Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 05:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://chhattisgarh.com
Resource
win10v2004-20240426-en
General
-
Target
http://chhattisgarh.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133619509946058794" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1460 chrome.exe 1460 chrome.exe 2252 chrome.exe 2252 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe Token: SeShutdownPrivilege 1460 chrome.exe Token: SeCreatePagefilePrivilege 1460 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe 1460 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1460 wrote to memory of 4408 1460 chrome.exe 81 PID 1460 wrote to memory of 4408 1460 chrome.exe 81 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 1756 1460 chrome.exe 83 PID 1460 wrote to memory of 5108 1460 chrome.exe 84 PID 1460 wrote to memory of 5108 1460 chrome.exe 84 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85 PID 1460 wrote to memory of 5016 1460 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://chhattisgarh.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfc03ab58,0x7ffcfc03ab68,0x7ffcfc03ab782⤵PID:4408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1928,i,10588499804392233547,8729762888154217725,131072 /prefetch:22⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1928,i,10588499804392233547,8729762888154217725,131072 /prefetch:82⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2220 --field-trial-handle=1928,i,10588499804392233547,8729762888154217725,131072 /prefetch:82⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2856 --field-trial-handle=1928,i,10588499804392233547,8729762888154217725,131072 /prefetch:12⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2864 --field-trial-handle=1928,i,10588499804392233547,8729762888154217725,131072 /prefetch:12⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4348 --field-trial-handle=1928,i,10588499804392233547,8729762888154217725,131072 /prefetch:12⤵PID:532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4676 --field-trial-handle=1928,i,10588499804392233547,8729762888154217725,131072 /prefetch:82⤵PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 --field-trial-handle=1928,i,10588499804392233547,8729762888154217725,131072 /prefetch:82⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1088 --field-trial-handle=1928,i,10588499804392233547,8729762888154217725,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130KB
MD5e2725230aca4201776d57712ec60bb87
SHA14a06d6c0c5be6426a5ecc30899d0d0c5eece38b5
SHA2562fe926fe7696bb3337b0aa600188be2071a877ec49ddc2ec9e617720683c7d12
SHA5120d7e4f02a1a66605112bec242c33ca0b4e1e060c026baaac2fc60ed4c7990c89fb74a092f94029ca8ec4f1b7289313ace1fac8f6710e4e3936ebdecf6c646148
-
Filesize
96B
MD5dfa752f12084f9224bb3f2086cd78282
SHA16357f81a31aa553741f8635c64560251756176e5
SHA2560c5ce338e0cf0794450248d1cfe9abd32376fc60a22eb2ee6ea9be78ccc199d8
SHA512410bef64a9eec7d3624f304e3c12c9f194c53edd127fd67dde8e9ff0888482ccc8d5305fcb99f6d4b1bc229a01ed0c791c9e52e16622f94f148b541052b027b8
-
Filesize
1KB
MD5297957ee0995b28043a66e217819292f
SHA1bd2eeeccfdfaa2b08434eee3b3ace828c010f6d8
SHA25697b9e6564dcffd34e7e77ab118f570a7e0425bd597f55a2495e12b8d0c411efd
SHA512f0a7416f9a0e2c4fcb2ec65427f4707043a1e96fd6213505903994565ceab11e44fa3f4b5486591c9be5a232dc067d4d69b6674c5eceae22a3ae0966bece1fcc
-
Filesize
1KB
MD55c0754bb22b54734d8399fb81ef6a578
SHA18adc07967e8c99913953ee1272828c9d160a1679
SHA256fc6db88f57ef98a912667b2bf3ccf301273dc8bd5bfe9b094e8895f3355ec311
SHA5122bc4b5abc7f788cfc08dd054e29d834ca1918f2a241a224c8907a9a246505a733b8a22cd71a2e44255b1885bb5469d280fb11e5748cb0ed8dc92cd577b0e2886
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5319b2f1a0db2db5bed231d61f8cd97be
SHA1ca1af03b31d2022c26892204ca6c03df6e3dd7d0
SHA256a06172767eba4d019c54134972a63d8542ab11f4438abfe56d6295ea5bae4889
SHA512b207a3f56d9b1495310da1a72d54c8de99123785774a2bb44b1fe16c9fbb7a5d587b60c498033b9d8b22c45da9f14cfb334fd3db738e8003ce665369cbc26e33