Analysis
-
max time kernel
212s -
max time network
201s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 08:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://everefor.buzz
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
http://everefor.buzz
Resource
win11-20240419-en
General
-
Target
http://everefor.buzz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133597168597880054" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1464 chrome.exe 1464 chrome.exe 3096 chrome.exe 3096 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1464 chrome.exe 1464 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe Token: SeShutdownPrivilege 1464 chrome.exe Token: SeCreatePagefilePrivilege 1464 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1464 wrote to memory of 1932 1464 chrome.exe 92 PID 1464 wrote to memory of 1932 1464 chrome.exe 92 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 1040 1464 chrome.exe 94 PID 1464 wrote to memory of 3220 1464 chrome.exe 95 PID 1464 wrote to memory of 3220 1464 chrome.exe 95 PID 1464 wrote to memory of 1504 1464 chrome.exe 96 PID 1464 wrote to memory of 1504 1464 chrome.exe 96 PID 1464 wrote to memory of 1504 1464 chrome.exe 96 PID 1464 wrote to memory of 1504 1464 chrome.exe 96 PID 1464 wrote to memory of 1504 1464 chrome.exe 96 PID 1464 wrote to memory of 1504 1464 chrome.exe 96 PID 1464 wrote to memory of 1504 1464 chrome.exe 96 PID 1464 wrote to memory of 1504 1464 chrome.exe 96 PID 1464 wrote to memory of 1504 1464 chrome.exe 96 PID 1464 wrote to memory of 1504 1464 chrome.exe 96 PID 1464 wrote to memory of 1504 1464 chrome.exe 96 PID 1464 wrote to memory of 1504 1464 chrome.exe 96 PID 1464 wrote to memory of 1504 1464 chrome.exe 96 PID 1464 wrote to memory of 1504 1464 chrome.exe 96 PID 1464 wrote to memory of 1504 1464 chrome.exe 96 PID 1464 wrote to memory of 1504 1464 chrome.exe 96 PID 1464 wrote to memory of 1504 1464 chrome.exe 96 PID 1464 wrote to memory of 1504 1464 chrome.exe 96 PID 1464 wrote to memory of 1504 1464 chrome.exe 96 PID 1464 wrote to memory of 1504 1464 chrome.exe 96 PID 1464 wrote to memory of 1504 1464 chrome.exe 96 PID 1464 wrote to memory of 1504 1464 chrome.exe 96
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://everefor.buzz1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffe8b759758,0x7ffe8b759768,0x7ffe8b7597782⤵PID:1932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1872,i,13492642298175175275,1306041646829704970,131072 /prefetch:22⤵PID:1040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1872,i,13492642298175175275,1306041646829704970,131072 /prefetch:82⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1872,i,13492642298175175275,1306041646829704970,131072 /prefetch:82⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2912 --field-trial-handle=1872,i,13492642298175175275,1306041646829704970,131072 /prefetch:12⤵PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2976 --field-trial-handle=1872,i,13492642298175175275,1306041646829704970,131072 /prefetch:12⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4524 --field-trial-handle=1872,i,13492642298175175275,1306041646829704970,131072 /prefetch:82⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4520 --field-trial-handle=1872,i,13492642298175175275,1306041646829704970,131072 /prefetch:82⤵PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2604 --field-trial-handle=1872,i,13492642298175175275,1306041646829704970,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3096
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3724
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3684 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:3684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5c26c63db374b60083acc879055900395
SHA1b2b231e9eb2e73d11da6b0ab60a9119012f7f91c
SHA256ec1c8005143b7e30836bad7fc6727ce16b000d41e8cb06c2dc301df083d67a7c
SHA512584f8814ae28d2e6066cffbe98cab279cade4d80d6c9e5205781ad7af747b18e643e87657b49013db8048096e46498459e74cd8cb442aa62b6e52ff02e28fdc5
-
Filesize
6KB
MD52ce60e4deccdabda60a597ab4743add1
SHA1ec09ea81635d327a2ee9d3bacb7d5871eb0a1e3a
SHA25698260d1da4931f77b959269308fd7ed6985f8d57aa8111797b104b8bbe8bd86d
SHA512d9041da6978fe21f78f0f4e478bf7d82aedf8eff95d93e061c86948523fa417654aa7749bba7af941a1e2a4c18f1f2b09d22e2f47436695338b6feb3385739a7
-
Filesize
5KB
MD552fe066ecd0a02726cecfdc641bf2c84
SHA15c9e341d36ecadd4c1cd0f37e2ed1f16466d4103
SHA256a746b9d25d1f6ab835b161cc1df56386f502873e2ef982383825dce1fffad335
SHA5126f7c777c8ed53aee2a8677a9b87535cacde3eb0f4aafdd45e81b087cc4211ebb7f1c248e472907cd3816518efeda455868688ad05268690feaf708cadb9f832d
-
Filesize
128KB
MD5e6bdcc9f69059c6757152d4317d8892c
SHA1e311137be7cd6c8235686a8c6a88b2f1fe41a154
SHA256c3eee0f937c4bcd93688d9750e4c84896cc80e0e5d8f382e60ebd99e78042b4d
SHA512bcf3d511572d641e12eb4711f8d45379459603585b1868fed0111f5518faefd2f34db6e815e10e5926d0eb7a94d40b13bb5e1ee59f765836dafd393043f08e9c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd