Analysis
-
max time kernel
1799s -
max time network
1687s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://stownrusis.com/s?ngMH
Resource
win10v2004-20240426-en
General
-
Target
https://stownrusis.com/s?ngMH
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133608996657140901" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 3900 chrome.exe 3900 chrome.exe 2336 chrome.exe 2336 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3900 wrote to memory of 2004 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 2004 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 624 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3732 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3732 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe PID 3900 wrote to memory of 3628 3900 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://stownrusis.com/s?ngMH1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffc8f6ab58,0x7fffc8f6ab68,0x7fffc8f6ab782⤵PID:2004
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1900,i,6326161078793297395,5523715211068046051,131072 /prefetch:22⤵PID:624
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1900,i,6326161078793297395,5523715211068046051,131072 /prefetch:82⤵PID:3732
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2192 --field-trial-handle=1900,i,6326161078793297395,5523715211068046051,131072 /prefetch:82⤵PID:3628
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1900,i,6326161078793297395,5523715211068046051,131072 /prefetch:12⤵PID:2828
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1900,i,6326161078793297395,5523715211068046051,131072 /prefetch:12⤵PID:4884
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4076 --field-trial-handle=1900,i,6326161078793297395,5523715211068046051,131072 /prefetch:12⤵PID:548
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4604 --field-trial-handle=1900,i,6326161078793297395,5523715211068046051,131072 /prefetch:82⤵PID:3364
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 --field-trial-handle=1900,i,6326161078793297395,5523715211068046051,131072 /prefetch:82⤵PID:4488
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4752 --field-trial-handle=1900,i,6326161078793297395,5523715211068046051,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD58e0913997d52b8b057707927d4ee1ec3
SHA186c7161a5901bb756bb8f950574a8cdc2eed9667
SHA256e4f73a50f05405cb96d58322cf975676e3bb0921c26f1006e3b8f4536ef7c90f
SHA512ec3e12012ebb680220bfd2ad101082624b583102048638feb4d5645d6fd20b21d9b00a338aeef2d36beb8496540d0d571e67f0dd9a4b6646d5f665d074612f58
-
Filesize
3KB
MD54e8668d0e9609c06768712771b148d0f
SHA18d5f0bf89fcaadb7011d273819f276950dc9f8ce
SHA2568a86094a25b549ab9be89aa6bfaca5dba6464fcb1c6c321087bb990f468c496c
SHA512f8165dd7d2fcd1aabc339ec1f0211f9ff1cb4ce069b939391ae134c8f4822b664f84ad389c8b88ae6a0ee961f534db9130fbf1554f03812a89843fa5090a4b1e
-
Filesize
3KB
MD5ccbbd0c8d7f531e8cd98d36984d1c8fd
SHA12fbb45dd039b08d34fcb9a5967573b94aede2e56
SHA2562b175e1fb47a8090f73f68d66cfd9e41664819a60180dc6ed3be19df421ad0fa
SHA512c29012316e4e4c93c11b69e326518c19c87851aee34483e035b034de7c20549e97d18813db06690551c29f5085116382d76376828bd3a678c4c2a953f2000d34
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD597e9d8896456d30a8fced8373e65b16d
SHA1289cbe579020cb3745ebe5d886a64d2789edbd04
SHA256c6538fe87ae03bfd08bff1cc79654e95741ecfb3b0386e513442ba02256a7f0d
SHA5121e894b6c32ace1278829eb2078c4bff1814b993ead59655942d8a6172da39a76934b620fa0143bd96b92696b5cc5132efaca9e7d654ed94db6c02cc0c44868b5
-
Filesize
7KB
MD5eaba1ff961240bc75ffaba74c8c322f4
SHA18e0daa9a0cf888534515405ff1d8f1aae520fe82
SHA25609a11399769cca5d857a9af2624a2df8cc8fc7c50434e0a1ee5f49e089425ecd
SHA512ae20b080fff1d033ba9d75bd3562a626493f656dea43697eb9bc13aa953b1c4f905175ba2a54878225b9b80dfe6984daed167b04f1c93880930d33d634fe7ce0
-
Filesize
130KB
MD561c3c4238f53c4c380761769e2ff74b3
SHA12e094783baa7f29f37d5265339bac70819df78e5
SHA256b86805de0b31b692de9c2ba6ecfad66c358050e1fcc6609c8ac36e831cca6af5
SHA512c8c8845c43d2182e3dabeaddb2f94e9a359102aa597c467f5614e716cf79466a769c637b8f7496ee9765c64c3ff0f7c9c951d878c10484dd2bdbd23a67b6b09a
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e