Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/05/2024, 00:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/thedarkmythos/windows-malware
Resource
win11-20240508-en
General
-
Target
https://github.com/thedarkmythos/windows-malware
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133603784590482086" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 2188 chrome.exe 2188 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1788 chrome.exe 1788 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe Token: SeShutdownPrivilege 1788 chrome.exe Token: SeCreatePagefilePrivilege 1788 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe 1788 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1788 wrote to memory of 3924 1788 chrome.exe 79 PID 1788 wrote to memory of 3924 1788 chrome.exe 79 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 1272 1788 chrome.exe 81 PID 1788 wrote to memory of 2340 1788 chrome.exe 82 PID 1788 wrote to memory of 2340 1788 chrome.exe 82 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83 PID 1788 wrote to memory of 4004 1788 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/thedarkmythos/windows-malware1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcfa65ab58,0x7ffcfa65ab68,0x7ffcfa65ab782⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1832,i,18410673564217177910,3350596658642695121,131072 /prefetch:22⤵PID:1272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 --field-trial-handle=1832,i,18410673564217177910,3350596658642695121,131072 /prefetch:82⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1772 --field-trial-handle=1832,i,18410673564217177910,3350596658642695121,131072 /prefetch:82⤵PID:4004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3104 --field-trial-handle=1832,i,18410673564217177910,3350596658642695121,131072 /prefetch:12⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3184 --field-trial-handle=1832,i,18410673564217177910,3350596658642695121,131072 /prefetch:12⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4232 --field-trial-handle=1832,i,18410673564217177910,3350596658642695121,131072 /prefetch:82⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 --field-trial-handle=1832,i,18410673564217177910,3350596658642695121,131072 /prefetch:82⤵PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4580 --field-trial-handle=1832,i,18410673564217177910,3350596658642695121,131072 /prefetch:82⤵PID:4332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4572 --field-trial-handle=1832,i,18410673564217177910,3350596658642695121,131072 /prefetch:82⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4492 --field-trial-handle=1832,i,18410673564217177910,3350596658642695121,131072 /prefetch:82⤵PID:4404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4488 --field-trial-handle=1832,i,18410673564217177910,3350596658642695121,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2188
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53da828704c0378d17da81050a411bbb5
SHA12e666a16c88354647afa0121cc852816294ea684
SHA256a4e1c63a14c00e2f5ee6d7ed22462f0848c85e9493c6ded1b1f869ad049307ae
SHA5120f1cb1a4f91c209eb3b3baaeb1cadb647819428f6cd04bdb78adc3c5e8b14019064e85a96c41e108ad969282af8d543c05e2b2839ecca9b45feb42007f432a50
-
Filesize
2KB
MD52ef96e280388b521fb1147c79cd0e93e
SHA1bc79d7505eb84a042d778a4ba26afbd5e70b8774
SHA256dce5398f3c7720329c175aa2c0249632f4a33a4189613d04e0069ae1befbd801
SHA51213fafc8bce3666d084600304ce9b518da8abfa404a59cea505a2a0a4e1f0b4240eb083c4965a0862853d94df5f306ed4aa695c55cd204540bece613fa97e2047
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD58bd929eecdae530b3622e30cc5dcf2ea
SHA15cf9f82b0f76591ee4a3fcb2ab46b2fd00a49811
SHA256d75b86ba323e5387c55228777e15f08479edca6cc8e455588ee51da3b5ff7174
SHA51254803c49371814bac70c456084c5fcab1206e1f0f6efe23c96b637c807092256c7a0ff49c99e9174d13d1e0e94c1e881b58ecf26d39ec6740c1708596014350d
-
Filesize
7KB
MD5d83cef4c121f6560cb54fa8afb8946ac
SHA1421a24c8ea5bbae79bb2517c7c356174c01b235a
SHA2563883960b2d41ff34942435d96019aee8081fd6167f40602cd7d945cf576057f0
SHA512b1ffd749932d113a1d98e49b904624078f4ae158a3dd06df599671a786beee5d15410aeb15083bb941f0c3b641a10bdee9ba5dae7907f7c6d1719d0d5586de8b
-
Filesize
131KB
MD5d5ea8b383db5d97ee71181edeb7ae95f
SHA1280a7d0b0886f014cf30cc26eb8bfb63f251a41f
SHA256e5fc5eb8145aebe9e620bdbe66c747fad32db3b88185f742c84bfe4bbe1f88a1
SHA51259356af4c380d7e761f7b4a33345337f0f4a27ad3427ce6ea674e512f9f5fa180c4c632cf4e5c22e344e977ba49ab9290ba50f32c6d2870675cbefc95b656cbd
-
Filesize
131KB
MD5a36cf020ef1a662b3dac8f181ced5530
SHA1211ce2cd2b6bb861dee6fd449871a7709c61ff86
SHA25694c53be7bccbe291901ef09f20be6e5278e85824188d9df30d484748fb15e7d6
SHA512b71f5c7a33c09937c63d4937df0329f08f7bff6fb279de3bb580232a74fb819df9e96d5f66da65d743bd2d30080a56048ae7ddf68d87dba1f1343c9b7127e287
-
Filesize
131KB
MD53d083dd776218142ae6f6fabc7953db7
SHA19397329fb946a1ba49be24484032905c01e57003
SHA256f6cfeb0b565e9a1ae559b425f33c974bef7c6612128ea3faf8ace95d9b3a810c
SHA512412f82498e4007163fa09f84132f6de7debb39e201dd8f7987f595c102c542a0ee6dd431fd54329ea65dddcd21884dccb125e6439adce24a62856c99cb099d53
-
Filesize
151KB
MD5a7d6b9416a6034930f89d9d01aa35aad
SHA156722e0665a9e11139ae51ef84a6df0622436bbc
SHA256b3a43f756edfd1eebaabb4362eaa338db0fd9ad6869854435dc9783f3a2bfdb5
SHA512c4cff1c2f1781023298fc36a4b38d03c3d825601fe1a5ac319fef9fa427d8d0549eec5dc2f86e77b67811ba55913d58b2a7792b043077feb34745140717bfa0a
-
Filesize
86KB
MD5206a7977cc85cb9873db96ef4104ea03
SHA1eeafd9f99697c6f1ce3854743e6a3dbe682ce439
SHA2567eb356d8a9da9b67649d7a308b2b7efc81b89723f011727dba29fa0411579c86
SHA5123992041d2cd78f7c6279057738f2898fdd2b74c7f8b9d047c7826a9cdf4b5c0ee085371d7615e40fcfe5e8fe3f366ab3a845ea98182d288bbc504e65eab09875
-
Filesize
83KB
MD5b2f6ca10f379b1197992a6c49d4c597b
SHA16ea0ea65d6d8b4961a19f6146c1f4ae8b9151481
SHA256a113a30d2634532c880cbe0bbdf79303b1113539946407a7276ebc3bf99d79a5
SHA512c516013c1ed746dfdd9f069bc8a7e0aaa9054d26f84b2ea8e75fd67b615adc584b6e8ceba7f8e027d8da22d7fc12a94edaed8103b9f5125ca5f3963b1de403fb