Analysis
-
max time kernel
23s -
max time network
25s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/05/2024, 03:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://techsta.link
Resource
win11-20240508-en
General
-
Target
http://techsta.link
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133603902292388303" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1212 chrome.exe 1212 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1640 SearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1212 wrote to memory of 4952 1212 chrome.exe 79 PID 1212 wrote to memory of 4952 1212 chrome.exe 79 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 5108 1212 chrome.exe 81 PID 1212 wrote to memory of 3532 1212 chrome.exe 82 PID 1212 wrote to memory of 3532 1212 chrome.exe 82 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83 PID 1212 wrote to memory of 3732 1212 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://techsta.link1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff5c82ab58,0x7fff5c82ab68,0x7fff5c82ab782⤵PID:4952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1800,i,4977549646995738901,4303970848534477472,131072 /prefetch:22⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1800,i,4977549646995738901,4303970848534477472,131072 /prefetch:82⤵PID:3532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1568 --field-trial-handle=1800,i,4977549646995738901,4303970848534477472,131072 /prefetch:82⤵PID:3732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=1800,i,4977549646995738901,4303970848534477472,131072 /prefetch:12⤵PID:1216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2992 --field-trial-handle=1800,i,4977549646995738901,4303970848534477472,131072 /prefetch:12⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=1624 --field-trial-handle=1800,i,4977549646995738901,4303970848534477472,131072 /prefetch:12⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4332 --field-trial-handle=1800,i,4977549646995738901,4303970848534477472,131072 /prefetch:82⤵PID:1752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4500 --field-trial-handle=1800,i,4977549646995738901,4303970848534477472,131072 /prefetch:82⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4772
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:1640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD54da9e90444cfcfed15d8645b27b007ff
SHA1849ef23f7a7c46127363abd3ad68bac7ec107658
SHA25605440153612070906aa8cf4e71dfbef2ddd862c27bb9b89293162dde9a58025d
SHA5125d231996a5df0adc3039cfc6cc676fa916b07c07eb0f934a83743f973be201e9acd6cd11ff5dfaf72f703b331669d1ee5f51960d8614b2fa9e267157018ff828
-
Filesize
2KB
MD5963b108f75045d083c6a7aa07b3e2ad9
SHA1ab4df8e8f47a3e03e972945c7ab365df17da50c1
SHA256294bd5ee2af767a62ae8b9398d90b1c58589604fcf15d3dbaf26c8be4f83b25d
SHA51227942299bd6f5ef088dd10b8bcdbc018ccf0648d5e40a0b0d864afd4432e944eb86a67787a790f01739c793af531ae5b937b3ef88f06afea85c37a8324905f9c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
856B
MD50594b3fd00e4bf1ff9cbcc293daadc3d
SHA106ea173b708027d37583d1b4c5858fe2f14a9910
SHA256f4eee199cbb79a7e2ff98e142d7f0786a8ea56ffb054deb23d49958e99c9b7d6
SHA512897cb79f631a94011f2128f761a7f2d7b899abef95c791b446da4613f6ae43bbb4404979cae5359d25b27c1d771a079dd1f7dd64db2ea9f4ab0263901343d677
-
Filesize
7KB
MD5280d79d554ce10c2993c9f6798f13a1b
SHA1f0f5f2f25343ae0743b4831b589f3e0baca5527c
SHA2568096301d1abbe71f7fd075b2989ceabb18458d880ed243acb71152d42c05ed2c
SHA512d3a20cdaa3d95d3ea6cd218e79114c3369ee87367f271a1126c8aa63d29c2f39bd265ba1667b056c14a6799adfc7e11f027948d64797db21d9cce7469915341f
-
Filesize
131KB
MD5e71725377c72cdf4c1f50ba31554d3da
SHA1e4405b08947bbe558c55b4d75b62318eeccc93a1
SHA256889094ebb9d9f06c2914d78f809c101bc26e4f38749ad1903fd4ebb7608acb17
SHA512fbaa1f1c84403f453c7cb9c3f5de1c78b656f55595a91ec6819fe3504ac40e85de811b544dad149259beb58efd98219a4291fc7b548d2165b0d13bdd3260337c
-
Filesize
131KB
MD5e486a84cd65dd5b19e641a3000afa833
SHA1f242a2f4ad97f0e1c01bc0237dd22e85978901e0
SHA2561647c6941d7c127fdba66d4c35f7e6d92427c7557408d8a439ceff24b09f3a14
SHA5129cc4e99ec8538f39c3824f89834d6ffb21b8a36761c29733cd70a4d1e8a09585233072058126b422e0b091671ab2bc0c31e5bafc6e7ca9b1f1ee74d21a3558a4
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58