Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 05:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://18.196.110.226
Resource
win10v2004-20240412-en
General
-
Target
http://18.196.110.226
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133579784941821742" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2532 chrome.exe 2532 chrome.exe 3596 chrome.exe 3596 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeCreatePagefilePrivilege 2532 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2532 wrote to memory of 1168 2532 chrome.exe 83 PID 2532 wrote to memory of 1168 2532 chrome.exe 83 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 5100 2532 chrome.exe 84 PID 2532 wrote to memory of 3496 2532 chrome.exe 85 PID 2532 wrote to memory of 3496 2532 chrome.exe 85 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86 PID 2532 wrote to memory of 2516 2532 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://18.196.110.2261⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff90a3fab58,0x7ff90a3fab68,0x7ff90a3fab782⤵PID:1168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1628,i,11042352180289576318,6283203001963451270,131072 /prefetch:22⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1628,i,11042352180289576318,6283203001963451270,131072 /prefetch:82⤵PID:3496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2184 --field-trial-handle=1628,i,11042352180289576318,6283203001963451270,131072 /prefetch:82⤵PID:2516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1628,i,11042352180289576318,6283203001963451270,131072 /prefetch:12⤵PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2968 --field-trial-handle=1628,i,11042352180289576318,6283203001963451270,131072 /prefetch:12⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4172 --field-trial-handle=1628,i,11042352180289576318,6283203001963451270,131072 /prefetch:12⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3388 --field-trial-handle=1628,i,11042352180289576318,6283203001963451270,131072 /prefetch:82⤵PID:3216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4512 --field-trial-handle=1628,i,11042352180289576318,6283203001963451270,131072 /prefetch:82⤵PID:692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4092 --field-trial-handle=1628,i,11042352180289576318,6283203001963451270,131072 /prefetch:12⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=880 --field-trial-handle=1628,i,11042352180289576318,6283203001963451270,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5433bfcac8fe47dd63a589807a1e41feb
SHA11d5e6a9233fcdad9810a1aa24dc7a093dc1d233f
SHA2569d6ae89870be3d0bfe3bf58a145b8f1eca4d78a5ba3da02fd8fc43a8b0a383fe
SHA51265fb8e8c2a1094c956e50f4a26837d6202824c99d42864ea0b45deb7a559088b445e6634284ce5c9985d12a63556af14f44dd46e444e7784b106c788f646bc43
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD57ee70efb4130613722a99d970edfa025
SHA1533e0b8758ce1a1ad05f0b7e9f2ff6b1633950e3
SHA2568d4fd46037fed8f91e1490cd711c661450b04ba54b7d20a0297b9c16575303d2
SHA5128b8c42802dfdb51a85035bcd1adef54bf938854c1b3edd6ae059a9c7aa3a47741a0c442eee058cb6b18878418ef7006886273e609fb4ef8b58d9a3b0a1e8aa37
-
Filesize
250KB
MD5d12e4a1d4d4afa515206a51e7a4d5707
SHA194e68397bbca95a632a2f57ae23b2f057d903288
SHA256b221900de67a6c157c836ce04bf92196f25281ce2dcaeb3ddbe2fb1479b45c2c
SHA5121cdc981a8dd4173f35224b910008a5b5cc9088f7d6871d0c5253b87e96fb8c39082b1a062425a4e9926a278e54d14a3416a13fbfaeb08d6084e5074d379f2a3d