Overview
overview
7Static
static
1URLScan
urlscan
1https://myip.wtf
windows7-x64
6https://myip.wtf
windows10-1703-x64
6https://myip.wtf
windows10-2004-x64
6https://myip.wtf
windows11-21h2-x64
6https://myip.wtf
android-10-x64
7https://myip.wtf
android-11-x64
7https://myip.wtf
android-13-x64
7https://myip.wtf
android-9-x86
7https://myip.wtf
macos-10.15-amd64
4https://myip.wtf
debian-12-armhf
https://myip.wtf
debian-12-mipsel
https://myip.wtf
debian-9-armhf
https://myip.wtf
debian-9-mips
https://myip.wtf
debian-9-mipsel
https://myip.wtf
ubuntu-18.04-amd64
3https://myip.wtf
ubuntu-20.04-amd64
6https://myip.wtf
ubuntu-22.04-amd64
1Analysis
-
max time kernel
70s -
max time network
70s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
22-05-2024 20:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://myip.wtf
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
https://myip.wtf
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
https://myip.wtf
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
https://myip.wtf
Resource
win11-20240426-en
Behavioral task
behavioral5
Sample
https://myip.wtf
Resource
android-x64-20240514-en
Behavioral task
behavioral6
Sample
https://myip.wtf
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral7
Sample
https://myip.wtf
Resource
android-33-x64-arm64-20240514-en
Behavioral task
behavioral8
Sample
https://myip.wtf
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral9
Sample
https://myip.wtf
Resource
macos-20240410-en
Behavioral task
behavioral10
Sample
https://myip.wtf
Resource
debian12-armhf-20240418-en
Behavioral task
behavioral11
Sample
https://myip.wtf
Resource
debian12-mipsel-20240221-en
Behavioral task
behavioral12
Sample
https://myip.wtf
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral13
Sample
https://myip.wtf
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral14
Sample
https://myip.wtf
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral15
Sample
https://myip.wtf
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral16
Sample
https://myip.wtf
Resource
ubuntu2004-amd64-20240508-en
Behavioral task
behavioral17
Sample
https://myip.wtf
Resource
ubuntu2204-amd64-20240522.1-en
General
-
Target
https://myip.wtf
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 wtfismyip.com -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133608820709693161" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 2272 chrome.exe 2272 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 2272 chrome.exe 2272 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2272 wrote to memory of 2240 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 2240 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4580 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 2596 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 2596 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4552 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4552 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4552 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4552 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4552 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4552 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4552 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4552 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4552 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4552 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4552 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4552 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4552 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4552 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4552 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4552 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4552 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4552 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4552 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4552 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4552 2272 chrome.exe chrome.exe PID 2272 wrote to memory of 4552 2272 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://myip.wtf1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffaa7d89758,0x7ffaa7d89768,0x7ffaa7d897782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1524 --field-trial-handle=1756,i,247237888072138593,1326084130604512768,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1988 --field-trial-handle=1756,i,247237888072138593,1326084130604512768,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2064 --field-trial-handle=1756,i,247237888072138593,1326084130604512768,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2936 --field-trial-handle=1756,i,247237888072138593,1326084130604512768,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2956 --field-trial-handle=1756,i,247237888072138593,1326084130604512768,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4660 --field-trial-handle=1756,i,247237888072138593,1326084130604512768,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4428 --field-trial-handle=1756,i,247237888072138593,1326084130604512768,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
550B
MD5618efc7dd1b3f2417950c4c54e966ae9
SHA150b69c9721fa74dd3a1e78b0321f3d97ae7fd028
SHA256e1fcba8d09a76fde08d7bc09737fea6a99ac6832c19d038798bd1532805df644
SHA512a8e5f28ca2d6bc116393fbf15965096dbe5ff719ab441ffdfed2f84d0ae7136f38414cf3f2bc19d759b93ea51c2db3d8e6dfcf3402651ea7ecbe38eab13c6fdf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
536B
MD5605ebd5f295ac5dd40f61c58f35e7239
SHA1a4f389c3c9fc5747086f44828f68563f0208a3df
SHA2563be9257aa5211eb793983fe52e4b57c7fdde5c04b04d96694c0cd3cfcf3470a0
SHA5122ab9dc8341d05eff9c8ceda5f15b1613561198d34764aa64989cf4738bba0b51c0fa59d51215bce8bde1601911bd5846de64ef10b2949dbf2f581dea56712e57
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5f6af51fc9bef0cdab91b6e6696c0faca
SHA13e0ec9483a49a438a1212d331f001ef03e318eea
SHA256fcb49e397ed2d16983c16d1d2ee57e6d6a2c2b10dcb556351b887397788b2ad1
SHA5122c207fab9ba27de3b0d366e194e71b5060242c64e18ffb525929b44c02e8c8cb14fd27cfd725c61bf7b61acebedb5d5d23a4d322b2fc8d84313f87ab4d42ddd2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5b88624a587745995f3ce218286943560
SHA1e2f82577413397d03db1488442a86d2e0f996e74
SHA25683e6a074c4de2c6153ff75bf9b36920eb0fa25758167410494eee8ffe5079004
SHA5128b4f972d9a10dcafd025e19bbe804db13fcbee20dc4ec7ffe279cfbf08a62f54261bbd78ca6add2370f5a33fae3b358bfdeefe24f551bc2578f5fb40cb1b99c1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD578beb10f1c1a73f6bb9a8537498beb2a
SHA11a7400c64c6145f809b01c40e502cfeb5b890304
SHA256fc0ad462d534014b293adf18f3a349a83d7bf9ddfd6d1442a74466ce865ab0d0
SHA5124b6ea493bbe5c87c44573349a00fb308b7be06cd9535aad7ffb4a79729cec75962cf35402a80685ebda8cd002f0fb8cc64e5e20407c93fcc37293cab9a4f67d2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
136KB
MD51f3e87193fc4f185c634f888f78d4eaf
SHA17c76de4cad398518ee3f24921119e964322352b9
SHA25648bd868f696091dc676caa19f9c5f7bacb50aecfe46136467361d7a148a4569e
SHA5124df5bc55affd7c1185b91e288f09f30b99d5860c94f96b694d2ff5a49ded989dff7857661bc19881bcb1da9d68e40441321ed060a0f0b7f6bfddbc3e1e93ebdc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_2272_MKOBFJWQTJVEDPDXMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e