Analysis
-
max time kernel
49s -
max time network
50s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
21-05-2024 16:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ghostproject.fr/
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://ghostproject.fr/
Resource
win10v2004-20240426-en
General
-
Target
https://ghostproject.fr/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133607812128597509" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 588 chrome.exe 588 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 588 wrote to memory of 2596 588 chrome.exe chrome.exe PID 588 wrote to memory of 2596 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 1148 588 chrome.exe chrome.exe PID 588 wrote to memory of 2368 588 chrome.exe chrome.exe PID 588 wrote to memory of 2368 588 chrome.exe chrome.exe PID 588 wrote to memory of 4696 588 chrome.exe chrome.exe PID 588 wrote to memory of 4696 588 chrome.exe chrome.exe PID 588 wrote to memory of 4696 588 chrome.exe chrome.exe PID 588 wrote to memory of 4696 588 chrome.exe chrome.exe PID 588 wrote to memory of 4696 588 chrome.exe chrome.exe PID 588 wrote to memory of 4696 588 chrome.exe chrome.exe PID 588 wrote to memory of 4696 588 chrome.exe chrome.exe PID 588 wrote to memory of 4696 588 chrome.exe chrome.exe PID 588 wrote to memory of 4696 588 chrome.exe chrome.exe PID 588 wrote to memory of 4696 588 chrome.exe chrome.exe PID 588 wrote to memory of 4696 588 chrome.exe chrome.exe PID 588 wrote to memory of 4696 588 chrome.exe chrome.exe PID 588 wrote to memory of 4696 588 chrome.exe chrome.exe PID 588 wrote to memory of 4696 588 chrome.exe chrome.exe PID 588 wrote to memory of 4696 588 chrome.exe chrome.exe PID 588 wrote to memory of 4696 588 chrome.exe chrome.exe PID 588 wrote to memory of 4696 588 chrome.exe chrome.exe PID 588 wrote to memory of 4696 588 chrome.exe chrome.exe PID 588 wrote to memory of 4696 588 chrome.exe chrome.exe PID 588 wrote to memory of 4696 588 chrome.exe chrome.exe PID 588 wrote to memory of 4696 588 chrome.exe chrome.exe PID 588 wrote to memory of 4696 588 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ghostproject.fr/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffe349d9758,0x7ffe349d9768,0x7ffe349d97782⤵PID:2596
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1744,i,1908458851410557733,14517494036217580764,131072 /prefetch:22⤵PID:1148
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1972 --field-trial-handle=1744,i,1908458851410557733,14517494036217580764,131072 /prefetch:82⤵PID:2368
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2052 --field-trial-handle=1744,i,1908458851410557733,14517494036217580764,131072 /prefetch:82⤵PID:4696
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2792 --field-trial-handle=1744,i,1908458851410557733,14517494036217580764,131072 /prefetch:12⤵PID:3448
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2800 --field-trial-handle=1744,i,1908458851410557733,14517494036217580764,131072 /prefetch:12⤵PID:3384
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3704 --field-trial-handle=1744,i,1908458851410557733,14517494036217580764,131072 /prefetch:12⤵PID:4356
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4424 --field-trial-handle=1744,i,1908458851410557733,14517494036217580764,131072 /prefetch:82⤵PID:1592
