Analysis
-
max time kernel
125s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 14:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bunny1.straw.page/
Resource
win10v2004-20240412-en
General
-
Target
https://bunny1.straw.page/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133578393989928895" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4132 chrome.exe 4132 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4360 chrome.exe 4360 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4360 wrote to memory of 4032 4360 chrome.exe 86 PID 4360 wrote to memory of 4032 4360 chrome.exe 86 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 1208 4360 chrome.exe 87 PID 4360 wrote to memory of 2212 4360 chrome.exe 88 PID 4360 wrote to memory of 2212 4360 chrome.exe 88 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89 PID 4360 wrote to memory of 4464 4360 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://bunny1.straw.page/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff82737ab58,0x7ff82737ab68,0x7ff82737ab782⤵PID:4032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1612 --field-trial-handle=1908,i,17726299260824113730,14356994665922752306,131072 /prefetch:22⤵PID:1208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1908,i,17726299260824113730,14356994665922752306,131072 /prefetch:82⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1240 --field-trial-handle=1908,i,17726299260824113730,14356994665922752306,131072 /prefetch:82⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3004 --field-trial-handle=1908,i,17726299260824113730,14356994665922752306,131072 /prefetch:12⤵PID:1300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3012 --field-trial-handle=1908,i,17726299260824113730,14356994665922752306,131072 /prefetch:12⤵PID:2104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4640 --field-trial-handle=1908,i,17726299260824113730,14356994665922752306,131072 /prefetch:82⤵PID:3592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4436 --field-trial-handle=1908,i,17726299260824113730,14356994665922752306,131072 /prefetch:82⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1568 --field-trial-handle=1908,i,17726299260824113730,14356994665922752306,131072 /prefetch:82⤵PID:3672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2816 --field-trial-handle=1908,i,17726299260824113730,14356994665922752306,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4132
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5bf1ac16f5032bebf300f856ba3dffb8f
SHA16d51af93689a18c58afe19b730f3699713fd6a20
SHA2560f487da9934e40696929e691b5230971277d62c76c8447929dda10bddc0dfd43
SHA512afdb5030e313fabe7f82b0dc4740fa317201dd007a4953ea73156f19ff0347bda8d030c4d52ca50ddf3af23dd5c59d9f107498af3751509e89a3dac8a13e9a54
-
Filesize
3KB
MD5262399c17ffc98d5f909866bb98e13ce
SHA13c56eaa97237a98deb9a2ebc851a5d854701b959
SHA2562ef7dba0bc9d3c2797a59d2b58e47fffe8cd02c9dd4d756fffee1a5948b7bf08
SHA512e035754cd09d993c99a0390f47fed4b3c9ad9f119a22b272165dc8b18b418cc69800c3b829e7e45ddd8157c0a6fae54e223f2537c6f1c7363ed980e403297116
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5d3b553d36084bb1e2b7a79862b6788d1
SHA16644477ecab873026d53abf1aeba5cf58a058ef0
SHA256d2ac3b1d920fadec4fd7952108d337e46561c4cc138c6e4c46ebfbf1e25c1738
SHA512421c69203ed1f599d4ec6421af83e06481af7467254707c544b54371b8a6aa4662d717e10882cfdc78ed384438d4a88baec13c32196201f5493b6963ebf0e914
-
Filesize
7KB
MD52bb4e2cb4ba059c8ce9a114763c01b05
SHA12ba7ef62bc7f7153d2e83ee9db66cf5f63be1603
SHA2567f86416ee627604397bd6457047e397d27376808a5a789c37b205dbd0283c7f5
SHA512807b87d8600b4043d59546921decb6a7937c5a8b0aea060f06ac67d2c09a39d4af2e4f5a5b3d63770737b153ce94e77fc03bf4d1de1c0b22a61928e4e4d20be0
-
Filesize
7KB
MD51079dbc8ce90a4ead816c819ebeb04a9
SHA11d5c858f9683141bf1f3a20b20b5e1a423fcf54c
SHA25625497eac8e5694193e66eb426125a62a193091c1bd5a4e8548c71354cf91139c
SHA5125648eb08b308af27249224fbd6b4ab840b5e9e25ba4bf135dbd600b332a1de2697ae4ddd8c62ef596eaca7a5c9a9d2b83b0e1d5af460753a8acfa44b355ea43f
-
Filesize
6KB
MD5c4fe124b740ae82a11e0712160909103
SHA152783a3f8dd25c13c4bbd0a5a090b30953ffe8ac
SHA256f7491f151d4cbcc7f10a48936cc4a2c3015ff31c27ea2d976f19ad17ebe06181
SHA51252b8e994144c3a6562713233f5888050fafe3d6cd40d7f3db609f62fb5518dba31c55cfce3382f4b3712288ac4a0ad6ac11e28f851ea3e2cad2eb1e6eed040d0
-
Filesize
7KB
MD5cc96c69e22e62034c74601ce41cc9edb
SHA1ed4f765241732ac6094eca80597a90ac643a9abe
SHA2560bbb829011e32f6393786e6d3f9bb356b9796072396a32a8b1751af97a538ee0
SHA51265c3c9b11d6fa621621dfb73be5434e90fd5960b9d63437eb041d440225a8b50580c4435ec1c772398fa1786bb528ed48abba37df0540c5a492b78088ad4e65d
-
Filesize
7KB
MD5ab370d61c2c2e49173dc9146b9eb360e
SHA15de5bb0c045b1bb5639bf3f00251ece11a91c58d
SHA2561efbb46671202b33d80f9aef9bfcf45e67064e0345e8478ef5ee612d7c73b1c1
SHA512e3bc8b116f7933b14c5f51709f04b5679f3e19be41774bfc729f63623a6319d735d87e87986acbbb3c4ad31e5548580eb77a02026f0691af3c04e7b83d9eac82
-
Filesize
127KB
MD548fba0fe298dce2d52485dc894a1af6e
SHA1782c1952d5ce718c8fd0115daa941d2476e3d5d6
SHA2568df4e5c8db41c97d8e271150710f6fa2a1c7050d254de8c543cef6e1b4114064
SHA5125001d2feeec18e8f9a47d88f7bf68b4a2463664e54975ca0b9b57d08490f94ce57d539764c8f02bfc9c02e87ced3951887cd2913b50892543eef36b05c6a71c6
-
Filesize
89KB
MD50164b6025492053fb8809bf6d6abd481
SHA1e80583ad5d6e3d09d96c11e04c04f02b7f79f4e3
SHA256a6b4ed9d9008c35b2a4674128df356153df3950c14ef9557b62a34650df9168b
SHA512fb0246f2bbf87e9583e6dd3fa9b9613b33b46380318e645d41c6846dc35de19a8edeebb61cb5733fa70a0d61603b50d447d027f21cc77b91cb1507b51e300e08
-
Filesize
88KB
MD5c037dfeb592404572bcddb7731c4c79f
SHA11e19851ed685ed981b90ea1a66c5313162f9a92c
SHA256b82b041827c14b02674d2158189c21e1d3a32e31f8fb953420cfd4aabe7103b3
SHA512b90847e5f9c8202655dfb6de35c72de583c189ef43489893e6427f6bde9beed773bb6180484e529965512ed1911288bced756bec09cb277b129045047d80fea8
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84