Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
09-04-2024 14:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://cookieaquila.com/lava?aquila=LsC6IzQ0gw6n
Resource
win10-20240404-en
General
-
Target
http://cookieaquila.com/lava?aquila=LsC6IzQ0gw6n
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133571471417244512" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1416 chrome.exe 1416 chrome.exe 4672 chrome.exe 4672 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe Token: SeShutdownPrivilege 1416 chrome.exe Token: SeCreatePagefilePrivilege 1416 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1416 wrote to memory of 512 1416 chrome.exe 72 PID 1416 wrote to memory of 512 1416 chrome.exe 72 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 3052 1416 chrome.exe 74 PID 1416 wrote to memory of 1560 1416 chrome.exe 75 PID 1416 wrote to memory of 1560 1416 chrome.exe 75 PID 1416 wrote to memory of 1572 1416 chrome.exe 76 PID 1416 wrote to memory of 1572 1416 chrome.exe 76 PID 1416 wrote to memory of 1572 1416 chrome.exe 76 PID 1416 wrote to memory of 1572 1416 chrome.exe 76 PID 1416 wrote to memory of 1572 1416 chrome.exe 76 PID 1416 wrote to memory of 1572 1416 chrome.exe 76 PID 1416 wrote to memory of 1572 1416 chrome.exe 76 PID 1416 wrote to memory of 1572 1416 chrome.exe 76 PID 1416 wrote to memory of 1572 1416 chrome.exe 76 PID 1416 wrote to memory of 1572 1416 chrome.exe 76 PID 1416 wrote to memory of 1572 1416 chrome.exe 76 PID 1416 wrote to memory of 1572 1416 chrome.exe 76 PID 1416 wrote to memory of 1572 1416 chrome.exe 76 PID 1416 wrote to memory of 1572 1416 chrome.exe 76 PID 1416 wrote to memory of 1572 1416 chrome.exe 76 PID 1416 wrote to memory of 1572 1416 chrome.exe 76 PID 1416 wrote to memory of 1572 1416 chrome.exe 76 PID 1416 wrote to memory of 1572 1416 chrome.exe 76 PID 1416 wrote to memory of 1572 1416 chrome.exe 76 PID 1416 wrote to memory of 1572 1416 chrome.exe 76 PID 1416 wrote to memory of 1572 1416 chrome.exe 76 PID 1416 wrote to memory of 1572 1416 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://cookieaquila.com/lava?aquila=LsC6IzQ0gw6n1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffc6cae9758,0x7ffc6cae9768,0x7ffc6cae97782⤵PID:512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1752,i,5784994814295755356,10375834181877176250,131072 /prefetch:22⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2008 --field-trial-handle=1752,i,5784994814295755356,10375834181877176250,131072 /prefetch:82⤵PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2060 --field-trial-handle=1752,i,5784994814295755356,10375834181877176250,131072 /prefetch:82⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2660 --field-trial-handle=1752,i,5784994814295755356,10375834181877176250,131072 /prefetch:12⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2676 --field-trial-handle=1752,i,5784994814295755356,10375834181877176250,131072 /prefetch:12⤵PID:3824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4396 --field-trial-handle=1752,i,5784994814295755356,10375834181877176250,131072 /prefetch:12⤵PID:824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3356 --field-trial-handle=1752,i,5784994814295755356,10375834181877176250,131072 /prefetch:82⤵PID:4700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4812 --field-trial-handle=1752,i,5784994814295755356,10375834181877176250,131072 /prefetch:82⤵PID:3096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5012 --field-trial-handle=1752,i,5784994814295755356,10375834181877176250,131072 /prefetch:12⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3136 --field-trial-handle=1752,i,5784994814295755356,10375834181877176250,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384B
MD558a6ad758f44ef68f3d6dc1312680dca
SHA12f986782625986712c600da944c873809efbc6ae
SHA25668ccd6dda2e83b937eab45d0ab1489147b00c2af30e95d86a303d97b2c243354
SHA512f6ea698567b57c59e86d2b4446f24358790a4082bcb5946ec02cfb9acdb7dd7247e00387bace883a38c5ee7d6e3aace62a7d19ad4642f069216722967b98e939
-
Filesize
3KB
MD571561381be81bab03259b97192310ef4
SHA129b736b8644b275a6223d1473ff0a48004ba8789
SHA256f7c773db364121140527e99f3f1b03b77bdcbe923bfc294fd387fb5496230f90
SHA5129b79c529204873ccd407aa2f9dd62a526a0af146ed45063d9aaedfb5d14f1d7e8e26b26e97be199b67d6ea525e5b1e1e214fc1e3a49dc15f6f49ef06ef01a42f
-
Filesize
4KB
MD5cb06cd4b12ec2a76f8551cf510791c8d
SHA1bae6e81821bd6fa60e3d1906de139a80396f3018
SHA256eb81528d0a193763ce76781fb855e38efb1506d3435ce1ad36754d24bc5699f0
SHA5123c9697c76bc003c82a0a1de1fa9a280aecd29d0ffc7bf5a26579ee89c77139ec0f437b88ec024aa7d308868607befe3461e302192938b74672467376cba07734
-
Filesize
705B
MD5e6f5958afe79b6f42bdd72644992bdb1
SHA1937547aa5906a9714a0c295e24d8697b589df370
SHA256c0c76a88485f130d2b691a59502da1587cd986f0b47f467f7eac5bc0c3b0cce5
SHA512225235e7b0be81693685a7dfac4c2233df29dcc5e8ad704daf794d1c01e8036c649d6200c4ce7f466949a9c6980fb4f3a1a6218399c61292d6d6ce462650af32
-
Filesize
6KB
MD573b27b28c8d8e5cee54f99bd2bbefa34
SHA1907c9724772974651a4966241b1fbc3d172af9f9
SHA256b0faad3a14c541bbeb756e59c63703efd0e64071adaeea47f38de2ab84247602
SHA512bf082cc54292d2edda2842a82162a38d4791d0939c0468317b3e5507479bd7fcd464d2ba59aa13899aabb3b56d0acca580562dde083874f0aa821ab868cae477
-
Filesize
6KB
MD53bf50db886939efc5de7934f11207afb
SHA109a808c08115b1a585d77e9da9c41757906750d2
SHA25604124571a8b58b3cad86f685786e8b0501b879ac20f5e47992a3559421d1ef08
SHA512b71187a3506197264bf3262603c082e9bea6ec990c1cc807c1accf981685482c062d7c14b92413301ac71db827d3a15f33d90ae33e391f105377f3ea10de1160
-
Filesize
136KB
MD5461e7f7eda3589441ce54142bee1d1aa
SHA1de4d203b790a6689ef776e966e945fccd403f4e1
SHA256701eaa04262d9a7c9934ca6bf0e68ccc7f31247015dbef6c810381863af52ff1
SHA5123507bf6d812620858f124d2f2d446a4c24d7196b6d24a01f0a608decdece21a458208512014b61f96aaec04d597cdf38645d61120c090b529752b4058c38d01b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd