Analysis
-
max time kernel
71s -
max time network
70s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2024 11:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://batilms-votes.online/50
Resource
win10v2004-20240426-en
General
-
Target
https://batilms-votes.online/50
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133617141530479979" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 2524 chrome.exe 2524 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 2524 chrome.exe 2524 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
Processes:
chrome.exepid process 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2524 wrote to memory of 3000 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3000 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 5116 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 1072 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 1072 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe PID 2524 wrote to memory of 3584 2524 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://batilms-votes.online/501⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffceff1ab58,0x7ffceff1ab68,0x7ffceff1ab782⤵PID:3000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1576 --field-trial-handle=1892,i,7460947655913955630,11843395669928333100,131072 /prefetch:22⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1892,i,7460947655913955630,11843395669928333100,131072 /prefetch:82⤵PID:1072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2200 --field-trial-handle=1892,i,7460947655913955630,11843395669928333100,131072 /prefetch:82⤵PID:3584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1892,i,7460947655913955630,11843395669928333100,131072 /prefetch:12⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3032 --field-trial-handle=1892,i,7460947655913955630,11843395669928333100,131072 /prefetch:12⤵PID:1960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4384 --field-trial-handle=1892,i,7460947655913955630,11843395669928333100,131072 /prefetch:82⤵PID:4032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4648 --field-trial-handle=1892,i,7460947655913955630,11843395669928333100,131072 /prefetch:82⤵PID:4700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4508 --field-trial-handle=1892,i,7460947655913955630,11843395669928333100,131072 /prefetch:82⤵PID:4660
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD583e15b306afbf03698845f8508eb00c4
SHA143d4e8b50aba348081abb48e260d3f5f058f860a
SHA25645768d9f4fd753c1402cdf82a318753e0bbfb8c97e331f86aee338537db5268b
SHA5127293c23e03d17a90c856caeebe7133f49f531cc1d67d29776c866f5c88160592abe689972df35e5995afb7436825231794148d19603e912043995adfa1e4f95d
-
Filesize
120B
MD598c4a6ad853d39eb5e43725e67036e9d
SHA11e8df2531dfa6a3f55b7f3a34e0107bc16e08a03
SHA256fa2d9bc9c1ca735a1382f4d15c2473ed551506a8cfefe33e496590a6a30dcdf8
SHA51267aa04c34ca3760ccc335c33cb1f6727c598b808b2cc69f63a09a7d43947848ae2f70a4d23fdce733e22b3be4c5a878a248351ff821601382f7b9eb216195a81
-
Filesize
1KB
MD5e5fcb82d703d7959396265daca8ace77
SHA19c37232e69850ee23603cb549a28d07712c9e389
SHA25697bc7842e684cfce6c779b20000aefeaa4a7e8ed4cdb260cd75379d3dc748f7d
SHA512646506e4adf2ff9dd6f87a51726314cc9d247513d3d47e24a86bf4016c7db9bcaa9ff9a1bb060925e8408f7f1c5a13e3780b10e56d40e8c78bdd742098d6bb1a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
692B
MD534f4b5be9d0988a4638ec1aedf53e804
SHA1fd29b560c2ab1bd09d28f226c42ad0cf195a34a4
SHA256af7ee1aaa87d792814eae2420107d12beb5593266845e2ab3d96c9c8021ef718
SHA51269fb7f22685ed0de7237cfc3bf6bd80adc56613c744f546b441383fef50370f7dbbfc5487a4ddfd9582a6eb4a37af4be6cf33731aed3f7d3f5023e4ee1f0cb97
-
Filesize
7KB
MD5d7c170458a9e36b4a6ef0a82573b96b0
SHA11fa6ad5afc6cfcafa9805f413bb056d8f46cee52
SHA256249fea906643730afaeebb4e7cae1c560c712aae6d2c5c5b29cae2bb7a28628a
SHA512ec20a4593202f5fbc0b601e4d788801f666ea81d2999535fdc1cef5bc4aa3c7bd842b73c7dd25d57c9db19b5a6bd9c4db396af3faf55a52cc6291dc6ad9f6cd6
-
Filesize
7KB
MD570cde6350250d4690877d8ebf6662fc3
SHA1a7083c94c5c0b8333bd622d9fc3070b103952a92
SHA2564ae1e6ba57c0d605164848e49e84a1cf4bf4abb3be137309956c0c90d462a106
SHA512b0e4bfc962dd3e3a58508228d78fde0dbc8aa1f858823c8ee5639863ab9570659895dad706cb78c368a15dd86611e94d85b8d260755d03f7a8465f6915610b8f
-
Filesize
130KB
MD5bf9a21699ff13eedaaa0d569efb1be03
SHA1002f426d65460ae3c5325ed45806385352e41e81
SHA256045fe686b1e01ab9371b209cd62f8ea27a9dd4c6d9756a429573b971868447ee
SHA5120abf74d5f249edc6cd344dc84d76efb08943c3a50aab1efc740e0921bfeafed0da8e22311d6bbe58675757e3bec6410d17b4cea7bc8b68bd57facc3b42fbe0e2
-
Filesize
130KB
MD50f9fb76c210381eff57dcf9c3e0b6c44
SHA1782bdc5290c9ae24096d9bd9dc16d33cece94478
SHA2569506d1af8034da16a6205f904a69703f556217e68e078658de7457240ec9b1ab
SHA512b91f0c6325f4e4551fcd5e243706447313a9b8b84f6ec6205976201b5652995d1a34490f1396c03e638fa92b006441dfe5ff95ff745f74044504e181f9d707f9
-
Filesize
89KB
MD5ed71441b806b45b8508b0b08b6cc5cc7
SHA134348c463fb19582e358fa4b2a9c059851667c3b
SHA25604f039097cb06e6bb5a63bac9f2ab7d4e2e2de62eeea67f880cd532af567596a
SHA512c277fb8a791e5eaefd76da51a012f90e90c835f7fb94bc3b99748c2f682f751383da95b25924d3d1c359f5f46545afe978c36f284a04c5d7bb29ead239f95a2e
-
Filesize
88KB
MD56c3e0e09cf2c5fe825b2045eddc36510
SHA16d27c8a3c5fa5ee795a567f0a409ac09b4873f12
SHA256785c6d4d54123683066759abd04b426620e83c1e248f610398087401cf7f03bc
SHA512dfb5dc973f71ffc5ed4161430f1bf7fe3737eb05aa68c76b72495a9bb8989e417e9ad40d2d4f481c6012ddacb3141e85f92e47d11e16d12037affd8d546627aa
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e