Analysis
-
max time kernel
1799s -
max time network
1685s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07-06-2024 19:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://no.ascape.exe
Resource
win10v2004-20240426-en
General
-
Target
http://no.ascape.exe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133622633664436028" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4044 chrome.exe 4044 chrome.exe 4388 chrome.exe 4388 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4044 wrote to memory of 4160 4044 chrome.exe 84 PID 4044 wrote to memory of 4160 4044 chrome.exe 84 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 1484 4044 chrome.exe 86 PID 4044 wrote to memory of 4076 4044 chrome.exe 87 PID 4044 wrote to memory of 4076 4044 chrome.exe 87 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88 PID 4044 wrote to memory of 2920 4044 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://no.ascape.exe1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc5b1bab58,0x7ffc5b1bab68,0x7ffc5b1bab782⤵PID:4160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 --field-trial-handle=1920,i,692057388791992103,8565845265312715919,131072 /prefetch:22⤵PID:1484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=1920,i,692057388791992103,8565845265312715919,131072 /prefetch:82⤵PID:4076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2104 --field-trial-handle=1920,i,692057388791992103,8565845265312715919,131072 /prefetch:82⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2728 --field-trial-handle=1920,i,692057388791992103,8565845265312715919,131072 /prefetch:12⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2736 --field-trial-handle=1920,i,692057388791992103,8565845265312715919,131072 /prefetch:12⤵PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4224 --field-trial-handle=1920,i,692057388791992103,8565845265312715919,131072 /prefetch:12⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4192 --field-trial-handle=1920,i,692057388791992103,8565845265312715919,131072 /prefetch:12⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4144 --field-trial-handle=1920,i,692057388791992103,8565845265312715919,131072 /prefetch:82⤵PID:1300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1920,i,692057388791992103,8565845265312715919,131072 /prefetch:82⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4396 --field-trial-handle=1920,i,692057388791992103,8565845265312715919,131072 /prefetch:12⤵PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1740 --field-trial-handle=1920,i,692057388791992103,8565845265312715919,131072 /prefetch:12⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=212 --field-trial-handle=1920,i,692057388791992103,8565845265312715919,131072 /prefetch:12⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5084 --field-trial-handle=1920,i,692057388791992103,8565845265312715919,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4308 --field-trial-handle=1920,i,692057388791992103,8565845265312715919,131072 /prefetch:12⤵PID:3108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=1452 --field-trial-handle=1920,i,692057388791992103,8565845265312715919,131072 /prefetch:12⤵PID:988
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
851B
MD5f96bef6dfeb8ec26f3daa184be475d09
SHA198b6460b0c76ad063e63d8392b56c14f85377418
SHA2560686e22c38055956a8c4ab20c0f8f22e49861f6ef822279de16bd649c5e23b99
SHA512c292b9d109c97d97aecd026a80efc6f59cc506fea7b5e60cbadfe2e3a0ef38c39ee7534b47b77b93022d57ecf59e011d631a7b9bf37248e22e288ea45ab15455
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5cea2ab3a9f4dbb02bc5566c363438f69
SHA1cdfc05793d40cdf6f57eaad994fd8b030440a12b
SHA256ea0cad635f681fe041f4cd0918ee0799991e0fc57a504aa67ccd822b53de281c
SHA5121d3efac98e70f807269fa527552e6a63ffc44900fc05125a4b70724cb34afd8f71fdc2f5292837fd62d6e411f52dbe0a17f5e399cc7f11d471241eafc9ee5c9c
-
Filesize
130KB
MD55ddf6b934f60b6f8db3c451c1e4cac4a
SHA1297827c0021480463efcd4f8d1c2f855cd1a3aeb
SHA2560ea6e68bbec4ad1d56c42b564da9c091aea067af6ef125749fbb2e37ca33249d
SHA512a0b1a5806ec879900c7c7a083466b72b204dd81835be70a6ee7449c7e77d47c20397d29e88dfb65f88a711ad973e5bde814b33396ccd9cabcdebce3334b2b7f0