Overview
overview
7Static
static
1URLScan
urlscan
https://llective65.d...
windows10-1703-x64
1https://llective65.d...
windows7-x64
1https://llective65.d...
windows10-2004-x64
1https://llective65.d...
windows11-21h2-x64
1https://llective65.d...
android-10-x64
7https://llective65.d...
android-11-x64
7https://llective65.d...
android-13-x64
7https://llective65.d...
android-9-x86
7https://llective65.d...
debian-12-armhf
https://llective65.d...
debian-12-mipsel
https://llective65.d...
ubuntu-20.04-amd64
4Analysis
-
max time kernel
59s -
max time network
61s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
15-05-2024 12:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://llective65.de/invite/i=63719
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://llective65.de/invite/i=63719
Resource
win7-20240419-en
Behavioral task
behavioral3
Sample
https://llective65.de/invite/i=63719
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
https://llective65.de/invite/i=63719
Resource
win11-20240508-en
Behavioral task
behavioral5
Sample
https://llective65.de/invite/i=63719
Resource
android-x64-20240514-en
Behavioral task
behavioral6
Sample
https://llective65.de/invite/i=63719
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral7
Sample
https://llective65.de/invite/i=63719
Resource
android-33-x64-arm64-20240514-en
Behavioral task
behavioral8
Sample
https://llective65.de/invite/i=63719
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral9
Sample
https://llective65.de/invite/i=63719
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral10
Sample
https://llective65.de/invite/i=63719
Resource
debian12-mipsel-20240418-en
Behavioral task
behavioral11
Sample
https://llective65.de/invite/i=63719
Resource
ubuntu2004-amd64-20240508-en
General
-
Target
https://llective65.de/invite/i=63719
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133602499068741114" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 908 chrome.exe 908 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 908 chrome.exe 908 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 908 wrote to memory of 4824 908 chrome.exe chrome.exe PID 908 wrote to memory of 4824 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 4460 908 chrome.exe chrome.exe PID 908 wrote to memory of 3632 908 chrome.exe chrome.exe PID 908 wrote to memory of 3632 908 chrome.exe chrome.exe PID 908 wrote to memory of 3772 908 chrome.exe chrome.exe PID 908 wrote to memory of 3772 908 chrome.exe chrome.exe PID 908 wrote to memory of 3772 908 chrome.exe chrome.exe PID 908 wrote to memory of 3772 908 chrome.exe chrome.exe PID 908 wrote to memory of 3772 908 chrome.exe chrome.exe PID 908 wrote to memory of 3772 908 chrome.exe chrome.exe PID 908 wrote to memory of 3772 908 chrome.exe chrome.exe PID 908 wrote to memory of 3772 908 chrome.exe chrome.exe PID 908 wrote to memory of 3772 908 chrome.exe chrome.exe PID 908 wrote to memory of 3772 908 chrome.exe chrome.exe PID 908 wrote to memory of 3772 908 chrome.exe chrome.exe PID 908 wrote to memory of 3772 908 chrome.exe chrome.exe PID 908 wrote to memory of 3772 908 chrome.exe chrome.exe PID 908 wrote to memory of 3772 908 chrome.exe chrome.exe PID 908 wrote to memory of 3772 908 chrome.exe chrome.exe PID 908 wrote to memory of 3772 908 chrome.exe chrome.exe PID 908 wrote to memory of 3772 908 chrome.exe chrome.exe PID 908 wrote to memory of 3772 908 chrome.exe chrome.exe PID 908 wrote to memory of 3772 908 chrome.exe chrome.exe PID 908 wrote to memory of 3772 908 chrome.exe chrome.exe PID 908 wrote to memory of 3772 908 chrome.exe chrome.exe PID 908 wrote to memory of 3772 908 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://llective65.de/invite/i=637191⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff98b469758,0x7ff98b469768,0x7ff98b4697782⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1820,i,9445390509740544669,15407567763588911609,131072 /prefetch:22⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1908 --field-trial-handle=1820,i,9445390509740544669,15407567763588911609,131072 /prefetch:82⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 --field-trial-handle=1820,i,9445390509740544669,15407567763588911609,131072 /prefetch:82⤵PID:3772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2924 --field-trial-handle=1820,i,9445390509740544669,15407567763588911609,131072 /prefetch:12⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2932 --field-trial-handle=1820,i,9445390509740544669,15407567763588911609,131072 /prefetch:12⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5016 --field-trial-handle=1820,i,9445390509740544669,15407567763588911609,131072 /prefetch:82⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5060 --field-trial-handle=1820,i,9445390509740544669,15407567763588911609,131072 /prefetch:82⤵PID:1176
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD57eb71ca3e9f7089a695480f21993b915
SHA1dcab1aafe1d0b92cf4f774fa3d6d47048d5be1a2
SHA25689cec72e65e6dc2b8e037984ac695cfa648e129c54942915628406722d2ca7f9
SHA5126f7a22cc48d2e4f7f2110e6d619ee87f7bcff23b47074b72e72e62313a9e773280057719cff4b0a2cf15c786d4603b367a039cfd307c6f8a00607b9fff86ddbf
-
Filesize
6KB
MD57ee5b2239f0df1caa799c3c4424548d4
SHA15256c3f3ff9f8b91dd0100325cb35955ed17b85f
SHA256e826097a15d41f01d44a6af853409d11a06c5f007f1fd243f6793ace3ae0c801
SHA51248a2460ab3d2c18ca151f090223f57c8d9dd5f73b5960e7a5093ad9ea8e9610253beb251cf7a7c8cb71ef9516440fff71898144d2b084e81b5e84dfed8b39fdb
-
Filesize
6KB
MD5e9d30dbd4ae89dc6bf88a70c3654ec0f
SHA1fb9a2d0133c11410e482527b1147eb0cff7f29a4
SHA2562304ad62c60f3cdcf378e859a59301564c93cd789e82c209df2571e50cb0c80b
SHA5120e78015c6295605f74dc4b0fba7d7ae5cccf209d49b8d6af10192649a48fa038fd122243da30ce88dc09056f866dc296b71885dbae623641137a517f4ec5b662
-
Filesize
136KB
MD564bf10e85ecca1c2d254919651845112
SHA1ff763876716cbc9dbb6fb72ab0753b8a87363a7c
SHA256498bcf88f4e25a2df5bd2a64b5138ce4e49d174a16a389eae930dd544b8654b8
SHA51205ca020a7b7a7bb91c4e6342a80783c2af3caf8abec80090d915eeebf2b8b09bca3ce3176e5ae3a4833b9f2f35147abd760e5dbd91db1c756c077a3fd186e931
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e