Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
30-05-2024 16:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ghs.soundestlink.com/
Resource
win10-20240404-en
General
-
Target
http://ghs.soundestlink.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133615617153829923" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2752 chrome.exe 2752 chrome.exe 1132 chrome.exe 1132 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe Token: SeShutdownPrivilege 2752 chrome.exe Token: SeCreatePagefilePrivilege 2752 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe 2752 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2752 wrote to memory of 1464 2752 chrome.exe 73 PID 2752 wrote to memory of 1464 2752 chrome.exe 73 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 2228 2752 chrome.exe 75 PID 2752 wrote to memory of 924 2752 chrome.exe 76 PID 2752 wrote to memory of 924 2752 chrome.exe 76 PID 2752 wrote to memory of 3696 2752 chrome.exe 77 PID 2752 wrote to memory of 3696 2752 chrome.exe 77 PID 2752 wrote to memory of 3696 2752 chrome.exe 77 PID 2752 wrote to memory of 3696 2752 chrome.exe 77 PID 2752 wrote to memory of 3696 2752 chrome.exe 77 PID 2752 wrote to memory of 3696 2752 chrome.exe 77 PID 2752 wrote to memory of 3696 2752 chrome.exe 77 PID 2752 wrote to memory of 3696 2752 chrome.exe 77 PID 2752 wrote to memory of 3696 2752 chrome.exe 77 PID 2752 wrote to memory of 3696 2752 chrome.exe 77 PID 2752 wrote to memory of 3696 2752 chrome.exe 77 PID 2752 wrote to memory of 3696 2752 chrome.exe 77 PID 2752 wrote to memory of 3696 2752 chrome.exe 77 PID 2752 wrote to memory of 3696 2752 chrome.exe 77 PID 2752 wrote to memory of 3696 2752 chrome.exe 77 PID 2752 wrote to memory of 3696 2752 chrome.exe 77 PID 2752 wrote to memory of 3696 2752 chrome.exe 77 PID 2752 wrote to memory of 3696 2752 chrome.exe 77 PID 2752 wrote to memory of 3696 2752 chrome.exe 77 PID 2752 wrote to memory of 3696 2752 chrome.exe 77 PID 2752 wrote to memory of 3696 2752 chrome.exe 77 PID 2752 wrote to memory of 3696 2752 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://ghs.soundestlink.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fffe2289758,0x7fffe2289768,0x7fffe22897782⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1840,i,3372980160976421923,8422331448921296866,131072 /prefetch:22⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1772 --field-trial-handle=1840,i,3372980160976421923,8422331448921296866,131072 /prefetch:82⤵PID:924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2076 --field-trial-handle=1840,i,3372980160976421923,8422331448921296866,131072 /prefetch:82⤵PID:3696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2680 --field-trial-handle=1840,i,3372980160976421923,8422331448921296866,131072 /prefetch:12⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2700 --field-trial-handle=1840,i,3372980160976421923,8422331448921296866,131072 /prefetch:12⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4504 --field-trial-handle=1840,i,3372980160976421923,8422331448921296866,131072 /prefetch:12⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 --field-trial-handle=1840,i,3372980160976421923,8422331448921296866,131072 /prefetch:82⤵PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4892 --field-trial-handle=1840,i,3372980160976421923,8422331448921296866,131072 /prefetch:82⤵PID:1196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2008 --field-trial-handle=1840,i,3372980160976421923,8422331448921296866,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1132
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
902B
MD5e2208118c49974b6a800c0cd7bfebf12
SHA12fd92edae06da2adc96374126a00ac9770aebb64
SHA256818942ec4ec4eac2149fa7836ea1e2761fe67722f6cd1d6fa708fa03b033fe41
SHA5121ae3f35283deb0d873c2130903c99f8923c03aff181279c5c8f2c21c9bd0c5460ccc50acf1daf41ecdbe20f3a59e8459723c66a784ee0ff30a7c1070c2d52e69
-
Filesize
707B
MD54cd3427531d63bea3206fbb6088fcea7
SHA12450d0a4d4da8b78455c1822b6a6f93dc1912bb8
SHA25648947bbd4c4ca39ef701bd52c5030ef71c669e3e3b13156a3886c412a8134e58
SHA5123e8dbf05d7b0588b5b1afabd295fe3e1f799c3db5d7e087dcc1c4859dfa62bd2ece7f7b2f7373c6ab760c64ce8355912a08fae1d5c2360a6cb306d2953fcdda3
-
Filesize
6KB
MD51a65e82c89a01dae73a1e84d41c32829
SHA1d0025864ea83e096b41bfca300e25c3f48fffb01
SHA2563ab261ad0c3c67a4a7422bef0b67064810cfc9c175d69b58473cd816c60694c5
SHA5125d982891a632a5a1260261054b04e9a9726ee3071532d454798290165e111819b888725926622d4503cd373ee4a91864e8fcfcb4587e79fda9ab3dc11f2d197d
-
Filesize
6KB
MD5d6446e435391fb41a24f823694d28cfa
SHA19fb66d1abe365fd4203196f555d1b6fd50d29656
SHA256477ec3f93de158cdfaf362f06f531d8691304a71d0ea6a5bbabbef8157ada0b2
SHA512841b7459487c72b91df2032970db58e68a35869040217e246fce2a1ce7910aba39c0a14e82b908a755b545535cece43bf885fb4cfd17b9a885e0286763d92cf4
-
Filesize
6KB
MD540afa3f44e2d49f2bf046b30f08dbc3b
SHA1e6370ed669123ff680115f77c30d00ff31dc9201
SHA2563e2ac6f489169857454f5234bf13d744673e42057668144c6a8dc1e61b044de8
SHA5126d80224b1f72280bfaa2d44c7c9a90db119b2e32691966962081c4a09e0e69ee884a2bb272101350cbdb2969d62699c8b8c86478b97f631c7657201a1409fea4
-
Filesize
136KB
MD5bf9e719a6c1f6b40b8c949afaf961d7b
SHA10aa83759101069a490966cd42d0f1204c39abc07
SHA256bf7cc507644d34bbc24c6cf6259c6ce88eeac0a9b04ec15bec55bdc81cf1fc4d
SHA512d22174a83c212b0c70b99dc0b4adfd495d047455df963b5db7f656f6d7acd2ec7766bce6c399df17be50d01cacb69fd8154eb442a64d68962a4872a5195426df
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd