Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/05/2024, 18:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://URLs http://www.tbgtmi.erdtaea.com/
Resource
win11-20240508-en
General
-
Target
http://URLs http://www.tbgtmi.erdtaea.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133613933951497671" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4320 chrome.exe 4320 chrome.exe 4424 chrome.exe 4424 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe Token: SeShutdownPrivilege 4320 chrome.exe Token: SeCreatePagefilePrivilege 4320 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe 4320 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4320 wrote to memory of 4852 4320 chrome.exe 80 PID 4320 wrote to memory of 4852 4320 chrome.exe 80 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 4476 4320 chrome.exe 81 PID 4320 wrote to memory of 1180 4320 chrome.exe 82 PID 4320 wrote to memory of 1180 4320 chrome.exe 82 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83 PID 4320 wrote to memory of 956 4320 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://URLs http://www.tbgtmi.erdtaea.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd9e8fab58,0x7ffd9e8fab68,0x7ffd9e8fab782⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1780,i,980055391926276518,12475265856620282985,131072 /prefetch:22⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1780,i,980055391926276518,12475265856620282985,131072 /prefetch:82⤵PID:1180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2108 --field-trial-handle=1780,i,980055391926276518,12475265856620282985,131072 /prefetch:82⤵PID:956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1780,i,980055391926276518,12475265856620282985,131072 /prefetch:12⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3056 --field-trial-handle=1780,i,980055391926276518,12475265856620282985,131072 /prefetch:12⤵PID:784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3964 --field-trial-handle=1780,i,980055391926276518,12475265856620282985,131072 /prefetch:12⤵PID:3644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3280 --field-trial-handle=1780,i,980055391926276518,12475265856620282985,131072 /prefetch:12⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3056 --field-trial-handle=1780,i,980055391926276518,12475265856620282985,131072 /prefetch:82⤵PID:3636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4548 --field-trial-handle=1780,i,980055391926276518,12475265856620282985,131072 /prefetch:82⤵PID:228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4000 --field-trial-handle=1780,i,980055391926276518,12475265856620282985,131072 /prefetch:12⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2272 --field-trial-handle=1780,i,980055391926276518,12475265856620282985,131072 /prefetch:12⤵PID:2840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=1588 --field-trial-handle=1780,i,980055391926276518,12475265856620282985,131072 /prefetch:12⤵PID:668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4556 --field-trial-handle=1780,i,980055391926276518,12475265856620282985,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4424
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c3a0d2d91069d20101ab7634d1a48092
SHA15244272f330d0655449c6cc5d8fe6f9131cc888d
SHA25612f1027c2fa738620700d1ebcb7561560c6f782eb5497b5570054a30c149dc88
SHA512a47b22eacd3286b77e4ae64e584c0f2c46b2720c8f7debd5e77d8039828957b1dfdf34e88b94ec45647597db597a0c421b4e2687fef5eab3b960c31843f99b70
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD563ab5506d6b03e6d8c420db7d145793d
SHA173501e7bdd6388ceb33c8d09186fc7de9abffe05
SHA256de25be3c9fbb0fad832cb68bafaa996b0cd0b5482c4104d5883626c32a3636b1
SHA5120f652105646a954601712f3dc2691451799c1fae48f86616f8ae398ecf503bf703f127392fe00e5c1adb22f724b0141f031fe4ab8e14f5ed6162035480afe5e7
-
Filesize
129KB
MD546e18e6311c1a3344dac591a60a21b01
SHA11842d9facdc47bca7a55f9a45abaedb07ad1e8a9
SHA256f80ae27e1deca18359b10a5afe67926e47be166c073df90004c094b7e48ad5a7
SHA51225672d27dc44c99c326ca3e32487abc86afe6054d841902fc7d9226b4e78b92087fca841b76a967368cbc99e24dc71df93b3084c2d147a9e63cc65d4724600ab