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4592 --field-trial-handle=1744,i,1908458851410557733,14517494036217580764,131072 /prefetch:82⤵PID:3252
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3580 --field-trial-handle=1744,i,1908458851410557733,14517494036217580764,131072 /prefetch:12⤵PID:2516
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 --field-trial-handle=1744,i,1908458851410557733,14517494036217580764,131072 /prefetch:82⤵PID:3336
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 --field-trial-handle=1744,i,1908458851410557733,14517494036217580764,131072 /prefetch:82⤵PID:4852
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
864B
MD52951a343a6d0bee9c28ec24645a39ca4
SHA16b6de6a52e8d6598d43bf502968478c2dd916357
SHA256ef9068c120486380e27fd4dae37986ca07d0b23e667cf738a6bcd001be6d62a9
SHA512fc839fc01e027d14afbc64abb19a0413315a1293c1a296d2e509ab1deafb805f8aed877ac083ac8ea7a27474ce45cd9576676d5eae1a30175b0a70fb0161bc4d
-
Filesize
1018B
MD5654e19d3bf2b2016b8d8713ef1ae0c14
SHA124c23f52bbe9d579bd177196e029352318e66791
SHA256656dd0e666bdd4d3e670f9bc15c758be1bd938dc217ee028ecabff0e128fb7d4
SHA5123c0787e46f64d9586e99b716b013703abb89f597be3a136a6ce49b80ef875c04b2f4acdeb5b18d1ff79d723ff52c054cc79137e7f617ad8be4a56f52cf80d09d
-
Filesize
2KB
MD54f1a3001fa55babc06e6c4c533d4211f
SHA1c778ed64dcddeeae5393b75bf775b7a377accf20
SHA256b664f323c541d423edcceff57a05841c3dbd058bfe55b464db5bbebb20fd7601
SHA512675fdfbd1d131af1dc14aa5889866e4e3436e6c8577bb613be8c6ab519914af661fabb335f0a969ac1091ac363a1226c0b35c3197ea68aa44bd827fffee70b47
-
Filesize
6KB
MD5388227d954d261e69b68ac00259c83d0
SHA1e87f23ddba7a56e46a2cb53ed9817fd9e6764366
SHA256d9ed3e25bbc6cfe417c83a15b8a041660ca845e65d24b52f6d5fa8c5347dc059
SHA51234d4b89c0fa53e4049a1bb039903ee87a3e25e50ecd67a2562bdc36790960fa5244c360baaf837045c32da38346194f1bc17e891af6e3f20fb9f84123348c515
-
Filesize
5KB
MD53aed53063d602804c4249f9d6d8f5f28
SHA1751f57ea048d369210e7f3d219e03bcb17172d91
SHA256afaa8856291c7ff02ff3220c3a707a86dc0c175f4072f42855cc0d2a841163ae
SHA512eecf13c641805d21f78202a1563bb7060819ebff67f9d4df8f1223829a538d3a07a6615b8e90e6b856ded355d4443ac22268d04fcf069b5a67f80ed3823e6baa
-
Filesize
6KB
MD5ef840fa1b2b691fb0c6baa9751428ec8
SHA1f600fd2f4cdbfcd49560a301f95e0e3ac5cd6bbb
SHA256aaedf68aa7c1b5a87f5a6a3888c32116501920848802d89c953e331299c9e19d
SHA51293bbe55beb84b8a86a8380f9f43041fb1fe042794b2275efaee7417167ef277b38bb07801871ff7c83b2b10f943ff6e55a36b584fbca11ab9089c72059e83558
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe57760b.TMP
Filesize120B
MD54421645527372676b4da7e8212a1dd8a
SHA1c615d12f993b460dc04fb6402d504d1a86beadea
SHA256676cb864df239a1863c714b57338fc46d6111e9c837c85d53660195c78ae94f4
SHA512ae6ce644c74b472e9b3286a00c6974943ecc122b8a1371ade2420cf0ce0bba3da917c321a3213a885fe93e3f75743243fb5ff64e44eec01c4f921f575be15280
-
Filesize
136KB
MD5db58fc285c328e765eee75051374d183
SHA12212b4e92f0b08c60102fa58eccd718e60fa8239
SHA256a78b84bc1644a9a34a202a71921d224e08e3adc68869baf98431196d70711ead
SHA512c012ca7b406d5482835e897b9a2f8da9749a2974de18ff990ac10e1e9a8f2222eb089e03c3a739d76ac538b44e54a8174b6168d7f30348ca6d1047cfa9508d06
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e