Analysis
-
max time kernel
30s -
max time network
17s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
21-05-2024 19:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://news-cnn.net
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
http://news-cnn.net
Resource
win7-20240508-en
General
-
Target
http://news-cnn.net
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133607927707767669" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 1912 chrome.exe 1912 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
Processes:
chrome.exepid process 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe -
Suspicious use of AdjustPrivilegeToken 60 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1912 wrote to memory of 440 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 440 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 1204 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 2052 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 2052 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 4932 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 4932 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 4932 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 4932 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 4932 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 4932 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 4932 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 4932 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 4932 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 4932 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 4932 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 4932 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 4932 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 4932 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 4932 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 4932 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 4932 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 4932 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 4932 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 4932 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 4932 1912 chrome.exe chrome.exe PID 1912 wrote to memory of 4932 1912 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://news-cnn.net1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff865859758,0x7ff865859768,0x7ff8658597782⤵PID:440
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1536 --field-trial-handle=1844,i,10082232561299888513,4514239992405779054,131072 /prefetch:22⤵PID:1204
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1792 --field-trial-handle=1844,i,10082232561299888513,4514239992405779054,131072 /prefetch:82⤵PID:2052
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2060 --field-trial-handle=1844,i,10082232561299888513,4514239992405779054,131072 /prefetch:82⤵PID:4932
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2600 --field-trial-handle=1844,i,10082232561299888513,4514239992405779054,131072 /prefetch:12⤵PID:3596
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2608 --field-trial-handle=1844,i,10082232561299888513,4514239992405779054,131072 /prefetch:12⤵PID:3336
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4288 --field-trial-handle=1844,i,10082232561299888513,4514239992405779054,131072 /prefetch:12⤵PID:3724
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3680 --field-trial-handle=1844,i,10082232561299888513,4514239992405779054,131072 /prefetch:12⤵PID:1552
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 --field-trial-handle=1844,i,10082232561299888513,4514239992405779054,131072 /prefetch:82⤵PID:4276
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4636 --field-trial-handle=1844,i,10082232561299888513,4514239992405779054,131072 /prefetch:82⤵PID:4736
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5432 --field-trial-handle=1844,i,10082232561299888513,4514239992405779054,131072 /prefetch:12⤵PID:4980
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD58086af560b40bad458be2227e7a4740e
SHA1678a031d2db56c2b8df62b2e90958dbe37d714c3
SHA256a501f121b97229fa51183002c80b32f93f54c5bb28316cac7aec99258df57366
SHA512cc01b9e22b2620327b288cd9d0555f4df053c2917a8898ee1212a5d3ca6741107e2f831a93b3722eddcb0bdb6586b0b98b1d50f2f792d3a44010f62f4d722796
-
Filesize
192B
MD5af2694541e5c3ed8dd49bbec57b79a07
SHA1f4f8b7f81304f1c3c7ae1493f42f5b74e2bcd7e6
SHA2563bc6da780402c71b8ca8426d6bf1965bc81290aeefd4d054f159b558f1e63991
SHA5123b9bc4e5ce2a714f79672759e0b9540ebbdc1d199c4d5eae8b416b64a910ecfb189fa2d51ac24a5c8a3ac13a10c13cdf5f3ced8bccc153f4dde66b9663a97c11
-
Filesize
874B
MD59446860c765eb17a5e5f3b3329a9d1a2
SHA1ec249d43ddd75f1dfc36a4f645d32aea6a1bc522
SHA2562da911f87667a3ea9c65c87b7789a90c390c7bc1a68fca86421b09a9ebca202c
SHA512f791feb561c05c08237a70fb265d742b5d9efecb13cc57fd57f593ffc5f151ea98f24f549dcb105231238094a16ee90c34f5e19d41d82eef840a31ff792262a9
-
Filesize
6KB
MD5d97c6c7c67de61e1a204d74138c3576e
SHA1cbbed7150e888acc73b99a3159341f8f3e499041
SHA256bf1515dfcbc7a7c9219877a15bd39793c5477aa98570c00f3c2bae78b9b261e3
SHA51221d0f143cbc1c266d16fcd4411773070af8e709cba4918ec648a836a7fd695c5e0c4ace8cc439566701cf1da93067b83afeb14cfcdf1cb45f24dadf611e992e4
-
Filesize
136KB
MD5bcf29c7124f0dfa1be3b86ffd8ead8fe
SHA100226195b82486637c34787828eb894ed2181a33
SHA256a758df96a59a090279562bed05b0e0ddc4a93c00c859cdb40402bc3175225976
SHA512feea4275eba4e8d20cb866462c5478cb8074966a17d320a6bb5af7c670707e72cdd25c7f8c4831c58e5093a26be22955f6cffae95b4941895cd1c823cb2bd484
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e