75d833942e615c92c90757db3a31674f21583ff350b3b8ec7f2e4367
-
Filesize
129KB
MD5c89318473d4fec7ae0cc16bc672a903a
SHA144239de71973e1ca207a6d80765194e0cf10e5e6
SHA25668665374ab1178401fde4f6e71f60404343ac3c9c31ded822281fdf89bb80066
SHA512905367a73b00f504fc74d779e3128ea5610cb8e327d661f890382aeaa15a7adbf08912e9970b21d12de446ef69f560159f1dd340f8f0ac13a86e2bf1b9ee7955
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd