Analysis
-
max time kernel
149s -
max time network
135s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
21-05-2024 15:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://proqnoz.vcot.info
Resource
win10-20240404-en
General
-
Target
https://proqnoz.vcot.info
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133607778577710072" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 4092 chrome.exe 4092 chrome.exe 96 chrome.exe 96 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
chrome.exepid process 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4092 wrote to memory of 1296 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1296 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 4652 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 3196 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 3196 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1872 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1872 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1872 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1872 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1872 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1872 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1872 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1872 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1872 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1872 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1872 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1872 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1872 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1872 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1872 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1872 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1872 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1872 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1872 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1872 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1872 4092 chrome.exe chrome.exe PID 4092 wrote to memory of 1872 4092 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://proqnoz.vcot.info1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffa67369758,0x7ffa67369768,0x7ffa673697782⤵PID:1296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1812,i,3005056269115760272,8875342616867170575,131072 /prefetch:22⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1792 --field-trial-handle=1812,i,3005056269115760272,8875342616867170575,131072 /prefetch:82⤵PID:3196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2064 --field-trial-handle=1812,i,3005056269115760272,8875342616867170575,131072 /prefetch:82⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2868 --field-trial-handle=1812,i,3005056269115760272,8875342616867170575,131072 /prefetch:12⤵PID:1964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2876 --field-trial-handle=1812,i,3005056269115760272,8875342616867170575,131072 /prefetch:12⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3812 --field-trial-handle=1812,i,3005056269115760272,8875342616867170575,131072 /prefetch:12⤵PID:796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4016 --field-trial-handle=1812,i,3005056269115760272,8875342616867170575,131072 /prefetch:12⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4264 --field-trial-handle=1812,i,3005056269115760272,8875342616867170575,131072 /prefetch:82⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4264 --field-trial-handle=1812,i,3005056269115760272,8875342616867170575,131072 /prefetch:82⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3756 --field-trial-handle=1812,i,3005056269115760272,8875342616867170575,131072 /prefetch:12⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1676 --field-trial-handle=1812,i,3005056269115760272,8875342616867170575,131072 /prefetch:12⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3148 --field-trial-handle=1812,i,3005056269115760272,8875342616867170575,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:96
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD50b4939f728750eebce993d800c21ca26
SHA198178cefcdac57edfcaef550fab3655d0135ff4f
SHA2567fe054b348ba5969db7f6d7473d148762599691bf264e2c913ec5c7bcae027f4
SHA512ba6d862ca3fea14841587091bd9baeee3c6c6fbf642a76065791bb37c5d8160a4e1ca79fb68a3eb5133e69ec4a78c4bab43d269fa9f0ee5db233dea25849f3fe
-
Filesize
6KB
MD5317a2563506f6d63d29d40fdf0ec6300
SHA13b2c5821322be33767f44f50f68846fa87a1b7a2
SHA25675ca5ba4aac3e1bf3098ebbce70fe656f1ba9f2f1ad0ffe788b20040665fad2a
SHA51245ea41e4f7917994fabb23a2c15ace8866218003b0d128b5039d869629d2e72ddf991c146709aff59530313a72c358568888af28438cf627e0ef74b28156ff54
-
Filesize
6KB
MD5fda215bcaab505588cf6523ae76f4a9a
SHA1f7654c7cb52a0d73de182f863eaac4cfd951007a
SHA2560fd5ed3b6fbc60609ce95102e24049fba9e7140cc0de509ce950f9a695a76851
SHA51243114ff2cac42d883f4d0a9a8b0fd817bcd4b4bd6cf4a698e3306cbdd85ecc05d32e1b8e0e00c4fa9c53a94695a063fe28694107c83ca7da6cc6b4ad758eb1ab
-
Filesize
6KB
MD52560ad040d461736dd370a409b171559
SHA12c235a1dafa475bca740d78878d53ad960e4ba0a
SHA256dfa293ad432111111c4e44e5cbc3116727285523848cb0a3c3ce6546222000b8
SHA512a5010368b4a4b2596eedc395980d17ed5ce648b73222c742f8b82f157b04c6b9ef1b07659d4328e9dd823dd6c4100a9165d8dac1bcdfab7445373b6d593bcc65
-
Filesize
136KB
MD51feebd55d46719487493a6cb44a5a7d0
SHA191f7c6dfdfb91f0f9e4405c6f67cf90b96521751
SHA256cf5fc6e29404f65aca70d65521f0c4187fc94b421b62d11a1dbf3bfcb7b97c40
SHA512f029c5c9c669c67cf0715ef843da324c512dfeda188e96aceae4ea99e1b548c64d205d2cc791af4586e70037eafa9204aac8766dc283556e23b280e12004190d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e