Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 17:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.pirates.com
Resource
win10v2004-20240426-en
General
-
Target
http://www.pirates.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133600957960770244" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 4384 chrome.exe 4384 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2916 chrome.exe 2916 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2916 wrote to memory of 3180 2916 chrome.exe 82 PID 2916 wrote to memory of 3180 2916 chrome.exe 82 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2380 2916 chrome.exe 83 PID 2916 wrote to memory of 2040 2916 chrome.exe 84 PID 2916 wrote to memory of 2040 2916 chrome.exe 84 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85 PID 2916 wrote to memory of 2764 2916 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.pirates.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb9da0ab58,0x7ffb9da0ab68,0x7ffb9da0ab782⤵PID:3180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1908,i,5211278813701656461,10677473405108536689,131072 /prefetch:22⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1908,i,5211278813701656461,10677473405108536689,131072 /prefetch:82⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2236 --field-trial-handle=1908,i,5211278813701656461,10677473405108536689,131072 /prefetch:82⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2948 --field-trial-handle=1908,i,5211278813701656461,10677473405108536689,131072 /prefetch:12⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2956 --field-trial-handle=1908,i,5211278813701656461,10677473405108536689,131072 /prefetch:12⤵PID:4932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4460 --field-trial-handle=1908,i,5211278813701656461,10677473405108536689,131072 /prefetch:82⤵PID:1404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4592 --field-trial-handle=1908,i,5211278813701656461,10677473405108536689,131072 /prefetch:82⤵PID:3504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4584 --field-trial-handle=1908,i,5211278813701656461,10677473405108536689,131072 /prefetch:82⤵PID:3440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4248 --field-trial-handle=1908,i,5211278813701656461,10677473405108536689,131072 /prefetch:82⤵PID:4200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 --field-trial-handle=1908,i,5211278813701656461,10677473405108536689,131072 /prefetch:82⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4852 --field-trial-handle=1908,i,5211278813701656461,10677473405108536689,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4384
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5dd3899db68b4546b76acb9f08b9b2256
SHA1cdec17d7759cd605f67304baeeef6f6520309323
SHA2568117fcd35866a28faa2aef3e9cf8f4168be6db3a9a78e9a698032e9ffd04e8a1
SHA51202323250b66fe89f329a8a6da1d331fa26ba66c95aa71b64928da0110cbbde054ba42c1c2fe4f6f509fe7a27afb433361651beefe0b3dc43d0de1cb930610ff2
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5c1b5fea7e1284e040e79a256a7adc85b
SHA1c03323fa07843cc9519d2df12e8ba00072e4be44
SHA256d5788e88541351c733241e58d34c729b7c295ece2cfcab7e072904a0ae98f2f7
SHA5121dd6d72d5259857d6bcf6360f67e0a5b89597dd4eb1b2a6679f3c49480932d90090db0a01687849604cc5e23e1bc0497303785a8e41184e6bc1e7d71eb7b0774
-
Filesize
131KB
MD5755bb5985a07d66b192acc269d1a7397
SHA1aa4c22bc9c1a858430ac9c59e6a57dbaee02c43f
SHA256f870a3e845b000435a5fffb00685d325ad1c9651ac016da2cfcd95395db99de4
SHA512c8cf2173b15d6b8c8666737074706e2d8c7409410913a923b1b43986846276208acbb1dcdedb483313310f6595ba8de839640dd587d2ebb764bee47be3c93567
-
Filesize
131KB
MD5546b5cfb6dced630f3f48ebd83c310e3
SHA1eb9b03d03d884983a23c9182df589e9114b69b70
SHA2560d169194309867a7200fbafaad2d3153ef12fec911d2d5cd68121e4e5ccd812f
SHA512f1f001fca83171f51547f45058efe1baa9da670c89d014a1d2343112998f3873d3072c1793b67c6370cc36b2fffd0520f6d483cbabb8882a02ebfb26b64ca3d2
-
Filesize
154KB
MD5a94411adeda362414c58e3b62de80dc3
SHA1816bd40d9829e33e7da078a387aaf832168f96b2
SHA256cc760804b5a4ef93eb9cfae6b12846e93172f61f7d3bbebe8e9b0f5e5f9e31e3
SHA51243f85113e2a46c76154104122d52f3be82c9ee2a69da79adb6e37db8491e388729d006aee7dd5da87736844869938d8148e2f2573c6fe5a59a4fe87a77b3cb83
-
Filesize
132KB
MD5c56db50b0487f25b542fe4524d0a33b2
SHA1c8b520d19654dda9ef83f2cfaea8c6c8b8ff168c
SHA2563064169003690a0ae4bb8145c17f3b2eaebb859e8db30b9bb17087138c40b7e2
SHA51282912e62ea16fcf2cc5a4b92cb19181e4c6ff86ffc835094f0d25fb76e588fff2e534032f19fd856c892f2022f9554a09ae250a2684d2e1061df0f47553c73e7
-
Filesize
91KB
MD52ac396f6045be15e3d65bc393bbb55bf
SHA15e844668220d0df979d9bd111409f0644323a2d7
SHA256146848939eedcb5381f95b7b0ca8f521f7f0e5f09736cc4ec2093682f5e1e443
SHA5122256e95795bd0c4015788a5189efe525c8a72ace2c109fafd625c84db0ab028c968d8c93fea631167667acf1ec09b8286be8aa0769b887a22da94d9c8f4179e8
-
Filesize
88KB
MD549f3fcf035c64006466fd3981a7e12f4
SHA1a11ca387e3b3cf8f198c6daff3127a149e0f6f40
SHA25665b299bcfe80d4d928156a3ba8123e8be237ffecaf1d7855fc79443b3827b169
SHA512877e21116ae32252c0130d7994c079c5db7dc659a2cfc5e2b866ffbda3f1717ce300ab1b747abd77346db5067c9297353b6401abc153f70e31bb49fd9b3a8bfc