Analysis
-
max time kernel
599s -
max time network
542s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-05-2024 14:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://downloads.mamp.info/download.php?file=/MAMP-PRO-WINDOWS/releases/5.0.6/phpx64/php7.2.34.zip
Resource
win11-20240426-en
General
-
Target
http://downloads.mamp.info/download.php?file=/MAMP-PRO-WINDOWS/releases/5.0.6/phpx64/php7.2.34.zip
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133607762898703808" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 5012 chrome.exe 5012 chrome.exe 1888 chrome.exe 1888 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
chrome.exepid process 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe Token: SeShutdownPrivilege 5012 chrome.exe Token: SeCreatePagefilePrivilege 5012 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
chrome.exepid process 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe 5012 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 5012 wrote to memory of 3520 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3520 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 3768 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 4464 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 4464 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe PID 5012 wrote to memory of 2080 5012 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://downloads.mamp.info/download.php?file=/MAMP-PRO-WINDOWS/releases/5.0.6/phpx64/php7.2.34.zip1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe3045ab58,0x7ffe3045ab68,0x7ffe3045ab782⤵PID:3520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1704,i,12672913116957512985,9678681379204315003,131072 /prefetch:22⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2072 --field-trial-handle=1704,i,12672913116957512985,9678681379204315003,131072 /prefetch:82⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2120 --field-trial-handle=1704,i,12672913116957512985,9678681379204315003,131072 /prefetch:82⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2884 --field-trial-handle=1704,i,12672913116957512985,9678681379204315003,131072 /prefetch:12⤵PID:4628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2892 --field-trial-handle=1704,i,12672913116957512985,9678681379204315003,131072 /prefetch:12⤵PID:920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4304 --field-trial-handle=1704,i,12672913116957512985,9678681379204315003,131072 /prefetch:82⤵PID:1064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4572 --field-trial-handle=1704,i,12672913116957512985,9678681379204315003,131072 /prefetch:82⤵PID:3236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4564 --field-trial-handle=1704,i,12672913116957512985,9678681379204315003,131072 /prefetch:12⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3176 --field-trial-handle=1704,i,12672913116957512985,9678681379204315003,131072 /prefetch:12⤵PID:3532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4476 --field-trial-handle=1704,i,12672913116957512985,9678681379204315003,131072 /prefetch:12⤵PID:880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3436 --field-trial-handle=1704,i,12672913116957512985,9678681379204315003,131072 /prefetch:12⤵PID:2496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3192 --field-trial-handle=1704,i,12672913116957512985,9678681379204315003,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3908 --field-trial-handle=1704,i,12672913116957512985,9678681379204315003,131072 /prefetch:12⤵PID:1200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4608 --field-trial-handle=1704,i,12672913116957512985,9678681379204315003,131072 /prefetch:12⤵PID:1936
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c85b7d4def090813e93327cc23edf460
SHA1f859fa08a5a206f8d76db716bbf01aaa840b3f84
SHA25686fc4a929d0907d4ac5f618431e58cb448b6986919b799017af2dfe46998de70
SHA5124250d9b319562dfaa17fc01f4bc3864332289c581628ff29ed9b4252a12d245efc24cdefd3aee55a3e7e5cacd9d8f115725ca6080995fc5e0cbaa965745dad1b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD55b8090171eb6d19864224379d52f8460
SHA1e3df124f941549d8ecfea88e2820984e520e6d0f
SHA25682eef7b897cd11711658aa334f4cda6b013c1e7117651b36b94f2a5fc3b86247
SHA512d147bec5527b8560de1ef787b4bd2dba5f56dfa016df81c29bf61a3c45c35a9c49747fd2c1d7f62de26f29aa40d6974b92c3971588278a45bd068f79e0325a7d
-
Filesize
256KB
MD59c9d55bb0ba383f1bd4788bda464b71e
SHA1df2d885c6dc6ea28d213fb17cbd8aeb4ed1200dd
SHA256af52c2d413f60c3d06bb70e3050a65b7ff6dd00166d05a979d9eac5ff75779cc
SHA5122a0a952da45aecf595e47eb50ac40d17f88df58269c62bbb71c7061e818d85376251f9bf969084d3188ee943576c643ccd497359bdf761700d503ea46aa094ab
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e