Resubmissions
21-05-2024 11:33
240521-npc7dacb25 121-05-2024 11:26
240521-nj36lsbh5s 121-05-2024 11:23
240521-nhc8ssbg8w 1Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 11:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://feetapart-dot-yamm-track.appspot.com/2_AluxgJvxrz-zxWqhiGGNX09MLxea-fIhRA43LbEpvfHILRhjwFk-pDrYi9Av6udLe6QK6HlPYxs1wGJ6wl87Mi-4lWNE3MPrr4W8ezReZeCR8_NCkP6326goo6byowAydpd9RWrs7nvB9pWDbRFCMtIPzL1VAu5ofI19yEuGtK1hXjOeA
Resource
win10v2004-20240426-en
General
-
Target
https://feetapart-dot-yamm-track.appspot.com/2_AluxgJvxrz-zxWqhiGGNX09MLxea-fIhRA43LbEpvfHILRhjwFk-pDrYi9Av6udLe6QK6HlPYxs1wGJ6wl87Mi-4lWNE3MPrr4W8ezReZeCR8_NCkP6326goo6byowAydpd9RWrs7nvB9pWDbRFCMtIPzL1VAu5ofI19yEuGtK1hXjOeA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133607648584850314" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2684 chrome.exe 2684 chrome.exe 740 chrome.exe 740 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeCreatePagefilePrivilege 2684 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2632 2684 chrome.exe 86 PID 2684 wrote to memory of 2632 2684 chrome.exe 86 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3864 2684 chrome.exe 88 PID 2684 wrote to memory of 3324 2684 chrome.exe 89 PID 2684 wrote to memory of 3324 2684 chrome.exe 89 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90 PID 2684 wrote to memory of 1160 2684 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://feetapart-dot-yamm-track.appspot.com/2_AluxgJvxrz-zxWqhiGGNX09MLxea-fIhRA43LbEpvfHILRhjwFk-pDrYi9Av6udLe6QK6HlPYxs1wGJ6wl87Mi-4lWNE3MPrr4W8ezReZeCR8_NCkP6326goo6byowAydpd9RWrs7nvB9pWDbRFCMtIPzL1VAu5ofI19yEuGtK1hXjOeA1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5a3dab58,0x7ffe5a3dab68,0x7ffe5a3dab782⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1912,i,14349448444568676048,10533298168135584716,131072 /prefetch:22⤵PID:3864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=1912,i,14349448444568676048,10533298168135584716,131072 /prefetch:82⤵PID:3324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2100 --field-trial-handle=1912,i,14349448444568676048,10533298168135584716,131072 /prefetch:82⤵PID:1160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2980 --field-trial-handle=1912,i,14349448444568676048,10533298168135584716,131072 /prefetch:12⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2988 --field-trial-handle=1912,i,14349448444568676048,10533298168135584716,131072 /prefetch:12⤵PID:748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4212 --field-trial-handle=1912,i,14349448444568676048,10533298168135584716,131072 /prefetch:12⤵PID:3096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4668 --field-trial-handle=1912,i,14349448444568676048,10533298168135584716,131072 /prefetch:82⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4084 --field-trial-handle=1912,i,14349448444568676048,10533298168135584716,131072 /prefetch:82⤵PID:1188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2000 --field-trial-handle=1912,i,14349448444568676048,10533298168135584716,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:740
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
504B
MD5c535324fe99b999f988fbc4a988d23b2
SHA16062d602c58c624e9a2b8ca5ff2216e0cb4261f8
SHA25698ba94ffa8e944406d4fd3681f84dd1a63fa7c61d6dd470e6b165bc29ca7aa21
SHA512f11d20e04d825b8619d361de27098aaadf1bf5664abe0190bd1eafd647348fc751f4853970d865f79aeaa5bf199821a99f46f25a3ce99dd1b7e3c476c1fa6fe6
-
Filesize
3KB
MD54f68009e42dc13ab6c1c0b3c282c2dc2
SHA1e56f41993d12ca74ce403e351d27aabcc08c7a21
SHA2563b4fb3215808b06e6b52b2b162eb5e8533cc515e6ebd6e60928f83adcd35753a
SHA512678fe5a3f639897a467c6239aa50127b3c9df23299c71523e068c8f7588fdfc58e4ebdad96aced33415435ca57d5e4dc150bec3db41631cc4634b775444c82fc
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5fc289fa21cf29fce068ea9efa21704ab
SHA1e51c1f831893085b2b0259d106ec46300848cbff
SHA25665a198fda7cd77f091166024fba581a7a883529847ac731d0b825dc0e7b89078
SHA51295d9917bd52baa1b4982526ce1ccf7c651545cb78400b53e2a2961883cda49ae6776bf858ee2c64c16c51cd48a8304f8f2971640c8caa67323d2cbe5d76b938a
-
Filesize
7KB
MD5349eb7cc4723c257e821bf90f43b9218
SHA18a24ef8f0d0cc7364b85f6f5f762821de3f466a3
SHA256ececc5e1bcd5fafb505bf6e083f672311389488f31583be98017bde47eea1edb
SHA5127df5c445a8a708932b5903d6a2ae9ba7421d8addfeaed9d65592cbabd31565dd2ca8393df68172c74df7846d6d0b1e75dfacfaaceee27d5df54f073aac97c633
-
Filesize
130KB
MD5e86bd19afa3746fe0c61aa4946ef5888
SHA1340577431c33196684558607cd2f714b30cc10c2
SHA256e2456d1b3a61e8c9266d73f731ba7dbd8dc1d4c66fbe66a18dc257e44de221d4
SHA5121750b9e56cb99d7c7f6d5a10f5a44eecb2769d65d6735fa12f64175e0afdb6c27dc9031c1ff73f304a062138ac1a3b279b1ee3eebac7baecc1474dd28aeefa2b