Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 04:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://whatpos.com
Resource
win10v2004-20240611-en
General
-
Target
http://whatpos.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1144 chrome.exe 1144 chrome.exe 1164 chrome.exe 1164 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1144 chrome.exe 1144 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe Token: SeShutdownPrivilege 1144 chrome.exe Token: SeCreatePagefilePrivilege 1144 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe 1144 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1144 wrote to memory of 3348 1144 chrome.exe 80 PID 1144 wrote to memory of 3348 1144 chrome.exe 80 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 3248 1144 chrome.exe 82 PID 1144 wrote to memory of 4708 1144 chrome.exe 83 PID 1144 wrote to memory of 4708 1144 chrome.exe 83 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84 PID 1144 wrote to memory of 2692 1144 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://whatpos.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9f02aab58,0x7ff9f02aab68,0x7ff9f02aab782⤵PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 --field-trial-handle=1920,i,5497681741184532012,1949318964790762017,131072 /prefetch:22⤵PID:3248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1920,i,5497681741184532012,1949318964790762017,131072 /prefetch:82⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2216 --field-trial-handle=1920,i,5497681741184532012,1949318964790762017,131072 /prefetch:82⤵PID:2692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=1920,i,5497681741184532012,1949318964790762017,131072 /prefetch:12⤵PID:800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3004 --field-trial-handle=1920,i,5497681741184532012,1949318964790762017,131072 /prefetch:12⤵PID:1432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4452 --field-trial-handle=1920,i,5497681741184532012,1949318964790762017,131072 /prefetch:82⤵PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4592 --field-trial-handle=1920,i,5497681741184532012,1949318964790762017,131072 /prefetch:82⤵PID:3772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2344 --field-trial-handle=1920,i,5497681741184532012,1949318964790762017,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1164
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD520108f73270be92107ce28f5dffd5c7a
SHA1cd99600e7332a26008c4a522ef612eba607c87d7
SHA2568044111724e309694444e7aeb89b1a212a4dfee21196934846ac6c3b74fdca08
SHA512b0396e5c30abd1504e02da949171f62b85729f61dfe0817bde1661dc2faeba545e4098605a695711de20198c8136b8dabbef5e6100b4947293ae35d7471da9a3
-
Filesize
192B
MD50ddea78223ac1da1114d2e9b1308da90
SHA16601141eb7fe182c405c8f3411c238571b1810d2
SHA256cfdf916d2cb53cd06c510b5e487a00a6b63ed476b66df85892a8ff0c315803b8
SHA5127352eedcf691d2a6510d6ff60b8098d5d953608b9e6bdb7f5fe3efee999bc24af8257d40fc3630f46ac55ca2a2e8f8c1bf6166d007a72713c4d06bf8d85a97ea
-
Filesize
2KB
MD5fddb69efb82b5ccc28a688a73e02ffa5
SHA1aad0c97255dc0e35051b1de4d2e39291f758883c
SHA2563abdca52ba704823250e13201d0c80d7b32dd7fa8d4a9379a34af8583f9057ba
SHA51284d2118d4129bc4a4a4927fa4d94efc47a0e208e9a159752405e5518b4357f7ff537d85089e3ebcb1f141acced2aa402c37b1f4829d1431a368e6566bbccd696
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
690B
MD527aa36571ced4c083e5355d3d9db8b48
SHA1c2795eb1a6cb74c8b7c397ddf30577c76747322c
SHA2569ffc57b10c59430ca5b41f218d8aa5ee5d980a9a79b23b98b2e7a5f6457d5865
SHA51254030c4a3e75b71aa4b2bbaf36cccfaf4bdf1633a4baeb2c390257dbf0934fd337237dac8504921a31486516ef2b94997e05adfa308c987316297ee89794a204
-
Filesize
6KB
MD550ae0839b8dc2558c3cd6d17287f9b1c
SHA1800618dea7febd233413c3340dbe530b6230e5b9
SHA25661d7d0b9010a728d886891b7411c0a33f7728fbd99a5f06fbb6bbf164263251d
SHA512af544e02bb23c0c051cd424dc2ad3f5002703b76bfa243fa2289743df3f03bddbb35c9b65e910694411f1e8d4662909e3fc74ba53d760466389237988e0ecfce