Overview
overview
7Static
static
1URLScan
urlscan
1https://restorecord....
windows10-1703-x64
6https://restorecord....
windows7-x64
1https://restorecord....
windows10-2004-x64
1https://restorecord....
windows11-21h2-x64
1https://restorecord....
android-10-x64
7https://restorecord....
android-11-x64
7https://restorecord....
android-13-x64
7https://restorecord....
android-9-x86
7https://restorecord....
macos-10.15-amd64
4https://restorecord....
debian-12-armhf
https://restorecord....
debian-12-mipsel
https://restorecord....
debian-9-armhf
https://restorecord....
debian-9-mips
https://restorecord....
debian-9-mipsel
https://restorecord....
ubuntu-18.04-amd64
3https://restorecord....
ubuntu-20.04-amd64
4https://restorecord....
ubuntu-22.04-amd64
1https://restorecord....
ubuntu-24.04-amd64
1Analysis
-
max time kernel
1045s -
max time network
1566s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29-05-2024 19:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://restorecord.com/verify/Terminator%20X
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://restorecord.com/verify/Terminator%20X
Resource
win7-20240508-en
Behavioral task
behavioral3
Sample
https://restorecord.com/verify/Terminator%20X
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
https://restorecord.com/verify/Terminator%20X
Resource
win11-20240426-en
Behavioral task
behavioral5
Sample
https://restorecord.com/verify/Terminator%20X
Resource
android-x64-20240514-en
Behavioral task
behavioral6
Sample
https://restorecord.com/verify/Terminator%20X
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral7
Sample
https://restorecord.com/verify/Terminator%20X
Resource
android-33-x64-arm64-20240514-en
Behavioral task
behavioral8
Sample
https://restorecord.com/verify/Terminator%20X
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral9
Sample
https://restorecord.com/verify/Terminator%20X
Resource
macos-20240410-en
Behavioral task
behavioral10
Sample
https://restorecord.com/verify/Terminator%20X
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral11
Sample
https://restorecord.com/verify/Terminator%20X
Resource
debian12-mipsel-20240221-en
Behavioral task
behavioral12
Sample
https://restorecord.com/verify/Terminator%20X
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral13
Sample
https://restorecord.com/verify/Terminator%20X
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral14
Sample
https://restorecord.com/verify/Terminator%20X
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral15
Sample
https://restorecord.com/verify/Terminator%20X
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral16
Sample
https://restorecord.com/verify/Terminator%20X
Resource
ubuntu2004-amd64-20240508-en
Behavioral task
behavioral17
Sample
https://restorecord.com/verify/Terminator%20X
Resource
ubuntu2204-amd64-20240522-en
Behavioral task
behavioral18
Sample
https://restorecord.com/verify/Terminator%20X
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
https://restorecord.com/verify/Terminator%20X
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exepid process 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
chrome.exepid process 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2176 wrote to memory of 2204 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2204 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2204 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2908 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2544 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2544 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 2544 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 3068 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 3068 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 3068 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 3068 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 3068 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 3068 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 3068 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 3068 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 3068 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 3068 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 3068 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 3068 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 3068 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 3068 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 3068 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 3068 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 3068 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 3068 2176 chrome.exe chrome.exe PID 2176 wrote to memory of 3068 2176 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://restorecord.com/verify/Terminator%20X1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6d49758,0x7fef6d49768,0x7fef6d497782⤵PID:2204
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1144 --field-trial-handle=1208,i,4360131526245862864,2355797775918834816,131072 /prefetch:22⤵PID:2908
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1208,i,4360131526245862864,2355797775918834816,131072 /prefetch:82⤵PID:2544
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1560 --field-trial-handle=1208,i,4360131526245862864,2355797775918834816,131072 /prefetch:82⤵PID:3068
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2176 --field-trial-handle=1208,i,4360131526245862864,2355797775918834816,131072 /prefetch:12⤵PID:3008
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2184 --field-trial-handle=1208,i,4360131526245862864,2355797775918834816,131072 /prefetch:12⤵PID:2564
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1452 --field-trial-handle=1208,i,4360131526245862864,2355797775918834816,131072 /prefetch:22⤵PID:1436
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3528 --field-trial-handle=1208,i,4360131526245862864,2355797775918834816,131072 /prefetch:82⤵PID:3052
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59e4dc7a1350798750d78a424e67e0b2d
SHA1ef6a4fe60abb628581bf81b1f7d8cf783c265915
SHA256c919299d850e94d34049070812ed7a5c0c49df31057032195df5c0337b48f366
SHA51293c98e052368d250a6955edf769fd398eb055e7788215f82f6a4c9911f8760702929c1ff00c6db2d3cf79e00a8140279425d0024c54a3107ad2e88eee50e4025
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD5ff11951e92674f63e3a754037ace75f7
SHA149582f73b47ffa5309d550830881af6c3483f5ef
SHA2568d42fc5640a949282c31bbd208c83af24819ce1214745190879c971c9042019e
SHA512129033619b9e69a5101fcf91edaa0d510f364a42060ba1a55469413d278913504188f176abe468162a7447ddab6f855830137f40753118989af02d85f30dfc56
-
Filesize
5KB
MD5298026b314849a05664f695f9183215b
SHA14135a3b0a04547f7e7bb8537bd2176677cfcfca1
SHA2563bf4ffcfc1964482f5527afcfb3782b4b39e9e608a2b3c44494801424bb4d671
SHA5125a55a671661c1fdba24ace2de6a95cb7f356d4de7fdd2a36f16ed36a0fb8498044b5ea4552362efaaf9b296125dcfcec9c94b5d41e33680d3c1b444fe795d2a3
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e