Resubmissions
25-04-2024 04:00
240425-ek4n4afa9t 125-04-2024 03:53
240425-ef52csfa31 125-04-2024 03:53
240425-efv66afa3x 1Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
25-04-2024 03:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.spy-sheriff.com/license.php?s=3300537927&a=0&sa=0&ln=0&vrt=3
Resource
win10v2004-20240412-en
General
-
Target
http://www.spy-sheriff.com/license.php?s=3300537927&a=0&sa=0&ln=0&vrt=3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133584908510261341" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3224 chrome.exe 3224 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3224 chrome.exe 3224 chrome.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3224 wrote to memory of 2928 3224 chrome.exe 87 PID 3224 wrote to memory of 2928 3224 chrome.exe 87 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 2148 3224 chrome.exe 88 PID 3224 wrote to memory of 1500 3224 chrome.exe 89 PID 3224 wrote to memory of 1500 3224 chrome.exe 89 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90 PID 3224 wrote to memory of 4760 3224 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.spy-sheriff.com/license.php?s=3300537927&a=0&sa=0&ln=0&vrt=31⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd0ffeab58,0x7ffd0ffeab68,0x7ffd0ffeab782⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1912,i,4357661969759280193,4490459039164544223,131072 /prefetch:22⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1848 --field-trial-handle=1912,i,4357661969759280193,4490459039164544223,131072 /prefetch:82⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2248 --field-trial-handle=1912,i,4357661969759280193,4490459039164544223,131072 /prefetch:82⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2896 --field-trial-handle=1912,i,4357661969759280193,4490459039164544223,131072 /prefetch:12⤵PID:216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2904 --field-trial-handle=1912,i,4357661969759280193,4490459039164544223,131072 /prefetch:12⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4368 --field-trial-handle=1912,i,4357661969759280193,4490459039164544223,131072 /prefetch:82⤵PID:612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4528 --field-trial-handle=1912,i,4357661969759280193,4490459039164544223,131072 /prefetch:82⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD52d1bc57127dde800352b5018d733e7bc
SHA1a32183854bd33a158ce3d98d573696594eb4a2da
SHA256ed786424e3f5fceb3692650cc304597ab333fdc180b917ac2d0ba4f346d88b25
SHA51240b0e347d82bea78acffb796254ee166f0c376e6b940d2ed07c9d89772a6c5bcc15da1d12b95af2f435b6067007c3eb4f0156ad20dc1f0e17c9ab32cf4003d5a
-
Filesize
7KB
MD5ade1aa42c41a320f90deedad5bbca1a3
SHA1f646b2b64298be58ef23540550de1b852d7f35a5
SHA256ce733b5aaf907481a75501f4b786e51166d2435ce6c08b4788f5cb460ee7a542
SHA5120e352984135cec883d4cb76253998c697520cc3e0a97d1f91feb1aaf7eb139fd24a2ce755ccb3f5f723af3fd678bd8492f0a6dc7d014779ddd9c005e99fd79e1
-
Filesize
126KB
MD5c4c7b1eedb49eed03acd613c25572546
SHA1ac0a062d585c49a46e0529e88a8a710bb1ac82aa
SHA256447137590b7cbd95fd98dd4c7c3dafe259593a755634772dbc5dde8fdfb90d72
SHA51257b191bb0de9c90d2f95aaf41cd25c49f42209b29c20ce34463bcfa9680e612f47b71c7e98fddc7f139eec87bff15f4b664b27bbe5c49a2013658720dc5ec3ac