Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 03:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ipfs.chainsafe.io/ipfs/QmfLuYTJETbpCeR3CxWxujKurXYkivFgfAyAz5htXgNTpZ
Resource
win10v2004-20240508-en
General
-
Target
https://ipfs.chainsafe.io/ipfs/QmfLuYTJETbpCeR3CxWxujKurXYkivFgfAyAz5htXgNTpZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133600436974570510" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2840 chrome.exe 2840 chrome.exe 2468 chrome.exe 2468 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2840 chrome.exe 2840 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2840 wrote to memory of 3088 2840 chrome.exe 84 PID 2840 wrote to memory of 3088 2840 chrome.exe 84 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 2904 2840 chrome.exe 86 PID 2840 wrote to memory of 1020 2840 chrome.exe 87 PID 2840 wrote to memory of 1020 2840 chrome.exe 87 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88 PID 2840 wrote to memory of 1624 2840 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ipfs.chainsafe.io/ipfs/QmfLuYTJETbpCeR3CxWxujKurXYkivFgfAyAz5htXgNTpZ1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff76e2ab58,0x7fff76e2ab68,0x7fff76e2ab782⤵PID:3088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 --field-trial-handle=1872,i,10741754473329345526,2771684555405698292,131072 /prefetch:22⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1872,i,10741754473329345526,2771684555405698292,131072 /prefetch:82⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2212 --field-trial-handle=1872,i,10741754473329345526,2771684555405698292,131072 /prefetch:82⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1872,i,10741754473329345526,2771684555405698292,131072 /prefetch:12⤵PID:3096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1872,i,10741754473329345526,2771684555405698292,131072 /prefetch:12⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4244 --field-trial-handle=1872,i,10741754473329345526,2771684555405698292,131072 /prefetch:82⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4496 --field-trial-handle=1872,i,10741754473329345526,2771684555405698292,131072 /prefetch:82⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1872,i,10741754473329345526,2771684555405698292,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD51850b4d834705ad9a898742044205aa5
SHA16fb5bf03473410f6834f24bacb443a72ed086efa
SHA256f55b85f9edd55ef82642bb25654677c7d307665434c2073ec4849624a95512e0
SHA512461a6db34879dfc4a4b21587db06c0d4d1dcf310f149d2c61d8eca2ac0401e74c9148da6e1a9f5960df6d79c9b71469e78279adf0f977468625c6e754e78f744
-
Filesize
2KB
MD59f66b19a4d6b4b76516efb9b8e96ea3a
SHA108c70e3f92d2b4c0865ca1295ab8d2be1a9ac7c7
SHA256b8618723708a903e9597796f19e97bc58b77e4fcb01b1ca89f8a185515790412
SHA512b63ff857c53849321c43359e7ef2e0ff9dd198fb622baa69187a4b5ee381d84fcf6ca10128716ae544f0be284e0fe735d5d3e464c1a46749d49728705ea1ef57
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5dac7f8b861dab5302a4e4ade52b3c4c9
SHA1b95a0e30c29f6cd5e862647dee42ba5dfe832a1a
SHA2568dfaca4145f6509b485f945217baa46463551e08ec3df7d77a8c2ca1650b6635
SHA51272123e35d13597f9c9543016a18add53bffefc3dbedd39306112964847b485a18593eac9246c2178593e4ba2838a44fb315f174ca8cbcdf70f31b6f38eee598d
-
Filesize
7KB
MD5e86e94418ad521f9fbe4055c8bf3a913
SHA166080389ef2e9026d3f7a16b0dc1903bded8580c
SHA25667c28b8bef8ece76614b60650681c4ffe7dfefc155dc44e083abc46d60309265
SHA51240408e115c0be5d72ee956e25de6db64dd8fea5b2ce6ac8575b2520242a3ab55a1e70d3142900cbb2385a4370541154181075a3cc133b088e5784dde535f6dcc
-
Filesize
255KB
MD5d8240a9c6b34b0bff573ffd6a45fae64
SHA107cec11397872e8f2e5089b8b5fab5fca4c1f38c
SHA2564d1eb9fdbdc966842163df6d02464ff97c2910c2bdccd59615b958d30e9c4106
SHA512848d5da7d9e7625b643034dc7f5d4a53a2cb5654b9679d176714e81b28ca215823f722608fb029f017b6c37f3b4072de89a5bb06fddfd919176da1948efa8468