Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 10:34
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Mark of the Web detected: This indicates that the page was originally saved or cloned. 1 IoCs
Processes:
flow ioc 7 http://ustream.pro/ -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133603292710664657" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 3028 chrome.exe 3028 chrome.exe 2932 chrome.exe 2932 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 3028 chrome.exe 3028 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3028 wrote to memory of 4456 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 4456 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2844 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2324 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 2324 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe PID 3028 wrote to memory of 1744 3028 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://ustream.pro1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa68eab58,0x7ffaa68eab68,0x7ffaa68eab782⤵PID:4456
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1916,i,11782468529311060005,11871297345077055683,131072 /prefetch:22⤵PID:2844
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1916,i,11782468529311060005,11871297345077055683,131072 /prefetch:82⤵PID:2324
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2224 --field-trial-handle=1916,i,11782468529311060005,11871297345077055683,131072 /prefetch:82⤵PID:1744
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2980 --field-trial-handle=1916,i,11782468529311060005,11871297345077055683,131072 /prefetch:12⤵PID:4132
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2996 --field-trial-handle=1916,i,11782468529311060005,11871297345077055683,131072 /prefetch:12⤵PID:2584
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4228 --field-trial-handle=1916,i,11782468529311060005,11871297345077055683,131072 /prefetch:82⤵PID:3744
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4380 --field-trial-handle=1916,i,11782468529311060005,11871297345077055683,131072 /prefetch:82⤵PID:432
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=924 --field-trial-handle=1916,i,11782468529311060005,11871297345077055683,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2932
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD59438dc9eee89d0ebacc2c132b169178e
SHA1100377465f4b289d0a7b73415503fa2cfd729e1d
SHA2567df7e4024d5a477241b27e82906f3b6bed447c6256100c75b1ed14312c89da6e
SHA51288d38dddcd6603c0be34cc1448384efb03f1c7ab5af914fcc9ebad5e3fe5529f6e55379cf4a88ad5b0452a008ac70fb8ac82ea3169bc41c58dbe7b2d7aa39ec1
-
Filesize
168B
MD5d7674a1d8ee840ef02bde10040bce372
SHA1a0d3df2271bcd745ab102da98d243f2e06c9064a
SHA256dce3d7a0ccbf86de8e28fbb609f0252f475194c89436327bf4dfcd8055bf5156
SHA51226b9f71fe16cc7273787a4bf21a1688b9084126ae451f8b8b0d5de2d3dc9ba3f0d0c64e0cc2fb90ba6686e81f62b36e792c747fb9d3323c1adf54206c98f85fd
-
Filesize
2KB
MD55e7c4cafa856940d196ae5ccea6b694e
SHA17d034526c9d193028b80472d79be6143c241c000
SHA256e4492f65ace7053537cd19589bee8f28eaa65826a4a62bf02e9f1a4ef41821e6
SHA5122696f57d8e3f62de2e99243764f90527e42b11796ce2ac6ee929e0c02dd94800fdb88fb79f09c41e2a47010157e1c3ebcafa70e8140d0d1e807f098f4554b426
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
688B
MD533cb30312a81d66202289cb50d7e24a0
SHA11b7012852dfce66aa83aa1ff6478c8cec9ec3a76
SHA256fbb21ef0893785b79ae201e0ac893cc788e40d4e237cd357d7008b4e583a5272
SHA512e53e870e0136906df7a9e0d75723255a0835782c56723d652d6c799fa4e013212bfe9defd9d1a92ccff08ce737c93c7918668a24da536d02ba1000d36b45ddd5
-
Filesize
7KB
MD5d00f4aaf63c0f1ff857c68e2367b2018
SHA1535f398587a0b74546777fa5d43e14fa0b10d6e4
SHA256c5fa251e6b4c60bc5f48a9620ff0b552573a28a47921e9fe74b167c36439b1ab
SHA51299128922be46f487dbf862bc3627393094779d03fecdd28bae36eeb294f7344aee99b26edc5ec2046369229c9b6c1f31ce2fe8837d902b67682836997c489800
-
Filesize
7KB
MD5133e59d2a903e587cfd0554f1e223ed2
SHA1a0184c9b45a0af1852fd95f615a137de7e584688
SHA256d1f0d35219038379d400eb0c0f07c2cb7bdab64396160c957d68e424f1b69b7c
SHA512b5888586283c316aeeebc104e6f36817189f673929101d862f9f26d0e5a4119e7368429449432376a3c56658e7130599df39b6e19f016f5f88a077067960f0df
-
Filesize
130KB
MD5fe6a3c52b5a8376ac440d421894f6fbe
SHA16422616a2fb2d9fc3567f980801f3af5ec98b204
SHA2562b415e249a5e871c3a198e0ac1fe93f92d06d39980297449d673c75e8d51ae9c
SHA5127a8c2ef13d5cf0b6055331f137615edd65b2630fbd5c7965ee69e65086d478a7662cd62d5c5cdcf9de9560ddb971c80745a57fa70c233c2ea72ef85e12563825
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e