Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-04-2024 01:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://chriseric1.github.io/login
Resource
win11-20240412-en
General
-
Target
https://chriseric1.github.io/login
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133577913548585066" chrome.exe -
Modifies registry class 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-801878912-692986033-442676226-1000\{ED835CA2-8968-44B1-AD1C-83F2B48D6E35} chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 2412 chrome.exe 2412 chrome.exe 2660 chrome.exe 2660 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 2412 chrome.exe 2412 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
chrome.exepid process 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2412 wrote to memory of 2732 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2732 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2720 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 3008 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 3008 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe PID 2412 wrote to memory of 2800 2412 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://chriseric1.github.io/login1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcbcafab58,0x7ffcbcafab68,0x7ffcbcafab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1516 --field-trial-handle=1724,i,10638984464896525779,7780800345632434437,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=1724,i,10638984464896525779,7780800345632434437,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2172 --field-trial-handle=1724,i,10638984464896525779,7780800345632434437,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1724,i,10638984464896525779,7780800345632434437,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3028 --field-trial-handle=1724,i,10638984464896525779,7780800345632434437,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4208 --field-trial-handle=1724,i,10638984464896525779,7780800345632434437,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4212 --field-trial-handle=1724,i,10638984464896525779,7780800345632434437,131072 /prefetch:82⤵
- Modifies registry class
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4848 --field-trial-handle=1724,i,10638984464896525779,7780800345632434437,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4576 --field-trial-handle=1724,i,10638984464896525779,7780800345632434437,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1724,i,10638984464896525779,7780800345632434437,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
72B
MD57a0550103a1e9831f868b19719d6a360
SHA13283c84e6f55af40718c38b9ff932387de8fbc31
SHA25664b2355890e34782c0bf84cf81c475e843ec37d2ce1ae142b686031e2029e8ad
SHA512118c06b28f334522cfd2bc523d892b94040bf8e2addfc0d5d88c671731b370a35a4d1aef1d9ea64d57e2a40b054e0b8f0d346b4b234fdb190079c095889731d7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD58e4acc4936532721a4a08dd369e7e47b
SHA1fd4a0ef517e00ea8ab1c5c3dbe3c185ac92c6153
SHA2569517a14058890f6dd5d2a2a36c8decb5d3522bd49181999e8902252f4d916478
SHA5129fe96a0663e4977ee9759c3dce54930f671fa2c0292edd3ffa484c76dc0ebb3297221151580cdd76efbb24f2c53bfec48678c805c2366016a90024c92ab34e86
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
689B
MD5121b98ddb8fa59b2a58a2e21973e58a9
SHA167ad62561cc4830324c8eb80d0be97371e747bed
SHA2562829ad2a410c36a8bdec8ed38af2bbbd609c9e7ea07656d2afa4af924b0d8a62
SHA512d76728d7ffa1dd9cc1992324f8d7e279f5bc21cc7332f4f50e090b2350ea5e742db00afe1cc64e0839d3cec90259befac9ff7a599eedc3bdee62dd3f124c5b4f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5e3e011bcc261d42b00dd471fb70ef818
SHA1993ea203be460c87b4cf3ae54c59f95d17c66e3b
SHA25649f3890efc6e76eb36f391fc876ce17b855cd589d461a66c8121bab634a03430
SHA512be0696d633e51574c301f8cd98d727808b0c903acbbc62b8fad7ec2d91d50b5cd1af0e63403b0a51cb8240ac9bba75f0e9ce243dedf9a689e24f981552267478
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD565e4180c3d07f1156472ed849b8d9799
SHA1a2597804864bae9d6f01fe896ca79158bd22baf8
SHA2565673481c4a5244d567451dc9915993378fcaf2b820b334b6827f51d7d4cfbd9d
SHA5126cb1386a014a165b631c857c495e14ea89f587b905f3447c99a6e1d41245d54023710b74242a47618d8846f16ba6f0131c09a5623882da3004c5358bf6faf942
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
127KB
MD5d52d2f0378e661ac582a1c8d74aad11e
SHA15c672dbbc8e94241895611735f04ea50dc08f2c6
SHA256debe2c3a6c7d2f53a2ba13efc2e2275a6fe1b194129cdfeaafe1468b3e65bdd4
SHA512a390836abec5c33f6cd4b02c177512824a1c504495edc7eebd89c4f2a70d066eb3f9ea1c649793518392d802bd02670835b7014f03bf78704c01db83c58b2044
-
\??\pipe\crashpad_2412_RAHGTZGPXKQVDMXPMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e