Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 04:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://bill.remote-otp.com/?rid=Ob04oJ0
Resource
win10v2004-20240226-en
General
-
Target
http://bill.remote-otp.com/?rid=Ob04oJ0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133618627758379711" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1392 chrome.exe 1392 chrome.exe 4436 chrome.exe 4436 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1392 wrote to memory of 2732 1392 chrome.exe 90 PID 1392 wrote to memory of 2732 1392 chrome.exe 90 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 4196 1392 chrome.exe 92 PID 1392 wrote to memory of 3160 1392 chrome.exe 93 PID 1392 wrote to memory of 3160 1392 chrome.exe 93 PID 1392 wrote to memory of 2380 1392 chrome.exe 94 PID 1392 wrote to memory of 2380 1392 chrome.exe 94 PID 1392 wrote to memory of 2380 1392 chrome.exe 94 PID 1392 wrote to memory of 2380 1392 chrome.exe 94 PID 1392 wrote to memory of 2380 1392 chrome.exe 94 PID 1392 wrote to memory of 2380 1392 chrome.exe 94 PID 1392 wrote to memory of 2380 1392 chrome.exe 94 PID 1392 wrote to memory of 2380 1392 chrome.exe 94 PID 1392 wrote to memory of 2380 1392 chrome.exe 94 PID 1392 wrote to memory of 2380 1392 chrome.exe 94 PID 1392 wrote to memory of 2380 1392 chrome.exe 94 PID 1392 wrote to memory of 2380 1392 chrome.exe 94 PID 1392 wrote to memory of 2380 1392 chrome.exe 94 PID 1392 wrote to memory of 2380 1392 chrome.exe 94 PID 1392 wrote to memory of 2380 1392 chrome.exe 94 PID 1392 wrote to memory of 2380 1392 chrome.exe 94 PID 1392 wrote to memory of 2380 1392 chrome.exe 94 PID 1392 wrote to memory of 2380 1392 chrome.exe 94 PID 1392 wrote to memory of 2380 1392 chrome.exe 94 PID 1392 wrote to memory of 2380 1392 chrome.exe 94 PID 1392 wrote to memory of 2380 1392 chrome.exe 94 PID 1392 wrote to memory of 2380 1392 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://bill.remote-otp.com/?rid=Ob04oJ01⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc5f149758,0x7ffc5f149768,0x7ffc5f1497782⤵PID:2732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 --field-trial-handle=1904,i,7957938800838474215,5165401006887075458,131072 /prefetch:22⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1904,i,7957938800838474215,5165401006887075458,131072 /prefetch:82⤵PID:3160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1904,i,7957938800838474215,5165401006887075458,131072 /prefetch:82⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2892 --field-trial-handle=1904,i,7957938800838474215,5165401006887075458,131072 /prefetch:12⤵PID:2492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2924 --field-trial-handle=1904,i,7957938800838474215,5165401006887075458,131072 /prefetch:12⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4800 --field-trial-handle=1904,i,7957938800838474215,5165401006887075458,131072 /prefetch:12⤵PID:3728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 --field-trial-handle=1904,i,7957938800838474215,5165401006887075458,131072 /prefetch:82⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3324 --field-trial-handle=1904,i,7957938800838474215,5165401006887075458,131072 /prefetch:12⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 --field-trial-handle=1904,i,7957938800838474215,5165401006887075458,131072 /prefetch:82⤵PID:4292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4504 --field-trial-handle=1904,i,7957938800838474215,5165401006887075458,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4436
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1212
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4080 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:81⤵PID:4996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD51b567702685731d71a9ca128aeca5168
SHA133f42dd22787cd307966564c8d2756dfb2f192f4
SHA2560999d28277f4f5ca00258e1571273c7cf8e0345eb78aa3df26483dd3ab5024ad
SHA51227ec9a15153a895268229871da3ca8c5db670845a720f1a1b6dfffac2a6eaa2cffef97adae3fef34ef76a8fbeebf2e66d307fcc536326b5b8ff15b582700e141
-
Filesize
1KB
MD57c6c79db9b7b0f3b4f85e74674d4595a
SHA15d4c3d980d5679a0b8d4993f14bcbaed4d1ba649
SHA256efc8bea6f2d314e1893f0feb03efa898b606ecfe7e9a9c4e8791f7da12453767
SHA512303075e78d14e9ed642708de4d8c596dd09a9335ce3dc0ebda570a8a2ccf317c146f88a929ae6e070b303847562d7a4430af167b74a7a41af8612d09a26b2450
-
Filesize
1KB
MD500d25f81f3a2e4e3ff08eb08080eb296
SHA1b1d74b4abb6cfb4e18b46dba46676593e1c5a023
SHA256972fcc3de6252a03737cdc3e59054db03430008a9f426a02c07c5b76d1e9c282
SHA5129c8210c4bdcfc7607aca6a47f09e03acac18b49e8cd3ba0292a808a346e32ed5b580dece2ebd81aa1ffd5f56cccbc99738577df2a7b667e58f40b8620ee22594
-
Filesize
6KB
MD5213b2e9e400608cb847b5bd72dc2d8ff
SHA179ebbc824f03241a4d93764cbd7b395c7d4586a3
SHA25652574bb98d42249413a916c54d8409d88924200210adbea72baa59fe69f545dd
SHA51282804092fa48b7dfdb7415b4aa551697697a95d00f8ef7d81d297d0abb8cd46370e7e1f239d0a7ac31655dbcc7019acf97e978b36b7a2c0e1fd4a5616cfd58c6
-
Filesize
6KB
MD5acd0f691674fda895233c4d402199b13
SHA162daf702569f256ea2477afaeaf1596974cb914b
SHA256d63fdbf1146251f99f908e40294d13f0c362164ff5bb8fa24c24c3e1683b0578
SHA512d36b09840ac4a66de02395b5d043c55eb49bef5b3afa012f6bc5aaa007d06b01ba16926aec08e59b2090c5067786c3fe85aa1878413b6261595840b4c4c55843
-
Filesize
6KB
MD59e282fceaadd7d3515bc8259188857ef
SHA12874e3f4bc2e084ae974bd3fe9daf3c226abf2e1
SHA2561799be53fb0b6e69a9229186020d1a963442542ca8daa8274ef3a6f48cdd0bee
SHA51221e6873e9fb04f1a03509230c5f550358f76c5ba1d55ae3d7f3ec41a36d797a0a915398d1dde57a8fb4115aa4263cb487ee205c646b5a4e2c8c9e7ae82e69298
-
Filesize
128KB
MD574f705f396a88e1b8d8e19c31f45251e
SHA139b604c07a8e9a9398233f1645fe842a1946451d
SHA256a4a7b5e41542ec714d9b834e92300568183746cf797f4b8cf3054d9487e055e6
SHA512681dfbdf42044825b3a04e4ebd0f9dbd488b1e106c5b7fcdfb2c0f9d9d561b17414a14343da6feb56c4af261d5c1fbb8c338f41d5a229c1e0814cc7ccf34f0f0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd