Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
29/04/2024, 13:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.bluyogurt.xyz
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
http://www.bluyogurt.xyz
Resource
win10v2004-20240419-en
General
-
Target
http://www.bluyogurt.xyz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133588697184447081" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1616 chrome.exe 1616 chrome.exe 4300 chrome.exe 4300 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1616 wrote to memory of 1988 1616 chrome.exe 73 PID 1616 wrote to memory of 1988 1616 chrome.exe 73 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 3872 1616 chrome.exe 75 PID 1616 wrote to memory of 2968 1616 chrome.exe 76 PID 1616 wrote to memory of 2968 1616 chrome.exe 76 PID 1616 wrote to memory of 2852 1616 chrome.exe 77 PID 1616 wrote to memory of 2852 1616 chrome.exe 77 PID 1616 wrote to memory of 2852 1616 chrome.exe 77 PID 1616 wrote to memory of 2852 1616 chrome.exe 77 PID 1616 wrote to memory of 2852 1616 chrome.exe 77 PID 1616 wrote to memory of 2852 1616 chrome.exe 77 PID 1616 wrote to memory of 2852 1616 chrome.exe 77 PID 1616 wrote to memory of 2852 1616 chrome.exe 77 PID 1616 wrote to memory of 2852 1616 chrome.exe 77 PID 1616 wrote to memory of 2852 1616 chrome.exe 77 PID 1616 wrote to memory of 2852 1616 chrome.exe 77 PID 1616 wrote to memory of 2852 1616 chrome.exe 77 PID 1616 wrote to memory of 2852 1616 chrome.exe 77 PID 1616 wrote to memory of 2852 1616 chrome.exe 77 PID 1616 wrote to memory of 2852 1616 chrome.exe 77 PID 1616 wrote to memory of 2852 1616 chrome.exe 77 PID 1616 wrote to memory of 2852 1616 chrome.exe 77 PID 1616 wrote to memory of 2852 1616 chrome.exe 77 PID 1616 wrote to memory of 2852 1616 chrome.exe 77 PID 1616 wrote to memory of 2852 1616 chrome.exe 77 PID 1616 wrote to memory of 2852 1616 chrome.exe 77 PID 1616 wrote to memory of 2852 1616 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.bluyogurt.xyz1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffc13179758,0x7ffc13179768,0x7ffc131797782⤵PID:1988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1740,i,2274678002960321306,3947102626689679154,131072 /prefetch:22⤵PID:3872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1832 --field-trial-handle=1740,i,2274678002960321306,3947102626689679154,131072 /prefetch:82⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2080 --field-trial-handle=1740,i,2274678002960321306,3947102626689679154,131072 /prefetch:82⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2624 --field-trial-handle=1740,i,2274678002960321306,3947102626689679154,131072 /prefetch:12⤵PID:1184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2632 --field-trial-handle=1740,i,2274678002960321306,3947102626689679154,131072 /prefetch:12⤵PID:4320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4440 --field-trial-handle=1740,i,2274678002960321306,3947102626689679154,131072 /prefetch:12⤵PID:748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4692 --field-trial-handle=1740,i,2274678002960321306,3947102626689679154,131072 /prefetch:82⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1740,i,2274678002960321306,3947102626689679154,131072 /prefetch:82⤵PID:2256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3220 --field-trial-handle=1740,i,2274678002960321306,3947102626689679154,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\356df212-5fca-4292-a659-b71b039cb5d2.tmp
