Analysis
-
max time kernel
1799s -
max time network
1687s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-05-2024 18:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/coltonk9043/Aoba-MC-Hacked-Client
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://github.com/coltonk9043/Aoba-MC-Hacked-Client
Resource
win11-20240508-en
General
-
Target
https://github.com/coltonk9043/Aoba-MC-Hacked-Client
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133613107689850871" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3096 chrome.exe 3096 chrome.exe 1516 chrome.exe 1516 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3096 chrome.exe 3096 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3096 wrote to memory of 2904 3096 chrome.exe 79 PID 3096 wrote to memory of 2904 3096 chrome.exe 79 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 1124 3096 chrome.exe 81 PID 3096 wrote to memory of 4776 3096 chrome.exe 82 PID 3096 wrote to memory of 4776 3096 chrome.exe 82 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83 PID 3096 wrote to memory of 2960 3096 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/coltonk9043/Aoba-MC-Hacked-Client1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa636dab58,0x7ffa636dab68,0x7ffa636dab782⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1516 --field-trial-handle=1896,i,6226910085493305373,14229795479188936769,131072 /prefetch:22⤵PID:1124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1844 --field-trial-handle=1896,i,6226910085493305373,14229795479188936769,131072 /prefetch:82⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2176 --field-trial-handle=1896,i,6226910085493305373,14229795479188936769,131072 /prefetch:82⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1896,i,6226910085493305373,14229795479188936769,131072 /prefetch:12⤵PID:784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3040 --field-trial-handle=1896,i,6226910085493305373,14229795479188936769,131072 /prefetch:12⤵PID:3824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4320 --field-trial-handle=1896,i,6226910085493305373,14229795479188936769,131072 /prefetch:82⤵PID:792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4468 --field-trial-handle=1896,i,6226910085493305373,14229795479188936769,131072 /prefetch:82⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1692 --field-trial-handle=1896,i,6226910085493305373,14229795479188936769,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1516
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59759ef1ea1fabc8c07e34df5e6127322
SHA140163dd5f0f2492ae97a92fc881647323a7a39e4
SHA25659710af86e79c18c2f4a7493c332da8efffc2cf20a043a24f3439ad36191ff63
SHA512bc2efa7c04935746d161000140a09a7ea528dd0da3fd8469dd5ac6c4eeff7332022975c3461cd8133d2468d3a81e3fd99293086fcf60f4e8a4de350df84041df
-
Filesize
2KB
MD5fad7954c3e86ca51cffa88b1b528dc47
SHA14a4826eee012635829f1edd9466bed4c9840dd09
SHA256b6382b726721e0a82a4df2f859e53ecd872d8c3c27d23ce229fd86fee50bfe99
SHA512234cd34467272d4dca6b75d7132563e97342dbcb1b9188dda81636e95290806f99e9bfa20f2fcfc3a398e2d2658f9b68ded13e64c01b8170148f24b0d3e6b722
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5f7479d59da917efed30ed0a48086422f
SHA101e33fc8e5cd94ce4f39b5ba2d97554757a781be
SHA25678d7003a03738417575e418875a84aeb799da6caf2564ed915077214192ad204
SHA512a9c13ccc32aa1f6f67f97dc575ac5441fed64a0c20fe75b90c593d8e0f1a92ee7a66aaa9aadd52c1a0cc720674d65fabf9bd9dafe742c6e05e8bc424f76ed862
-
Filesize
7KB
MD50f8b3c9974ffd59c2e5fce40670225b3
SHA157063bbb290e312b45473dece01487812f0b651e
SHA2565660914ae5bd0262b8244124eb86ca7356d63bf74d51701565e149ead305a03e
SHA5123a1a2d2b6b5a48274b2c9f7f16581dbf8489bdde7b7f35a2795c34483d155be13cd85445bcafef179d83d82304bc020f3dcf9cd7f21f50425038e6d78a2c2b6a
-
Filesize
129KB
MD5aa74521c39cd598c4fa6841f9b1d86fd
SHA1ff38663026f736e702761e04aa7174d4e111b6a4
SHA256a3a611f879b82d649901a4a49c927981f5e93a76ecc3a2aed4791ab08e0243f3
SHA5124a2f874e7a26d641c47d3f43e7d523b696f10925bec75e5a4f360fb8983ef50a4de4bc206c375e60b61ba6b71eb92c95ee75c36115051ac4c9355cd54f98fc5f