Analysis
-
max time kernel
105s -
max time network
107s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/04/2024, 20:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://toptieroemmfg.com
Resource
win11-20240412-en
General
-
Target
http://toptieroemmfg.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133578612219073751" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1080 chrome.exe 1080 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1080 chrome.exe 1080 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1080 wrote to memory of 4616 1080 chrome.exe 79 PID 1080 wrote to memory of 4616 1080 chrome.exe 79 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 476 1080 chrome.exe 81 PID 1080 wrote to memory of 2028 1080 chrome.exe 82 PID 1080 wrote to memory of 2028 1080 chrome.exe 82 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83 PID 1080 wrote to memory of 1364 1080 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://toptieroemmfg.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcf639ab58,0x7ffcf639ab68,0x7ffcf639ab782⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1504 --field-trial-handle=1764,i,8027885395958332279,9767566236425915288,131072 /prefetch:22⤵PID:476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=1764,i,8027885395958332279,9767566236425915288,131072 /prefetch:82⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2112 --field-trial-handle=1764,i,8027885395958332279,9767566236425915288,131072 /prefetch:82⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2920 --field-trial-handle=1764,i,8027885395958332279,9767566236425915288,131072 /prefetch:12⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2964 --field-trial-handle=1764,i,8027885395958332279,9767566236425915288,131072 /prefetch:12⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 --field-trial-handle=1764,i,8027885395958332279,9767566236425915288,131072 /prefetch:82⤵PID:408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4604 --field-trial-handle=1764,i,8027885395958332279,9767566236425915288,131072 /prefetch:82⤵PID:3992
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD57d11c056ac33363a078d96f422ba8127
SHA1d36bb1b4ce58a533c903f9ec2f0d71fc051803c2
SHA2567b5cfd093d7169b56684f937b23c079d8679a8afe185ac55baa13667040a4d15
SHA5127104eedd78dd4b89e8e5dc085f1e653608f1e61f033d97107690b20938c0afd19043c0e3e371f0eda87f88ca143940453615e1d9b0a5ce59d4c40f9763442f35
-
Filesize
2KB
MD5679f1ba7e4171597800ea5d44a96d72c
SHA1ea84315a13d6cdbba97a1b6d3216e836060b9a10
SHA256950a600145f01f7a15716f1183e47023bb2f5a31037f70d10790fa31be7bfc91
SHA5125591253086cb6bf4bbf128fa14bdcb254677efb8dacdaf5b102a240117c4e0840f2e606c6a25470941cf8facaeba7e1710bb588920079e2704c249b9b92726a9
-
Filesize
1KB
MD5f6cfcfe618661d600fb2852046350852
SHA16e47527ba760d92729c3f6ef5ee0fda97a5e28c9
SHA256acdc1d4abcbbb26348586684eb18d9f3d56f293728f5ed85886aa21364382f43
SHA512c088cb490b1fe387e5a6ebe8fe95b99d2ba29dc9d86ce33f99801cbba4d9e44ba9a75a17f7084e45c6eb5bd7e3332c73b5e9ecf0efc6c354020015228cd8a67e
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
688B
MD5f09980f0b8213741999661b7f060f1e5
SHA1aab01d9924a619a011fa2ca62c300b9431a8970c
SHA2566212a366fb58cea564cbfe126ddb5c018fb0b87bf028f7703318ede8a8e88925
SHA5124a6e041a964835d254e5a4408980cb33f0ed38caee7eeb877318182cc8b8487d5c2ded9306bbd84c68a47498c82b235866f242e54a19d1ca71ffcc19d55e31d7
-
Filesize
6KB
MD51ac665f294658a2be015773a1616f07c
SHA18c27fc6027557ccc81ae3c19b2d7dc060f08bda1
SHA256757ddc11c39a96c7ae52b53cd368ff145a7666ae278bc57e29808606a4c28af3
SHA512f676efeb91aa6592a020e96709dc4dd522fdc7311f732832301d953881761b4bc1c27f098a8fa89617d864f7da104635ee2248d8df93aa2c5a270b359148f7e5
-
Filesize
7KB
MD55bcffc0237e4480d7335dac779f78edc
SHA1221538b2cf693c4591fcc1ec8d0a424534ae5241
SHA25692e3180a84259941442d18f1b19a37254d35d2dc98686596b0c71e123ad574b2
SHA512fafa0efe233a49b23f75b460de3b0dc255d300f0c2389689fe4bbb262c8b00b1254167cb9d23e345a9b33a0690e381a12cf9bbf12ac56f5ed5bf2b35b1e890ce
-
Filesize
7KB
MD5ad9d0794ca7412b43972848e5e39e24f
SHA1e7d8251419d6d4ae7fe705ba4b0fcf651097286e
SHA2560e70e32f6680c96fff0cf281b5023fa25474609f3379f6459e704c2067a8329f
SHA512fdc66d222310e8d9b970a1a73ef9b01e381ea949db78e0315459e27c00aa0602391954530dafad02875a2fba04d98648245073ac0d5d4a136cbd8865a197302e
-
Filesize
7KB
MD5ed96d9291faf88d5450cbc3e146e051b
SHA19eb97e4dc0346ebb56bcb343dad0f2e449b2680b
SHA256045d4925dedc4fec3365c7076857c7e194eed1a90c1f135afb8f117374ea4cc1
SHA512451bb9128e4ae64a25df6989f586e630a34a9ad84894f3ebd6d952c267bf2575fe6cae7f3eb3205a8185a6a8e6c5376834d2164d3aebca607d3d97280ab564a6
-
Filesize
7KB
MD5aab63d853be84ec5d258765e07de0342
SHA10714f05c8b06861eb05e69927beadc338a9fef52
SHA256a142927b18d3ff9a81eec1943ee800be6fa146cfcb08d8e99c4c49a2f58a830f
SHA5127a099c0bd8cbb475c413d30fbd8a22ad1d80a0c66b290b8663ecd6757d4211fc53652458944fd5f5167e3ab5295a2713611175a27fb88ca2b74dda14e514edf7
-
Filesize
127KB
MD5eb4425256fbb7be9256173e04e0a7d1b
SHA150b4897e0fc64d4d6f2a844cebf55ca486a519f0
SHA2561249a0633db924c260e353a2692702a8be3cc670924cb0ea5a8f5ad26a614218
SHA512262b7f31f9bd88f15df183c33913d03df85a439b9d7e5876faf9982495300030f5b07afd7594edf7660f084a1baa6da70565ddcb2d7f743b619a37dc2f6d9bd7
-
Filesize
127KB
MD515005889dcbece5f90426c7187e42ffb
SHA100dead71a52076d75df491a23b79b153024ec25b
SHA25640633e2f7aa9a15b6704398fc7e35a911243c7cebf4437864fe52269257a4e03
SHA512793117d2a35028d41e84ba01b87133747d33c4c00310f554fb53daf238eebfb17b47a958cb06aac8d974313e0e340f8c80112c6073017d8ab8affda113fd9dcc
-
Filesize
264KB
MD59b0ede2d9c02e546b99c3ec381f66afb
SHA1e7dc6065d30cf5f5d81dbb2b3a147e3a8491f833
SHA2568c65e3115652280ddd1f59330004a1828edbf3665ac130d3c77b2540110bc72a
SHA5124776a394dd50b392e74b838a50162da35e3371098113232f3197aa9fbd07445d88f3cfac2491c02070f9fce24e6a05dcfade522d0821df74c214b2ac1c6bd4a8