Filesize6KB
MD5eab1b439912c51eb94236fab05784b3c
SHA1440ea22250a3db2751920caa9f268eb91856749e
SHA2565e59f5074294145adf96adc2decc5a8af7cb38ed4a1c8e41e4608d9ea27ca647
SHA5123ebc62d64dcb70200f8adac03185be2cde8635e9d33348f24b9bb19a0fa80c1a56863b25688aa6a1e807df717513922770eeec45451565e5dc9ae4587cb6b055
-
Filesize
480B
MD52e4f119619263b3425bbf1b9290ae335
SHA16d740cbe81c3a33b8dc58b593143d284c2dbb95e
SHA2561511b0d2a5d569005033e1a7f83f8326b867618e90f9caa9450a71eca1ad3d9b
SHA5120362e63e01b17f8b64c7ebac83fcc47cda627ea651ea1fa94a360eb17ed5da36a8ddd817d974092cd4fcca72c1ac2363e6720f03b5bf3a9e91948fdb8c11d1a7
-
Filesize
1018B
MD509c0ec3f66c7f950bac78f72aade2607
SHA160ba8aabd05d4674e32f70c353a06cbfe2ca3401
SHA256e3130ae7cd1c30a88a44c2497a26b622a6e19120aeff980e2c63b5d7b0204752
SHA512d21a1a39a8df6498ced717c0b7d9bba8d685b1d8da102f29e389a75725636d1cbf1001849923c298d8dd3fa88bef215491d52db229b1395492cab37d700f9970
-
Filesize
539B
MD5a8a74d2a977585cf1262b2366600cb31
SHA18aa1f8bbf0dcd64ba88030835652310f07193dc0
SHA256bbd4db1bc5160761ad720e7f6666d0e0c0fa83455c5567525bc4b39dd84b9f12
SHA5129ab0df6e4032301e964441960cb3d714a2f302406cfdf012cc8451bb3e0ebc4a10ef804d0101d64c17168d5f662ca11bba94404f416044f371c7d9273ca88465
-
Filesize
539B
MD598d1a62b7dd254d6ac5d9b91efbaee34
SHA1b6afe1cf58a7995191b3d40f0141d2ddc958d12f
SHA256da046c03b47e8dd206b5bcb8ce9ac615f24e21c2a431c9977f0e18859e6ba570
SHA5125dbdcfac7aeb32d76b01ed2d0816cd08c947b0301e15417a74c78cd1e734bfef6513439c8ebcf32094fc4ec5ad25ebf64480133223f6d1bd51de99c999537580
-
Filesize
539B
MD55c06dfabcd3c8d79afaf0fc6d0450022
SHA1e6d93b2c763b27575939cf89027a3415cf2ca9b1
SHA256c9fe653659db060a47de4ff52e54ed28860bcaa7413fe928fa04d49bac42b54a
SHA51220e6cb514661685d63e70b084a354096e0885483f1fd450f108b0bef9b9d19b551e3a4b1921b432430e21a882821defa61d55812996dff7261c7022107cdb7ff
-
Filesize
539B
MD5a7f34b587de4c91b0d3b4ce450212cd9
SHA1ad8e1488ad6aeb1c316803bee15ffe5ff65c6604
SHA256482c52ba3f9d2e911f5591cc47cc6e09d033214e4b4f5643c514448d6823f056
SHA5128f1006fa070990fdf6e0d4d32e28d0543e893a33171c33394ef8aa8260ce12891610edf3a28a0924fd4245655ff115a2406787829809beab332696b313060518
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\eb973a05-6ef7-4137-ba7c-739ed6eb5e50.tmp
Filesize1KB
MD52f7beb13613d2606c9c1feecf77884ac
SHA1f43566984dfe5ac6f96d5734006ebaaf6f3912c4
SHA256cc4004546d8b9283bd123bab06f9c6ca55ac3646a82c027b741ff1c996b886d9
SHA51297fa27a946adfb818f36d5ded6a30b484027c73bdf8926ce85c200da5d041cf1585e53cd3d052b3914a2de5ab46af60c9b55bbbdd5b64f8b343fee71ef19b70f
-
Filesize
5KB
MD5ec24320117e9b52cc21f3818298773f1
SHA11e64bfb9534ad5492ba50ca0bc60251ac0de3942
SHA256b3ed382d4f60e14b61ebb7829046849d0a71fce0fabc39493aa77348f48e6642
SHA51201c285a0c198a05010b168609797297e5678f4a239d43a8e65c29546242d6ad4c595247e1f987d92397cb5643f2026e356d9a7ecbb2ae3327b427ee5f6857995
-
Filesize
5KB
MD5faf18faa3117f49ec2a827a00556433a
SHA1dcde109c5be248ca747f72062a5d87fdfb456daa
SHA256216aa904c32de10e3eb12e946e04e53795b3c2badc0c1d9cbec5aec68f6163ef
SHA512f6f33ae489d82138d968b399f6964f73c935ea1997990c21ba1ac1e2cd87a3e3b399097e034a08bccbc6f7e60157fe6f62588eee2320dca3085f7425bfe8eabd
-
Filesize
136KB
MD53ad51ab3d5619ddda5c649f464714a5c
SHA111a22803d029d1036966de50950e5bd639fba3ad
SHA256df27dadbe52078cfe53cb356ebc6ac65f75fb6c946f3856b45e542b3b7da2f31
SHA512ff74d022eb40adc4c81229642a9e8d09d7754b1456b6f492ba74adb91688de1f8b2c7e38b1913db9de4e2488b08941bd5c2dfa9dc71b0ac5778c9aa6a26defba
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd