Analysis
-
max time kernel
18s -
max time network
20s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
13/05/2024, 18:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://apvmr.info/pM6m62W
Resource
win10-20240404-en
General
-
Target
https://apvmr.info/pM6m62W
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133600991859544388" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 600 chrome.exe 600 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeShutdownPrivilege 600 chrome.exe Token: SeCreatePagefilePrivilege 600 chrome.exe Token: SeShutdownPrivilege 600 chrome.exe Token: SeCreatePagefilePrivilege 600 chrome.exe Token: SeShutdownPrivilege 600 chrome.exe Token: SeCreatePagefilePrivilege 600 chrome.exe Token: SeShutdownPrivilege 600 chrome.exe Token: SeCreatePagefilePrivilege 600 chrome.exe Token: SeShutdownPrivilege 600 chrome.exe Token: SeCreatePagefilePrivilege 600 chrome.exe Token: SeShutdownPrivilege 600 chrome.exe Token: SeCreatePagefilePrivilege 600 chrome.exe Token: SeShutdownPrivilege 600 chrome.exe Token: SeCreatePagefilePrivilege 600 chrome.exe Token: SeShutdownPrivilege 600 chrome.exe Token: SeCreatePagefilePrivilege 600 chrome.exe Token: SeShutdownPrivilege 600 chrome.exe Token: SeCreatePagefilePrivilege 600 chrome.exe Token: SeShutdownPrivilege 600 chrome.exe Token: SeCreatePagefilePrivilege 600 chrome.exe Token: SeShutdownPrivilege 600 chrome.exe Token: SeCreatePagefilePrivilege 600 chrome.exe Token: SeShutdownPrivilege 600 chrome.exe Token: SeCreatePagefilePrivilege 600 chrome.exe Token: SeShutdownPrivilege 600 chrome.exe Token: SeCreatePagefilePrivilege 600 chrome.exe Token: SeShutdownPrivilege 600 chrome.exe Token: SeCreatePagefilePrivilege 600 chrome.exe Token: SeShutdownPrivilege 600 chrome.exe Token: SeCreatePagefilePrivilege 600 chrome.exe Token: SeShutdownPrivilege 600 chrome.exe Token: SeCreatePagefilePrivilege 600 chrome.exe Token: SeShutdownPrivilege 600 chrome.exe Token: SeCreatePagefilePrivilege 600 chrome.exe Token: SeShutdownPrivilege 600 chrome.exe Token: SeCreatePagefilePrivilege 600 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 600 wrote to memory of 3628 600 chrome.exe 72 PID 600 wrote to memory of 3628 600 chrome.exe 72 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4672 600 chrome.exe 74 PID 600 wrote to memory of 4688 600 chrome.exe 75 PID 600 wrote to memory of 4688 600 chrome.exe 75 PID 600 wrote to memory of 3092 600 chrome.exe 76 PID 600 wrote to memory of 3092 600 chrome.exe 76 PID 600 wrote to memory of 3092 600 chrome.exe 76 PID 600 wrote to memory of 3092 600 chrome.exe 76 PID 600 wrote to memory of 3092 600 chrome.exe 76 PID 600 wrote to memory of 3092 600 chrome.exe 76 PID 600 wrote to memory of 3092 600 chrome.exe 76 PID 600 wrote to memory of 3092 600 chrome.exe 76 PID 600 wrote to memory of 3092 600 chrome.exe 76 PID 600 wrote to memory of 3092 600 chrome.exe 76 PID 600 wrote to memory of 3092 600 chrome.exe 76 PID 600 wrote to memory of 3092 600 chrome.exe 76 PID 600 wrote to memory of 3092 600 chrome.exe 76 PID 600 wrote to memory of 3092 600 chrome.exe 76 PID 600 wrote to memory of 3092 600 chrome.exe 76 PID 600 wrote to memory of 3092 600 chrome.exe 76 PID 600 wrote to memory of 3092 600 chrome.exe 76 PID 600 wrote to memory of 3092 600 chrome.exe 76 PID 600 wrote to memory of 3092 600 chrome.exe 76 PID 600 wrote to memory of 3092 600 chrome.exe 76 PID 600 wrote to memory of 3092 600 chrome.exe 76 PID 600 wrote to memory of 3092 600 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://apvmr.info/pM6m62W1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffa3b189758,0x7ffa3b189768,0x7ffa3b1897782⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1660,i,3124403843851009844,8455820017260164169,131072 /prefetch:22⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1820 --field-trial-handle=1660,i,3124403843851009844,8455820017260164169,131072 /prefetch:82⤵PID:4688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2100 --field-trial-handle=1660,i,3124403843851009844,8455820017260164169,131072 /prefetch:82⤵PID:3092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3008 --field-trial-handle=1660,i,3124403843851009844,8455820017260164169,131072 /prefetch:12⤵PID:1372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3020 --field-trial-handle=1660,i,3124403843851009844,8455820017260164169,131072 /prefetch:12⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3644 --field-trial-handle=1660,i,3124403843851009844,8455820017260164169,131072 /prefetch:12⤵PID:1684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4748 --field-trial-handle=1660,i,3124403843851009844,8455820017260164169,131072 /prefetch:12⤵PID:1404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4400 --field-trial-handle=1660,i,3124403843851009844,8455820017260164169,131072 /prefetch:12⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3136 --field-trial-handle=1660,i,3124403843851009844,8455820017260164169,131072 /prefetch:12⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 --field-trial-handle=1660,i,3124403843851009844,8455820017260164169,131072 /prefetch:82⤵PID:3104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 --field-trial-handle=1660,i,3124403843851009844,8455820017260164169,131072 /prefetch:82⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1018B
MD5b7106d12ded010b63328b60fe63ecf5f
SHA1bfc612b9701d8ea2fab02826d0a14b278a90c9ae
SHA2561ff609c6aced3e1dc526d94bcf7296316bb1f38426627dcf78642f95c2364379
SHA512faf66f3a121ab41d5f9316c808d51cb278c20dbbd46120f4f735d36a69abd3f7334e0b88522e4f162cbbdbddd205ed1172dc2d00a78001a32697e632d80eda59
-
Filesize
1KB
MD518cbb2239ef01ed11e271cd09526ff96
SHA1a1f156fa03eb99914f235b0b066522b3e966f490
SHA256b1aa007cb87678aa85af3b2ab35e91d8bbd0feff7465028582d2315e5ef6b257
SHA5121ab6f3cfa73a824236b65333d4f83360128d5d53a60bc8d30350dd0ad8b922f158cd66735d9f9eedcedb09070f741ada56dd712c37f15c8ad1c3d507ad8f9bc3
-
Filesize
6KB
MD51d8fc48f9a37bafb1c8061fe24055753
SHA14f400fac5bdb770aab871041f2e5e74611acdc57
SHA256fe2f9ab436e468376c79b522336ce50c85837b977b9f0a7cae11c7b3bca4f9a9
SHA512c35964f9abb0cd07884954466e6d942641422208300c9eb6c344757abb957cb26e5061e615a95871fbc8c765fc54a1191296dacc498c6b29fb98c570e987dadb
-
Filesize
136KB
MD56d82edb4d2a78632864ccffa9bedcadf
SHA1f92059ae4df6ef0979bb89469a54dce3c50e74cd
SHA2561f3429cfab17eec03d8e0672dccfb00479cb86855dac31245eb31b72600436bd
SHA51206578fb2df40650f688ae695d1f4fd03708756b94dc736be260ff79e3d3eac0fbbffdd941db6629f3d826fe3cf65ac739ada0a93309e48fd7aa835bc308ce848
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd