Analysis
-
max time kernel
1799s -
max time network
1687s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-uk -
resource tags
arch:x64arch:x86image:win10v2004-20240508-uklocale:uk-uaos:windows10-2004-x64systemwindows -
submitted
08-06-2024 12:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gambling-link.blogspot.com/2023/06/bloxflip-rbxflip-predictor-download.html
Resource
win10v2004-20240508-uk
General
-
Target
https://gambling-link.blogspot.com/2023/06/bloxflip-rbxflip-predictor-download.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133623246070598448" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 680 chrome.exe 680 chrome.exe 5060 chrome.exe 5060 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 680 chrome.exe 680 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 680 wrote to memory of 4816 680 chrome.exe 82 PID 680 wrote to memory of 4816 680 chrome.exe 82 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 932 680 chrome.exe 83 PID 680 wrote to memory of 1636 680 chrome.exe 84 PID 680 wrote to memory of 1636 680 chrome.exe 84 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85 PID 680 wrote to memory of 5036 680 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://gambling-link.blogspot.com/2023/06/bloxflip-rbxflip-predictor-download.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcba61ab58,0x7ffcba61ab68,0x7ffcba61ab782⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1900,i,795026130717386402,3203265550890691602,131072 /prefetch:22⤵PID:932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1900,i,795026130717386402,3203265550890691602,131072 /prefetch:82⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2204 --field-trial-handle=1900,i,795026130717386402,3203265550890691602,131072 /prefetch:82⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1900,i,795026130717386402,3203265550890691602,131072 /prefetch:12⤵PID:872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1900,i,795026130717386402,3203265550890691602,131072 /prefetch:12⤵PID:1248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4284 --field-trial-handle=1900,i,795026130717386402,3203265550890691602,131072 /prefetch:82⤵PID:4084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4524 --field-trial-handle=1900,i,795026130717386402,3203265550890691602,131072 /prefetch:82⤵PID:4056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1868 --field-trial-handle=1900,i,795026130717386402,3203265550890691602,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5810c9eff4aa9a14c4415c4c4c8327dd5
SHA138cbe92fd28426118717dee691bfa1c6cb7f54ae
SHA256e343f96947a4b016caf735e5b26e033f1514d7da86f92244d84b8b0cf4ce7ffd
SHA512dbfae8a8599b919222aa9e03823beea8502397dd5f1c919cfabe709211cb6679721abc40808fe33ac4e688e6c19b2db1a67a7730505909fc3930acd59e5a3a5e
-
Filesize
2KB
MD5043863c388745e62b61c6d9160bc73d9
SHA178016246d37fc4751c3db224f760091b9edf18a3
SHA25694bbc76fa321a94bb0fe72616cac61be620dd2a494bfa4ea92f0e85bf64e9be0
SHA512272c27c7a6d37e8e13cf032a08ba30f844f8d2b8ca2748168a22aa09d8529111af50162fce4525b725d460d9669c784eb54236e34153914a98570f1d6ed2b896
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5b335ec32029781f7f41ebbd8bb34bf7c
SHA1083195eddef5f4a474362b5f8812d78c95c685a0
SHA256fb379694d9366423dda4cff8f74e75715348d9e38bdd2c09e5c1740e33c44766
SHA512178ba81ad10491973efd1dd242ede37f8b6b927612f70bae80379e470b9832817777db37376afd3087801121ea38b9a2a05e590f9680ccebe968759390544d94
-
Filesize
255KB
MD502b5166a7ec44b7b169c77d77d457f35
SHA112b3b52e4bc426be75322fe42357f3944b1784e5
SHA2562e63255aeac6c274f0ec5da401e352803e49540c9463292a7fcb5a8b3f0b786c
SHA512d28f333761008d71f9806795264e50ce382a74b5cc5a5bf54de0aa712df1f9f0d712794ad9fe00b5e8b21bf545f0f2235e1c7659cf738ccc27f9a2d7a39a603e