Analysis
-
max time kernel
1799s -
max time network
1687s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 20:55
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://log2nptt1kgllygekdph.bbrplus.xyz:8443/[email protected]
Resource
win10v2004-20240426-en
General
-
Target
https://log2nptt1kgllygekdph.bbrplus.xyz:8443/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133626129649342446" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 228 chrome.exe 228 chrome.exe 4644 chrome.exe 4644 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 228 chrome.exe 228 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 228 wrote to memory of 4328 228 chrome.exe 82 PID 228 wrote to memory of 4328 228 chrome.exe 82 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 3636 228 chrome.exe 83 PID 228 wrote to memory of 2636 228 chrome.exe 84 PID 228 wrote to memory of 2636 228 chrome.exe 84 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85 PID 228 wrote to memory of 5048 228 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://log2nptt1kgllygekdph.bbrplus.xyz:8443/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9fad2ab58,0x7ff9fad2ab68,0x7ff9fad2ab782⤵PID:4328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1604 --field-trial-handle=1860,i,6784174403420374117,10987116074912902173,131072 /prefetch:22⤵PID:3636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1860,i,6784174403420374117,10987116074912902173,131072 /prefetch:82⤵PID:2636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2256 --field-trial-handle=1860,i,6784174403420374117,10987116074912902173,131072 /prefetch:82⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1860,i,6784174403420374117,10987116074912902173,131072 /prefetch:12⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3032 --field-trial-handle=1860,i,6784174403420374117,10987116074912902173,131072 /prefetch:12⤵PID:4160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4400 --field-trial-handle=1860,i,6784174403420374117,10987116074912902173,131072 /prefetch:82⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4552 --field-trial-handle=1860,i,6784174403420374117,10987116074912902173,131072 /prefetch:82⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2576 --field-trial-handle=1860,i,6784174403420374117,10987116074912902173,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4644
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bb08d8526da7d06bcba8eafadc5e0aa1
SHA1dba1129b3f8b647e9112086d3cbf7c86fc248f2c
SHA25660305b6cd5821ca08cbec7ba5452d8dacbbdf7c18adb7418cc58303140c179ca
SHA5124108102171fe5cb831cd0b9e53afbe0d46c552a46aa0f959f9319b98379bff610d983eaeb577866549fac6ef9cbdeda1fc45ea861b6b8cefd2e65b3933871f4e
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
685B
MD5834edfeaacc0259482a920751ffa932e
SHA13b57bfa434403287f0f5071fe6a488f13245002f
SHA2566f63f044bcfb598d1aa21d23be3abfca2a46281eb0299fd2ec7a0e82edc18273
SHA512d06658359f473be4b3fe91f44f59452bcbb95afc629663e5c51d4e5f6e4c13f117677e361d3417eed61ed6f3917791f70828667fd39066ee51f446748340fe78
-
Filesize
7KB
MD5e9ccfe86fb6265de75938985baa2e0ad
SHA1af52df9c390a4947f83453875074fed31d59e3cf
SHA2566e750935f58310c790ea14cc82ab6d980dcd948981afb2436910972b0b728ef4
SHA5125b16b3bb5f0c7e1ff71b620532de5e1aca3263a6c2460d6e62fdf0d7bd15dc76661ea1abb0f135964430f8817234d031ff12b1a69fe3658036f528d42a73b7fe
-
Filesize
130KB
MD5f03f0b90a8b8a9a0954e2d53a5579632
SHA19e249d72f5433d318278789ccd3f0526c2a27f4d
SHA256f956ca351cdf4b2128c716062a0f27409aa18ca7c2cf53552b92b5533e3791df
SHA512b72f8547d2551ae7c337fa57c0ee99b46cc0b79b4ebb794228b7e147de967670c7f4d2093522347b5bcf598c46419b9c73f5ad3a3d8426c21ed6fb0b173401d4