Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 02:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mail180-ripple.com/4dc69734cc653c841ccfe790892075b5599f8443e932116780d891ef912ff90ato
Resource
win10v2004-20240226-en
General
-
Target
https://mail180-ripple.com/4dc69734cc653c841ccfe790892075b5599f8443e932116780d891ef912ff90ato
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133596086927586855" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4820 chrome.exe 4820 chrome.exe 3080 chrome.exe 3080 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4820 wrote to memory of 4552 4820 chrome.exe 92 PID 4820 wrote to memory of 4552 4820 chrome.exe 92 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3416 4820 chrome.exe 94 PID 4820 wrote to memory of 3400 4820 chrome.exe 95 PID 4820 wrote to memory of 3400 4820 chrome.exe 95 PID 4820 wrote to memory of 3604 4820 chrome.exe 96 PID 4820 wrote to memory of 3604 4820 chrome.exe 96 PID 4820 wrote to memory of 3604 4820 chrome.exe 96 PID 4820 wrote to memory of 3604 4820 chrome.exe 96 PID 4820 wrote to memory of 3604 4820 chrome.exe 96 PID 4820 wrote to memory of 3604 4820 chrome.exe 96 PID 4820 wrote to memory of 3604 4820 chrome.exe 96 PID 4820 wrote to memory of 3604 4820 chrome.exe 96 PID 4820 wrote to memory of 3604 4820 chrome.exe 96 PID 4820 wrote to memory of 3604 4820 chrome.exe 96 PID 4820 wrote to memory of 3604 4820 chrome.exe 96 PID 4820 wrote to memory of 3604 4820 chrome.exe 96 PID 4820 wrote to memory of 3604 4820 chrome.exe 96 PID 4820 wrote to memory of 3604 4820 chrome.exe 96 PID 4820 wrote to memory of 3604 4820 chrome.exe 96 PID 4820 wrote to memory of 3604 4820 chrome.exe 96 PID 4820 wrote to memory of 3604 4820 chrome.exe 96 PID 4820 wrote to memory of 3604 4820 chrome.exe 96 PID 4820 wrote to memory of 3604 4820 chrome.exe 96 PID 4820 wrote to memory of 3604 4820 chrome.exe 96 PID 4820 wrote to memory of 3604 4820 chrome.exe 96 PID 4820 wrote to memory of 3604 4820 chrome.exe 96
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mail180-ripple.com/4dc69734cc653c841ccfe790892075b5599f8443e932116780d891ef912ff90ato1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce9709758,0x7ffce9709768,0x7ffce97097782⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1856,i,5679494495144346230,14776410825778288673,131072 /prefetch:22⤵PID:3416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1856,i,5679494495144346230,14776410825778288673,131072 /prefetch:82⤵PID:3400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1856,i,5679494495144346230,14776410825778288673,131072 /prefetch:82⤵PID:3604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3128 --field-trial-handle=1856,i,5679494495144346230,14776410825778288673,131072 /prefetch:12⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3168 --field-trial-handle=1856,i,5679494495144346230,14776410825778288673,131072 /prefetch:12⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4448 --field-trial-handle=1856,i,5679494495144346230,14776410825778288673,131072 /prefetch:12⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3340 --field-trial-handle=1856,i,5679494495144346230,14776410825778288673,131072 /prefetch:82⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 --field-trial-handle=1856,i,5679494495144346230,14776410825778288673,131072 /prefetch:82⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4768 --field-trial-handle=1856,i,5679494495144346230,14776410825778288673,131072 /prefetch:12⤵PID:1188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3992 --field-trial-handle=1856,i,5679494495144346230,14776410825778288673,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3080
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3112
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4060 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:81⤵PID:2180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5b8e043442f3128d82a5389838940d915
SHA1e0adc0edf4f68b98ba36a682df8c4d7454005106
SHA256b4b33bb1ad6733c9f27934815ebde273e5936358f4b0fbc82acd8c619ae4818f
SHA512f51c6c990e4f2f427d78db96d787922404dec73524b9c9447bfe599908e04b32e479e87a219acdfdab3eacdb5e878d04eb467c81c24b1d5ae1f742defe45351f
-
Filesize
559B
MD5658eb438b83e04e09ca5933568ed08a1
SHA16cc8777db220138ad1d32311e19c2f1c4160b206
SHA256efea08f90f68f16fca33581762078b625d111d0c3d1e91fb20c090567b0acd9e
SHA512de0d1afc1c914ae38da0f1b927309535ee3820a3e0982f42786f2aa62b4d7d0fb3d85d1ff7b0369bc22e029d4991da5a658841521b889ec149bb2a5b7c811300
-
Filesize
6KB
MD5187a8e3a733ab5ef6679ee335bf0959e
SHA179cdaf2411329b7657cd31e06a3f02d3c51df547
SHA2562edcb79eb86b71fdff289c3e8ac5da7232a8566c1d35bd0ae037a4e30ebc583e
SHA512628e7566d7f33a0fe7ad6c0f18fa2983a1060c83791506385188118b61258b626c89d85720afa12951543cd77996b8146fd3947fc990ab5787124fb02c267474
-
Filesize
6KB
MD58e87af004cf4980fbb242b3a233bb952
SHA17b24cf5a584c91954921e5177bfbd05dd5115483
SHA256d57f58ebfdc36abb2cb9299ce427501e09b63313e6dbea7ed15aaf6a9915d5ef
SHA512d59049933c3a1624a811f1ffe83b1d5a6e7a27bd52ecf747fb159f592e03b30a3539fea3038247e77b291ce3fdd641ba3d68b93d2da3e76958897a93acc600d2
-
Filesize
6KB
MD5b79c7aca4cf0e5e188e51cced3384bda
SHA18752b814fbe5596a4e60eb37777a290a2ced916a
SHA2568541ee66c58d17ed994e9df9ea3675c0c3015356ae2bfeab4af42889d31fdf32
SHA512704ee841e98afbde36c7037ef2067989129536a5ecb9e420398e6106927032d3f2c5274b93dd397a32ef4406603436009ce81868f8d17303f8453c06ed9ec7aa
-
Filesize
5KB
MD52e82895d12a7192dcaab68b63c5decea
SHA174650e525430130505ad71546d857a92db6a9c3f
SHA256b774f379040151a555695f09e3e7d0539488693b468672a4bee2a7eea90ad183
SHA512d40324ca52e6fde07448836608092ac5817a774ad64b90f6f9747b4a82060fc7abacd4859f066f6809725f359a1cbb4d9a5332a1a84acee1394d2aed54d47876
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd