Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
10-04-2024 10:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://104.23.139.12
Resource
win10-20240404-en
General
-
Target
http://104.23.139.12
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133572196875716676" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2644 chrome.exe 2644 chrome.exe 4788 chrome.exe 4788 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2644 chrome.exe 2644 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2644 wrote to memory of 3644 2644 chrome.exe 73 PID 2644 wrote to memory of 3644 2644 chrome.exe 73 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 4152 2644 chrome.exe 75 PID 2644 wrote to memory of 528 2644 chrome.exe 76 PID 2644 wrote to memory of 528 2644 chrome.exe 76 PID 2644 wrote to memory of 3728 2644 chrome.exe 77 PID 2644 wrote to memory of 3728 2644 chrome.exe 77 PID 2644 wrote to memory of 3728 2644 chrome.exe 77 PID 2644 wrote to memory of 3728 2644 chrome.exe 77 PID 2644 wrote to memory of 3728 2644 chrome.exe 77 PID 2644 wrote to memory of 3728 2644 chrome.exe 77 PID 2644 wrote to memory of 3728 2644 chrome.exe 77 PID 2644 wrote to memory of 3728 2644 chrome.exe 77 PID 2644 wrote to memory of 3728 2644 chrome.exe 77 PID 2644 wrote to memory of 3728 2644 chrome.exe 77 PID 2644 wrote to memory of 3728 2644 chrome.exe 77 PID 2644 wrote to memory of 3728 2644 chrome.exe 77 PID 2644 wrote to memory of 3728 2644 chrome.exe 77 PID 2644 wrote to memory of 3728 2644 chrome.exe 77 PID 2644 wrote to memory of 3728 2644 chrome.exe 77 PID 2644 wrote to memory of 3728 2644 chrome.exe 77 PID 2644 wrote to memory of 3728 2644 chrome.exe 77 PID 2644 wrote to memory of 3728 2644 chrome.exe 77 PID 2644 wrote to memory of 3728 2644 chrome.exe 77 PID 2644 wrote to memory of 3728 2644 chrome.exe 77 PID 2644 wrote to memory of 3728 2644 chrome.exe 77 PID 2644 wrote to memory of 3728 2644 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://104.23.139.121⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb67c69758,0x7ffb67c69768,0x7ffb67c697782⤵PID:3644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1796,i,3041346575690800055,14579424871089124667,131072 /prefetch:22⤵PID:4152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1836 --field-trial-handle=1796,i,3041346575690800055,14579424871089124667,131072 /prefetch:82⤵PID:528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2084 --field-trial-handle=1796,i,3041346575690800055,14579424871089124667,131072 /prefetch:82⤵PID:3728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2612 --field-trial-handle=1796,i,3041346575690800055,14579424871089124667,131072 /prefetch:12⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2740 --field-trial-handle=1796,i,3041346575690800055,14579424871089124667,131072 /prefetch:12⤵PID:32
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4692 --field-trial-handle=1796,i,3041346575690800055,14579424871089124667,131072 /prefetch:82⤵PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4776 --field-trial-handle=1796,i,3041346575690800055,14579424871089124667,131072 /prefetch:82⤵PID:3172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3172 --field-trial-handle=1796,i,3041346575690800055,14579424871089124667,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD59107a683646c610c235ba78681fb8632
SHA197423f6abd87aed8502881bff5d85e29c1ee5987
SHA25624a1d88386264b5ae6aadb0cceb566684b4934d468990cdb76305a7ff3a9af67
SHA5124059623a2086fded7c14dcc3ec05dbbf3e852ba7feb699c1b49387ebae71760c9343e952c84a2fa38f4d2b44ad08f9433505c94906bec580a7255e310c5e31af
-
Filesize
1KB
MD5ba40b9d3a8fe356b0ead4207b46f03b2
SHA125cb1bcc25d74b2fb085615972b2603f77f24f08
SHA2567c383a305311865ccba9d23b47caae7b26b52aece04a2149f06319eb5746a582
SHA5127663d8601fd59e54fd46b7eb437774ff2b87388297502e14d6d7196aa2f21f7bd8ace76275abb0fc5a983d396dff7436ff89372bf760841997b8f96550abdc4c
-
Filesize
538B
MD5c0e7717d65cf26c9bdad697235782817
SHA195951188526302d7d669ccff77a9c3fc86f53d49
SHA2562bd48e2c6a538f8421a93865a5453b878451273b3ed68ea0653b9313f5b06f33
SHA5124ca1c79bc60fe40a07ab0a674db4cbe1ae69d83afaae7afb36c7837558a29b51c209849871f17acd3dba2d17176376cb3fe59ea801e6e9709a1be284b365765b
-
Filesize
5KB
MD57c41c2cd433c2dcd563c53585ea52ea5
SHA1c189c130a93b80e2961ad100d5df423e9292ad45
SHA256919c3d5a8c73731a0e2af218257b5cce0cdcdb9d877aa5fdb1c41d0604bd5c31
SHA512c70c2b0dad60ba0443dfebec753919de5a5326102578cf644392d38c305e2fda974e6330fa8aaea23b6004cdb3d2b3df839073d3c176732c8698807cb4f71b28
-
Filesize
6KB
MD54fba0dd68cf5d6e95f720a1f345062d3
SHA17e92d22cef1008860f8727e2d8dcf9f3b87058c8
SHA256ab24ed0c9f449e82cfe1af913ac8da161b5d3eceffc0a5cb6dd09a6f71789e6b
SHA5128cad8eefd79043ecfd964c0add462b2716218a4ea0a4af2aa1cecda341ddd3357b0b57f5b14c220187be6f14d140d6f73a0038f6ea4e779d6de004f1e8a34b34
-
Filesize
5KB
MD5c5d5a98823c8c7c570da54d645618089
SHA16de191ec2a35f83c57c240ca83bebeea7ceab2fd
SHA25606be310dd1b61a90ddcd7b6817095dce54a8c5651fedd26070d4309297a11d29
SHA512649486a9469c2c45c4bbbd55e1b193e67b5f9990aa68bc81357e4c172f66c2d7a247c425bf930ea6b0c9ba45e15106548efb18da3dcf35f37dfe282af559bf5f
-
Filesize
5KB
MD573ac9bc56e8a50af21da3f75bbd236a3
SHA13e82bf0975fdb676971d4e41a7a34d5770ab6b89
SHA2568355c04e9d211890db7e38d26d177e80b08242f3afd8c391e3841987002da09c
SHA512b12c84289281a7d7e023b70ed928c9b2a2d0e45f61bd62ea17df137863b24c4db2416b746a14e57aa6a5c3ba8480437d53c594d83c3c78bbcfcf2714bfdc5e2a
-
Filesize
136KB
MD59fdfa812d578bce72240c63729e50189
SHA107252b75ea2fd20d5e6e3d089fbd17e59fc9d9d5
SHA256ade7f7e6e1ed47e1aa30921f9a66551ebc6108636a02fbc20c86210b16bfbb5c
SHA51280f2ff67bcd396a9f2b0cc76c4a02c336958631f5c43889f0c24dfbdc5059cfa91bcc4a321c201bbff570a8e8857bd7bf9fce49cbc85640b1c4fdf00128addfe
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd