Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
26/04/2024, 05:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://open.memb.theofficialboard.com/259/42780/c/1240/4hZ0=E2NzUGNhVDMzATNjBDZ4QTZmN2MxEmZyczNjZTZldzN94WZr9Gd_42bpRHcpJ3YzJWdz1CdpRWZvIXZzV3LlRmLkJXYvJGbhl2YpZmZvVGa05yd3d3LvoDc0RHaBwSA8AoeUj4DZaZPgzLN3kUFI5_gepj0LpcdIfcK5cm6q3Vbze6B2ceCLOlGgK5DLGRaSfwe0fJa5wyG-4qOekerTuXqKCWThdKk_X8=
Resource
win10v2004-20240412-en
General
-
Target
https://open.memb.theofficialboard.com/259/42780/c/1240/4hZ0=E2NzUGNhVDMzATNjBDZ4QTZmN2MxEmZyczNjZTZldzN94WZr9Gd_42bpRHcpJ3YzJWdz1CdpRWZvIXZzV3LlRmLkJXYvJGbhl2YpZmZvVGa05yd3d3LvoDc0RHaBwSA8AoeUj4DZaZPgzLN3kUFI5_gepj0LpcdIfcK5cm6q3Vbze6B2ceCLOlGgK5DLGRaSfwe0fJa5wyG-4qOekerTuXqKCWThdKk_X8=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133585823311132780" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2276 chrome.exe 2276 chrome.exe 4596 chrome.exe 4596 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2276 wrote to memory of 4476 2276 chrome.exe 84 PID 2276 wrote to memory of 4476 2276 chrome.exe 84 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 4912 2276 chrome.exe 85 PID 2276 wrote to memory of 3628 2276 chrome.exe 86 PID 2276 wrote to memory of 3628 2276 chrome.exe 86 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87 PID 2276 wrote to memory of 3648 2276 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://open.memb.theofficialboard.com/259/42780/c/1240/4hZ0=E2NzUGNhVDMzATNjBDZ4QTZmN2MxEmZyczNjZTZldzN94WZr9Gd_42bpRHcpJ3YzJWdz1CdpRWZvIXZzV3LlRmLkJXYvJGbhl2YpZmZvVGa05yd3d3LvoDc0RHaBwSA8AoeUj4DZaZPgzLN3kUFI5_gepj0LpcdIfcK5cm6q3Vbze6B2ceCLOlGgK5DLGRaSfwe0fJa5wyG-4qOekerTuXqKCWThdKk_X8=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb0581ab58,0x7ffb0581ab68,0x7ffb0581ab782⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 --field-trial-handle=1848,i,13806486718251356575,13411649597754902491,131072 /prefetch:22⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1848,i,13806486718251356575,13411649597754902491,131072 /prefetch:82⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2212 --field-trial-handle=1848,i,13806486718251356575,13411649597754902491,131072 /prefetch:82⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3016 --field-trial-handle=1848,i,13806486718251356575,13411649597754902491,131072 /prefetch:12⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3024 --field-trial-handle=1848,i,13806486718251356575,13411649597754902491,131072 /prefetch:12⤵PID:528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3844 --field-trial-handle=1848,i,13806486718251356575,13411649597754902491,131072 /prefetch:12⤵PID:3744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4572 --field-trial-handle=1848,i,13806486718251356575,13411649597754902491,131072 /prefetch:82⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4368 --field-trial-handle=1848,i,13806486718251356575,13411649597754902491,131072 /prefetch:82⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1848,i,13806486718251356575,13411649597754902491,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4596
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384B
MD5ed2aabd7a8fde37db8e85a7fdbc44941
SHA1ee90dfa522c1674710f96fa75326402af422689a
SHA256b9606f8860de0e3940ae2def88c737efe029606e135bacce48101fae373ea9ac
SHA512c3e59430b50ec66b74db90771fc27a51f008f824e045f016af41ae5616f7e9039cfe412ceb90efff1741756c07380dc013f1f8c217b255cf92a48de5aa6e334e
-
Filesize
3KB
MD5da0c78d5c67bdced6c9c4957637147cb
SHA14222ec38c14e77b54075d58b9157e24c3998b7ee
SHA25633febbbfbb8a923f8ae9d35056f81e313941c0a4f2f535c30e4456c1de1dd0ec
SHA51264d70bb2d0a1eb81ce077ebbedfaa87c02e446cbaec74934aa4586936980e85d9e0713e64e1237e1bfdf922a97b2cde3919c14b21ddf7095032677b9beca86d8
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5d0ea0d038bc0f1917c470e6cd7688170
SHA1e6a73e329efe04e95f654a1d8fe694024e17cea9
SHA2569af70fa19e77583101c7112536e63145544f4a2d60f42de652fc55966f87060e
SHA512389f78a09c70baf45041717e52daf66bdc59d267a6fa52170ec9b64ad1ae2dc9b7d91f6b548494e172d9726c3e31a83ec4eab6a4c070fa6fc8c24697bf859e97
-
Filesize
7KB
MD5e4a3f4c39ff295056c4b933fc3eaa241
SHA16e33a9fe2bf3ce75d9cece775c927cc32faea9e3
SHA256dd77b546a6c956cd3072e95298516f6cb0149aa22de59722b457533dadb020c0
SHA5128da0576d92ab13392aa48295e59a5bd5b37523d128af62a6fa66c338a92715d41e9d10ce363c79a25043dac8c1379f44e62de3568a2fa84ce8e12aca2df3a586
-
Filesize
250KB
MD500d0dd66b354dc8dc79e339c65b38427
SHA1dbdf6deb616d3e4226f82a0fa272acb7886a2a6e
SHA2562cfff052004610d62f46f9af509f6343ce7e9edfa345cccbbe775a7f3c2a18e7
SHA512079dc95baf007c355efb2ead34023153007f00fbd16597312d6df59822a773404691b1ab61c69f67033e463d1d6a63b9a112a2f0cb833808ef8189185b6caf8b