Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 15:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.innosetup.com/
Resource
win10v2004-20240226-en
General
-
Target
http://www.innosetup.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133573217680495291" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 840 chrome.exe 840 chrome.exe 316 chrome.exe 316 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 840 chrome.exe 840 chrome.exe 840 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 840 wrote to memory of 2080 840 chrome.exe 85 PID 840 wrote to memory of 2080 840 chrome.exe 85 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 3056 840 chrome.exe 87 PID 840 wrote to memory of 2368 840 chrome.exe 88 PID 840 wrote to memory of 2368 840 chrome.exe 88 PID 840 wrote to memory of 4068 840 chrome.exe 89 PID 840 wrote to memory of 4068 840 chrome.exe 89 PID 840 wrote to memory of 4068 840 chrome.exe 89 PID 840 wrote to memory of 4068 840 chrome.exe 89 PID 840 wrote to memory of 4068 840 chrome.exe 89 PID 840 wrote to memory of 4068 840 chrome.exe 89 PID 840 wrote to memory of 4068 840 chrome.exe 89 PID 840 wrote to memory of 4068 840 chrome.exe 89 PID 840 wrote to memory of 4068 840 chrome.exe 89 PID 840 wrote to memory of 4068 840 chrome.exe 89 PID 840 wrote to memory of 4068 840 chrome.exe 89 PID 840 wrote to memory of 4068 840 chrome.exe 89 PID 840 wrote to memory of 4068 840 chrome.exe 89 PID 840 wrote to memory of 4068 840 chrome.exe 89 PID 840 wrote to memory of 4068 840 chrome.exe 89 PID 840 wrote to memory of 4068 840 chrome.exe 89 PID 840 wrote to memory of 4068 840 chrome.exe 89 PID 840 wrote to memory of 4068 840 chrome.exe 89 PID 840 wrote to memory of 4068 840 chrome.exe 89 PID 840 wrote to memory of 4068 840 chrome.exe 89 PID 840 wrote to memory of 4068 840 chrome.exe 89 PID 840 wrote to memory of 4068 840 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.innosetup.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff865049758,0x7ff865049768,0x7ff8650497782⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1908,i,14510509277511739532,9984958319393566011,131072 /prefetch:22⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1928 --field-trial-handle=1908,i,14510509277511739532,9984958319393566011,131072 /prefetch:82⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1908,i,14510509277511739532,9984958319393566011,131072 /prefetch:82⤵PID:4068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2784 --field-trial-handle=1908,i,14510509277511739532,9984958319393566011,131072 /prefetch:12⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2792 --field-trial-handle=1908,i,14510509277511739532,9984958319393566011,131072 /prefetch:12⤵PID:3792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3900 --field-trial-handle=1908,i,14510509277511739532,9984958319393566011,131072 /prefetch:12⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 --field-trial-handle=1908,i,14510509277511739532,9984958319393566011,131072 /prefetch:82⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 --field-trial-handle=1908,i,14510509277511739532,9984958319393566011,131072 /prefetch:82⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3912 --field-trial-handle=1908,i,14510509277511739532,9984958319393566011,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:316
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
748B
MD5c1b254b332f48b2dc37b701e6707f14d
SHA1169f1db2e3dc1142255466d07dc64676fc23f5e0
SHA2562bc02570279b220a941068fb1310a51595beac8630acfc3464bb93f3f810a8f6
SHA512762a4dc8258301de2667f967e6b3e902bff5db8f0816f50173f10fab8a624d097675f960aa22177eecfae90688993cfb3d394c45ea2501cb7fd392a2d8d541af
-
Filesize
6KB
MD50cacae373cc195a4681a8b9ac73767af
SHA143e978796a6763d45494732a3b547154dc14ddb6
SHA2566f7ec37c7d4d6d20c44201fbbe7d424a5f12d5ed60da55bada974d93a7104f43
SHA512574ae263047124ad35482ccd7fa77b632464990da6220236fb3029b2176b9d08adfa411e5cf1b1ca94d1df61502ffa472516e51e0a2a3f94ff062fd484d80d7d
-
Filesize
6KB
MD59170c51c1905d2376e229ba22e01dfc9
SHA16adc1f9fe2f13ff71ba71ecfcd840bf9886db003
SHA2567e6f99f0d4b0c43a8019ffeefa932686148858c983e3786a315c68adee7bebf9
SHA512b5054cadc4d46cbcce63ac2f5e8596beed40224a1e8659f90661a3e500ef4439218e69ea4e6125c28cddf1fe0d902df1dbb9cc6825b1e89ca4e2245f87c16437
-
Filesize
128KB
MD54167faee5c9f13179adb9a4bc452c647
SHA146ab4eecae1b1cacc8097ec08ba6cc68e417d4cb
SHA256bae0aad94b7fa5391d3a7c74632f76fd9474e1fa5091b6d108390ce137b73495
SHA5120063234a501d77140b59b15bc671dff7e1ea5408377cad1542c9eabfc92a494c2a6a593ebd1ee60f6ed4f33cee7d61237774f5eecc2e96c59a04e3cd120c0707
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd