Analysis
-
max time kernel
23s -
max time network
22s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
13-06-2024 01:06
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://pub-93042b4fb7b54ae2b0a91e37f9ee132d.r2.dev/ider%2Filer.html?scaprla#[email protected]
Resource
win10-20240611-en
General
-
Target
http://pub-93042b4fb7b54ae2b0a91e37f9ee132d.r2.dev/ider%2Filer.html?scaprla#[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133627143798166631" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 336 chrome.exe 336 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 336 chrome.exe 336 chrome.exe 336 chrome.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeCreatePagefilePrivilege 336 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 336 wrote to memory of 4708 336 chrome.exe 71 PID 336 wrote to memory of 4708 336 chrome.exe 71 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 1560 336 chrome.exe 73 PID 336 wrote to memory of 4180 336 chrome.exe 74 PID 336 wrote to memory of 4180 336 chrome.exe 74 PID 336 wrote to memory of 3528 336 chrome.exe 75 PID 336 wrote to memory of 3528 336 chrome.exe 75 PID 336 wrote to memory of 3528 336 chrome.exe 75 PID 336 wrote to memory of 3528 336 chrome.exe 75 PID 336 wrote to memory of 3528 336 chrome.exe 75 PID 336 wrote to memory of 3528 336 chrome.exe 75 PID 336 wrote to memory of 3528 336 chrome.exe 75 PID 336 wrote to memory of 3528 336 chrome.exe 75 PID 336 wrote to memory of 3528 336 chrome.exe 75 PID 336 wrote to memory of 3528 336 chrome.exe 75 PID 336 wrote to memory of 3528 336 chrome.exe 75 PID 336 wrote to memory of 3528 336 chrome.exe 75 PID 336 wrote to memory of 3528 336 chrome.exe 75 PID 336 wrote to memory of 3528 336 chrome.exe 75 PID 336 wrote to memory of 3528 336 chrome.exe 75 PID 336 wrote to memory of 3528 336 chrome.exe 75 PID 336 wrote to memory of 3528 336 chrome.exe 75 PID 336 wrote to memory of 3528 336 chrome.exe 75 PID 336 wrote to memory of 3528 336 chrome.exe 75 PID 336 wrote to memory of 3528 336 chrome.exe 75 PID 336 wrote to memory of 3528 336 chrome.exe 75 PID 336 wrote to memory of 3528 336 chrome.exe 75
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://pub-93042b4fb7b54ae2b0a91e37f9ee132d.r2.dev/ider%2Filer.html?scaprla#[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff8729f9758,0x7ff8729f9768,0x7ff8729f97782⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1544 --field-trial-handle=1860,i,15591162693162566940,11065298092822361575,131072 /prefetch:22⤵PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1792 --field-trial-handle=1860,i,15591162693162566940,11065298092822361575,131072 /prefetch:82⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2076 --field-trial-handle=1860,i,15591162693162566940,11065298092822361575,131072 /prefetch:82⤵PID:3528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2656 --field-trial-handle=1860,i,15591162693162566940,11065298092822361575,131072 /prefetch:12⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2676 --field-trial-handle=1860,i,15591162693162566940,11065298092822361575,131072 /prefetch:12⤵PID:560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4480 --field-trial-handle=1860,i,15591162693162566940,11065298092822361575,131072 /prefetch:12⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3740 --field-trial-handle=1860,i,15591162693162566940,11065298092822361575,131072 /prefetch:82⤵PID:3960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 --field-trial-handle=1860,i,15591162693162566940,11065298092822361575,131072 /prefetch:82⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150KB
MD52c498b0dea66daff606d863d8377240b
SHA1d20e30602e76b99ee9c64054fc30aea309321843
SHA256d7543901af78b8a5c0c33f976826002b148e6b97b08420dfa03f7ba7a4cdf63a
SHA512481517c1a5eeb6215b778500333d2c9e37a1ef4fc245ced464b313970740be2642c47cabd926dc2714486baafdc7f46ce494a07b8e36935aaf70971706fd1fe4
-
Filesize
72B
MD57388e3bcff3518e9c6b4f565001aab7b
SHA1207e3a387b44d385b3c2455e79ccc8e6e2586c6e
SHA2563e05d929b0d2cdde907e9551c7af523c15fda6998462c42ce82b60867addba21
SHA512cd2215fa2f433db646162adbe555a5d59c57c08afe017ad6d79e8b36e8d694ff9fef89246430fa522c5f06726872911639cd2078d2d913de3519c979ab6f836e
-
Filesize
1KB
MD568252f42cd1d890b993847311f046c51
SHA11990642bdeca612482d632cf00ae2a6f7770bbef
SHA256ab17b1168bb9c44bb529d0aa825ac1f71fd20d737cc6ee75e5870cb6ae1c3193
SHA512c27d268cc51a8c336fb57da49a803a77a5c2354a55773bb960f028f45fef6a13ad0d885ad3aaa6cff95f5fb6e86fac5e3388f29a8f5addb1aacf8f16841eefb4
-
Filesize
5KB
MD537501fc6955ce55f49862ffeefdbb4bc
SHA1c4b78013349ae1a004600896174f69a0c57d3439
SHA256198b96e9c3edde8439740647824e8752ed8224444a2acaae6843d9efc2c74315
SHA5129e5d2821b4ab52e2bd22e7dd91769c40150627af1d788b74951778729335607625742b7474ad9b65fab3a3aab5a8c396af8684be5d50d2901bfcbe525451dd19
-
Filesize
150KB
MD5f050d8bf0e23b29ee9d3a31e69b9cf9b
SHA1380212f77677fc53601f1e4e1e28b3259666bdc9
SHA256160624f4a486efa1759019d4a53ead414d57d892062dbbb3094a92c393ec0190
SHA51245e8638f57814a83b0b93418a8594a66530f6d6d02367677f47c10ade8e04382f69a720dfe754f24081aef1e4b14f64c97da024dcb330b0b5308f2544f9f5789
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd