Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 20:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://jxf.sancort.com/n9cPy/
Resource
win10v2004-20240508-en
General
-
Target
https://jxf.sancort.com/n9cPy/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133598463041147960" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4508 chrome.exe 4508 chrome.exe 3276 chrome.exe 3276 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4508 wrote to memory of 3504 4508 chrome.exe 89 PID 4508 wrote to memory of 3504 4508 chrome.exe 89 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 4880 4508 chrome.exe 93 PID 4508 wrote to memory of 5096 4508 chrome.exe 94 PID 4508 wrote to memory of 5096 4508 chrome.exe 94 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95 PID 4508 wrote to memory of 1972 4508 chrome.exe 95
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://jxf.sancort.com/n9cPy/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc93d0ab58,0x7ffc93d0ab68,0x7ffc93d0ab782⤵PID:3504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1660 --field-trial-handle=1896,i,7507826786218090550,16711083486200761714,131072 /prefetch:22⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1896,i,7507826786218090550,16711083486200761714,131072 /prefetch:82⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2200 --field-trial-handle=1896,i,7507826786218090550,16711083486200761714,131072 /prefetch:82⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1896,i,7507826786218090550,16711083486200761714,131072 /prefetch:12⤵PID:3276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1896,i,7507826786218090550,16711083486200761714,131072 /prefetch:12⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4372 --field-trial-handle=1896,i,7507826786218090550,16711083486200761714,131072 /prefetch:12⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4492 --field-trial-handle=1896,i,7507826786218090550,16711083486200761714,131072 /prefetch:12⤵PID:3788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3332 --field-trial-handle=1896,i,7507826786218090550,16711083486200761714,131072 /prefetch:82⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4812 --field-trial-handle=1896,i,7507826786218090550,16711083486200761714,131072 /prefetch:82⤵PID:1628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 --field-trial-handle=1896,i,7507826786218090550,16711083486200761714,131072 /prefetch:82⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=988 --field-trial-handle=1896,i,7507826786218090550,16711083486200761714,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3276
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:452
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x498 0x3e41⤵PID:5044
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4048,i,16488180140590516186,11762960689811837350,262144 --variations-seed-version --mojo-platform-channel-handle=4044 /prefetch:81⤵PID:780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5fb8d599fd087fc66a692e0af210e2adb
SHA14a907c3c237484a53b20ff539e8b92e94774037b
SHA2569d342d5ccd324e69e885bb1dfbe6d9c0a0979e92ffd96f51c09afd3df06fc4a8
SHA512c07753a3dcd58e08bba3a68efbb722ddd50539f20152bf3529f4d8c97be913db645987c413c9cfae42b4e20277baac3a9a45673e329ea75317711a74f06bb432
-
Filesize
240B
MD518cf402381f869f96e60e62ba3354230
SHA158f1445648714e576186ed9a11147dff6d4a73b9
SHA25623d656a350c945fc6c9a002f70122e44d849cd5fe4501459f910be1722460b3c
SHA512b8b07a404ab8cf6c446e353dee6e0bc99426fad8ca6c5c8dfaa3e9d97f4c458f829705ec4a444d65c85b5690569fe3eca0f1cba1b520bac223b46a554f785c31
-
Filesize
2KB
MD54859488084814703ab75f630e383fe09
SHA1a64819acf0194532e0badb41d9ce9918d21b005b
SHA2561446baf01f6e58c62652c5b2e0ddc4d036c62cb41ed19a249bca68cb623ea5f0
SHA5129ecfaf0eedc643f8cb6675d058c09734e5ab74dbd856f8eb76aa4bc7314d6741895cfd8cece24e06d40972b5382337467b9981e417d0f40bbac13a115c162e66
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5f5ba2efdcc2a115bb447aef0e5121d69
SHA187eab30d154053a4975e37e1efdb940861f1ef52
SHA25668cf593ada1ff7c951a842c0801fa342e1b8db5c78a13c0cdb6808f4f34e7a4a
SHA51225422796468e6eddad9edb3e50d133198e1f325468d4648581c6034a6b8b3b979320fefc6841074a1ed11850d9714475fe72970cde6a1abb894a1572de274dff
-
Filesize
7KB
MD57253b4b4248d96b6cac9830bf11fdbfa
SHA1f0a539b92f3da3d326f812c66fab63bf5a9f1a99
SHA2566c086040563e245f78ca98b8105d1036ccb5c3b7449620139307550a7ae1083d
SHA512241d1478adca39185a71f31e183d6b87167ded81cbc7cf070e4b0be24c858bd7eb5de15f8642ebe74144f0730c777d68f9d6dbd8da3febcaaaf90a5ba17bd375
-
Filesize
7KB
MD5695be9c3b5759a2088063108ec00e30f
SHA11247fad150bf5c02f8dad0f3ef0769be2c5322ad
SHA256e408bf5301bb5a68e14c04161835b78fe09be3bdb8b0f559256a0b9a4c0995a6
SHA5120eb7eb9e7f4216b511ca24c7dc61441eb363630cac7b9284c01162ddf7989cf86588f804b337f5793803c814477f52e773caa42ae5cfc5403f9e410949d5aa70
-
Filesize
255KB
MD5d6902554880cd42d45ac2db23903674a
SHA16915e85365729b0271bec0b488c5c5181ad873f4
SHA2565938abb07529fbe48f404fb43ea79f68224b44abf9d75f26df7061e8680962af
SHA5127d7dc80d23ea7049c1d41183e97fcd96de924c1ccbc9e2686e819788bb5d14640da7816662aa70e1127b05044a2de3286ae453813198f9a64b4fcaa0add74bb0