Analysis
-
max time kernel
249s -
max time network
247s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 08:49
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cloudflare-ipfs.com/ipfs/bafybeigdoxnod23updagwukhjxrhqx5mbue6iw64lkjsaecarmcnx53mvq/[email protected]
Resource
win10v2004-20240426-en
General
-
Target
https://cloudflare-ipfs.com/ipfs/bafybeigdoxnod23updagwukhjxrhqx5mbue6iw64lkjsaecarmcnx53mvq/[email protected]
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133600638150685741" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 3392 chrome.exe 3392 chrome.exe 4532 chrome.exe 4532 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 3392 chrome.exe 3392 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe Token: SeShutdownPrivilege 3392 chrome.exe Token: SeCreatePagefilePrivilege 3392 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe 3392 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3392 wrote to memory of 3064 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 3064 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 4988 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 2772 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 2772 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe PID 3392 wrote to memory of 1516 3392 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cloudflare-ipfs.com/ipfs/bafybeigdoxnod23updagwukhjxrhqx5mbue6iw64lkjsaecarmcnx53mvq/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce953ab58,0x7ffce953ab68,0x7ffce953ab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1728,i,4399444415611678671,82207244713397729,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1728,i,4399444415611678671,82207244713397729,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2196 --field-trial-handle=1728,i,4399444415611678671,82207244713397729,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=1728,i,4399444415611678671,82207244713397729,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3024 --field-trial-handle=1728,i,4399444415611678671,82207244713397729,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4376 --field-trial-handle=1728,i,4399444415611678671,82207244713397729,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4508 --field-trial-handle=1728,i,4399444415611678671,82207244713397729,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1544 --field-trial-handle=1728,i,4399444415611678671,82207244713397729,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
72B
MD5fdb4a5209f1afa72028c5177c62022f3
SHA1d6d349e7156e67d8f6b17931c6a7848b1d22c795
SHA256a6fa22c2b4f185133cbe8a7dd2b289dad03ba054cafc656bf12b380ab7ee53df
SHA5128cf5563cf0a3846650ed9708c4110e7ef54d31970206be77d09bb93daab449e45a2f9bdc7d41526a74368644dae3c47bc8c384c2ed1e89088d212c14527eb482
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD51800cd58493c7458dad78cfbd7223cb1
SHA151357c835a12e6d91c651ba66d4fa1bc8a7a1888
SHA25686d35c6ecb64c39a3721c81e8bdb1ff88ac96eef8af301a6240623b3fba77123
SHA5129b96b87090ed2eb4ca486c2cec03d5202aacb414a994eba58b511df66c4675100493e2f207c122e3d2abe5851496cd235a3a82bf8eb934f3ff9c4c32fab65864
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD50fe39d20ee109308bf35ddfccdb3fd24
SHA17b31fd52ab049b2f063efa33ccbcb52219333a25
SHA256cb5a8c57822e06a02c8d345125e3e3fc479688adf14f3b85e4b16a9d94508087
SHA51277e5b265087b77f0de791a25438152d3be0d8d502ccff70ea9218a9599876bead9b688cc205fba10ce69ead69609676aea30a2806f5553b17f241e348bb3ef4c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
524B
MD5cf419c2ea0a0e12356853ecb997f1ca9
SHA1b7fb39e279d6427c2086e4f5451251536f30abd1
SHA25633a6b0c3461c722716a003211a2099819e0eb540506e513d420316c5b4335be8
SHA512f2f125cf2d29fcb78661ac7f30bab12e1869c5dd69276e05d95ed45a7cf4ccb44836a1ab189f96185d3f24f8c4a2721eaf815c72a3853649a1e5a5c88682e8af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5e5c4279152ae37968434ecd02ae7bec1
SHA1c7e8ce3272096084f5354eddaceaf2c1d7f82683
SHA256fb4843df5f4340b8b423c1502220697df222734f0fa328228ae820de963a67cc
SHA5126b48e704e7ba97274b115a27889904c470832dd2d6164292dea26ff7b35597e7fb8887f0ca527669cc0c6564550837c4e4b03230f093d629a78fb8eece972c32
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
130KB
MD53c27289c30fca381ebcbf567ba1572e0
SHA113f91148dd3fcf1aaea1c1bb9c580b86a5017a46
SHA2561aa7c72201736180c68a38b62319f5d5c64afc4aff3c5cc7f371b5f5ae45c7e6
SHA51252e0da0ea168909b754c146ef2628f11d201a9fd0c2047a014ca102e9bd18db2531f57e74fceee86f75ab010253993b05cd9fd795b9d7500e6b09a149e3b4a1c
-
\??\pipe\crashpad_3392_MWDPTREEVXNSVBZSMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e