Overview
overview
7Static
static
1URLScan
urlscan
https://llective65.d...
windows10-1703-x64
1https://llective65.d...
windows7-x64
1https://llective65.d...
windows10-2004-x64
1https://llective65.d...
windows11-21h2-x64
1https://llective65.d...
android-10-x64
7https://llective65.d...
android-11-x64
7https://llective65.d...
android-13-x64
7https://llective65.d...
android-9-x86
7https://llective65.d...
ubuntu-20.04-amd64
4Analysis
-
max time kernel
59s -
max time network
55s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
15-05-2024 12:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://llective65.de/invite/i=63719
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://llective65.de/invite/i=63719
Resource
win7-20240419-en
Behavioral task
behavioral3
Sample
https://llective65.de/invite/i=63719
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
https://llective65.de/invite/i=63719
Resource
win11-20240426-en
Behavioral task
behavioral5
Sample
https://llective65.de/invite/i=63719
Resource
android-x64-20240514-en
Behavioral task
behavioral6
Sample
https://llective65.de/invite/i=63719
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral7
Sample
https://llective65.de/invite/i=63719
Resource
android-33-x64-arm64-20240514-en
Behavioral task
behavioral8
Sample
https://llective65.de/invite/i=63719
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral9
Sample
https://llective65.de/invite/i=63719
Resource
ubuntu2004-amd64-20240508-en
General
-
Target
https://llective65.de/invite/i=63719
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133602498228130283" chrome.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
chrome.exepid process 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 1616 chrome.exe 1616 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1616 wrote to memory of 1988 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 1988 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2284 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2968 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2968 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4500 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4500 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4500 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4500 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4500 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4500 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4500 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4500 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4500 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4500 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4500 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4500 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4500 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4500 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4500 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4500 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4500 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4500 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4500 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4500 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4500 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4500 1616 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://llective65.de/invite/i=637191⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffc13179758,0x7ffc13179768,0x7ffc131797782⤵PID:1988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1732,i,13187303597792953905,13571143461920612087,131072 /prefetch:22⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1872 --field-trial-handle=1732,i,13187303597792953905,13571143461920612087,131072 /prefetch:82⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2076 --field-trial-handle=1732,i,13187303597792953905,13571143461920612087,131072 /prefetch:82⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2892 --field-trial-handle=1732,i,13187303597792953905,13571143461920612087,131072 /prefetch:12⤵PID:4348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2900 --field-trial-handle=1732,i,13187303597792953905,13571143461920612087,131072 /prefetch:12⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4340 --field-trial-handle=1732,i,13187303597792953905,13571143461920612087,131072 /prefetch:82⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 --field-trial-handle=1732,i,13187303597792953905,13571143461920612087,131072 /prefetch:82⤵PID:4504
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD55f69f830d973f26ced75e89a7a517053
SHA1bf1276ff60e20048b220d987db8eeb741e2cd0b6
SHA256254e4aca47db0177884a0747c540b7083ee8294eb452d2b7176ad89252855b83
SHA512dda93b4c13f7fd7757d4a3b4f82fb7ce55584e19a245d62a016fa8c53329d05e5f42025d9bbdd82bdb1c6ec3f3ebf9d62ca2bcab9032e08cbb75f3dc6f116c47
-
Filesize
6KB
MD5af05a1865b685735e1471dc3cb2d6b87
SHA13ac7f0e5cdc121a894722d9298b3c1b64cfdfc3d
SHA2565ee44e2c3cee28d8be3e0f4408ce5d9240fa8047b40a98343596ee39ab76e565
SHA5120410af6a318c07915e62b1e5a08ac8ac2acba55de0d5c05aa3648c30a6e44b1f30eab192ee60fedcdc121127d825b721349d9c7c2e83e4ead8ebfe4095e7dbcd
-
Filesize
6KB
MD561cda5f7539fe407bf01a0397f382a6d
SHA122a21f3f1d5646a24e7ed44dc77a3780c3677f73
SHA256008713dcada01c29b022640a10081edd072f5b93212c7490b87df3ca64f7f96e
SHA5123a740c7f0526b0f3d66fbef00603805a1443b1e78f933298d6805195b1c6e895993ef6b95a93a5c11cc530c265ab683763e823e62020fb6451086eb9a418ce46
-
Filesize
136KB
MD5edb4a8298fa5f36765e7a2efc0973720
SHA1c411e61a34c7ee6b36e398cb9827bf5f51c728c1
SHA256ac8be132c4f4df008df0b17157a2169c9014b3f28dbe0f804a97a478df27d41b
SHA51245b72b5042afcbfe14f53763ba41f388e4145e31b8955cc04ae3b69064f2d5264bf2d4b950e135abbd52f6dd8bcdbcacb11172c308b3c18b355729054f02a3c4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e