Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 21:28
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://WWsVY.rinhap.com/QIWOFQdp/#[email protected]
Resource
win10v2004-20240426-en
General
-
Target
https://WWsVY.rinhap.com/QIWOFQdp/#[email protected]
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 57 ipapi.co 58 ipapi.co -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133592456806259263" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1020 chrome.exe 1020 chrome.exe 1712 chrome.exe 1712 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe Token: SeShutdownPrivilege 1020 chrome.exe Token: SeCreatePagefilePrivilege 1020 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe 1020 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1020 wrote to memory of 996 1020 chrome.exe 83 PID 1020 wrote to memory of 996 1020 chrome.exe 83 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 396 1020 chrome.exe 84 PID 1020 wrote to memory of 3664 1020 chrome.exe 85 PID 1020 wrote to memory of 3664 1020 chrome.exe 85 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86 PID 1020 wrote to memory of 2616 1020 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://WWsVY.rinhap.com/QIWOFQdp/#[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaebb4ab58,0x7ffaebb4ab68,0x7ffaebb4ab782⤵PID:996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1892,i,7097329126788037000,4143848625677916970,131072 /prefetch:22⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1892,i,7097329126788037000,4143848625677916970,131072 /prefetch:82⤵PID:3664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2228 --field-trial-handle=1892,i,7097329126788037000,4143848625677916970,131072 /prefetch:82⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2956 --field-trial-handle=1892,i,7097329126788037000,4143848625677916970,131072 /prefetch:12⤵PID:544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2964 --field-trial-handle=1892,i,7097329126788037000,4143848625677916970,131072 /prefetch:12⤵PID:3704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4304 --field-trial-handle=1892,i,7097329126788037000,4143848625677916970,131072 /prefetch:12⤵PID:4152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4216 --field-trial-handle=1892,i,7097329126788037000,4143848625677916970,131072 /prefetch:12⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4224 --field-trial-handle=1892,i,7097329126788037000,4143848625677916970,131072 /prefetch:82⤵PID:1088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4812 --field-trial-handle=1892,i,7097329126788037000,4143848625677916970,131072 /prefetch:82⤵PID:1348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=908 --field-trial-handle=1892,i,7097329126788037000,4143848625677916970,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1712
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD555fad958220dcbd7bf8475b3c844d76a
SHA16d4e1c210a459717f1b96ecf54ca5278c89944f5
SHA256206d864cf67300bd3f9dc7eb65c959864c4a0af3473281e965aecdb0530d1f26
SHA512042b641223967c671752c01f174b7bdef77edc26ff9cdc0df61682d07bb3e2ba4cc96ec1b49f706f064f9cb7ccdb9525f0182f314811040c166fdb96eb92b3c0
-
Filesize
2KB
MD56647bb2882f150ebc38bf181e71bdae5
SHA1f926158487eb196166f1811935bb7bf9f84f19e2
SHA25655888079456e5a12fd69f40a5faf63b07b44fc9134aa57c978e709578e284665
SHA51284c25297955256803c57c9995c9d095faaeaff857bdb1be2171384e97e05c1e5430bb97221bb74a6133ccbd8d69409a55ba203478758726ee85bb4a31d058165
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5fc804bad66b40bf53dc25f3a4b9a8e34
SHA1c308d8349bde06ff326c73f3ce6bac2c908336ae
SHA25642265dafe1c4bc601eb2bb2d7e5b972bffa5cda0e16de54220f2778734995b95
SHA51243cf49503cf421706370f92b6cbc170aa74b38baa32ec25103a13209068b5e0709a8bea3e68650f8b791582a6b088f50c91ae6439718c48b6868b7bb569a40c0
-
Filesize
7KB
MD5d70dded25ccaadfbc8f250f83f46f93f
SHA1933bae57b8cd059f4bdd23ca9cbfffd16154b3a8
SHA256be428d8cc37b3c139df3d1d4927f4dff61c3ad7f428c7e725985a26d66718191
SHA512c100c248522c65ed56df7f5e5700441d81e66262d0aa244260b2ae0c809d95981f3140ff49912aea5919785043ef06cb2531d5ed4ab26ee0813678b3f31590e4
-
Filesize
7KB
MD530900a8cc82f5df930f52b90bf95da74
SHA131734bac7572d3889b9e7e81539ec3f68d3ffb20
SHA256614600c0cfa5ad883e6819eeddaa5f03e66b35597f5dffc4b3605e535ed753ee
SHA512e58a476365fcce502218aa5955303ef48cc7bf56274a802ea1b76248fc9c6bae6a8eb64c693e4287f7d32c7e34dfe7e08a06aa1e5c5e1ab2c7609352937d7a9b
-
Filesize
7KB
MD5c470a1e1c7175de77de324ad1edaba19
SHA121686848fe78975234510ff754d2ec19b3aea1c7
SHA2565f3a481fdfb1c0ecd14cedc49c5a9fd5c22961d94718aa1eeca3e4ee1eb45415
SHA51228115a1787abda24aab14de9cd38009d155613a154ef64369a52aad1c629b4382790fe002a96ebb486804fd237c386f34999916e6a13b768c774b178c9462969
-
Filesize
7KB
MD5a5d5d3f2bc6ec4710924721a7a13d4ab
SHA13249ac409825fc2036bbd520edbeff6a29688869
SHA2563755af4b54550336dee8b08a333a5a6be966ad1300286ab0475b3b8188e1977b
SHA51272595c628fa4ffa35492b5e7a9b49587e7915ddf9b91bc2987af717e894e99d4bed21b8ad0b22ee505d8c13c8f8ca140db38b909ca477d82e77c6ee60f5d1a42
-
Filesize
130KB
MD53cc9b6227cd1d6d00abe1b2dd800093e
SHA1dca3fda5191101efc340f21f858c8311488dd3bd
SHA256d035da85d0d98daba2a3c273775b0b2c9461cef5e4c036d6a9906c5f9e0cdf8e
SHA512e008df3d9ca7b8bc8784664fe129b3a6c04c326b589d12b92092a54a4bafed56cfafcf3efa27b9b9a29a4001f9828958a53ff8b347a5089a13285ca18f4a6adb