Analysis
-
max time kernel
25s -
max time network
25s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 17:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://solutionslofttech.live
Resource
win10v2004-20240412-en
General
-
Target
http://solutionslofttech.live
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133578476374758869" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4832 chrome.exe 4832 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4832 wrote to memory of 944 4832 chrome.exe 84 PID 4832 wrote to memory of 944 4832 chrome.exe 84 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 4516 4832 chrome.exe 87 PID 4832 wrote to memory of 536 4832 chrome.exe 88 PID 4832 wrote to memory of 536 4832 chrome.exe 88 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89 PID 4832 wrote to memory of 3756 4832 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://solutionslofttech.live1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffde1c9ab58,0x7ffde1c9ab68,0x7ffde1c9ab782⤵PID:944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1904,i,5608126673996405,7312640276620616867,131072 /prefetch:22⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1904,i,5608126673996405,7312640276620616867,131072 /prefetch:82⤵PID:536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2236 --field-trial-handle=1904,i,5608126673996405,7312640276620616867,131072 /prefetch:82⤵PID:3756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2984 --field-trial-handle=1904,i,5608126673996405,7312640276620616867,131072 /prefetch:12⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2988 --field-trial-handle=1904,i,5608126673996405,7312640276620616867,131072 /prefetch:12⤵PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4368 --field-trial-handle=1904,i,5608126673996405,7312640276620616867,131072 /prefetch:12⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4324 --field-trial-handle=1904,i,5608126673996405,7312640276620616867,131072 /prefetch:82⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3228 --field-trial-handle=1904,i,5608126673996405,7312640276620616867,131072 /prefetch:82⤵PID:1368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4136 --field-trial-handle=1904,i,5608126673996405,7312640276620616867,131072 /prefetch:12⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD5319e0c36436ee0bf24476acbcc83565c
SHA1fb2658d5791fe5b37424119557ab8cee30acdc54
SHA256f6562ea52e056b979d6f52932ae57b7afb04486b10b0ebde22c5b51f502c69d1
SHA512ad902b9a010cf99bdedba405cad0387890a9ff90a9c91f6a3220cdceec1b08ecb97a326aef01b28d8d0aacb5f2a16f02f673e196bdb69fc68b3f636139059902
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD54756da7166d22322b9489683cf21e002
SHA11390bd2c1109f1a4705975a50a6ea616c3aec2aa
SHA256b7e41dacd0d584b839914e0d7f8fa9c585294c3fb023a28f6fe7def849e52b11
SHA512f42a834f1d969507cb53347b03ec3edcd83f2408a7f35be163fb02635feb4084a2e4ab89a57a69a48322ccb0b7c6b0bd9459446fbcd676cc56d1b0f6f4d5a817
-
Filesize
7KB
MD53d2c478c51a3d546548776b49dab704d
SHA1b9a5a35b688a6bd8f5a955ae948346cb3c4ab8a6
SHA256b67691f6c5521a8fbb3dd42506e1ea67f06fcb35aca566e21f894b3ee9fd8717
SHA512a6e44b1bbe0f8b0b6d0b4f72c736cf62eeebabf86db2bf3ae07f9e9dfc8dcc4f02640031996c7947445346c4388b246846028a1a4359960e0b04fa80b9bf83e3
-
Filesize
250KB
MD58b170dcedf4042c0180805c6b1ab0a78
SHA162fa6a1283c7f5cd4c019a5a75446ce6aaad3575
SHA256459f869bdf925a33e8d55724d13ca7d4c9b17f2b9e4122047b5fe27badfe0e12
SHA5128e6ba11a30d924fb2109c180f7fa9a0c1f67087cafd01d5701c66fd21bf1a12350e7af1d5155c680431e1f91ccfe16b9267b51aeb3210f77c95925df951d2fc8