Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 04:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ipfs.io/ipfs/QmYJc6UQTAegJsKe5v63AygVEj7FkYScZPRB9gkwJPDnju
Resource
win10v2004-20240611-en
General
-
Target
https://ipfs.io/ipfs/QmYJc6UQTAegJsKe5v63AygVEj7FkYScZPRB9gkwJPDnju
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133627277170717375" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 1496 chrome.exe 1496 chrome.exe 3256 chrome.exe 3256 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 1496 chrome.exe 1496 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1496 wrote to memory of 3576 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 3576 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2408 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 448 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 448 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4112 1496 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ipfs.io/ipfs/QmYJc6UQTAegJsKe5v63AygVEj7FkYScZPRB9gkwJPDnju1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd1bc7ab58,0x7ffd1bc7ab68,0x7ffd1bc7ab782⤵PID:3576
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=268 --field-trial-handle=2000,i,6200215333108769032,4826383972416726220,131072 /prefetch:22⤵PID:2408
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1904 --field-trial-handle=2000,i,6200215333108769032,4826383972416726220,131072 /prefetch:82⤵PID:448
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2248 --field-trial-handle=2000,i,6200215333108769032,4826383972416726220,131072 /prefetch:82⤵PID:4112
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=2000,i,6200215333108769032,4826383972416726220,131072 /prefetch:12⤵PID:2540
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=2000,i,6200215333108769032,4826383972416726220,131072 /prefetch:12⤵PID:3980
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4436 --field-trial-handle=2000,i,6200215333108769032,4826383972416726220,131072 /prefetch:82⤵PID:1788
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4516 --field-trial-handle=2000,i,6200215333108769032,4826383972416726220,131072 /prefetch:82⤵PID:5080
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=984 --field-trial-handle=2000,i,6200215333108769032,4826383972416726220,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3256
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD5869b095122851473e4e34a5d363164f0
SHA11d841be524d8c35e98a0895369f10d0502d4edc6
SHA25633d7e9bcf8b3879b2fe1f2f44c2ec55016f63d4f7a60cad04c1098aafdd2f8df
SHA5125db9de301804079e91ec66786444a4364f2544ae044489b42b1492b8009ec8506697ecc77e5254f95a3a402c849d5307f46a80da53e9242978ae81263e3928bd
-
Filesize
1KB
MD578f3113fbaa7950c13108124d77b59ae
SHA10eda0afd426227827ff1bd0adb1aa3390a434201
SHA2560db58f779472d1951e9c7b841d59fdfaf5b2e17a9240833317daacdf017c053b
SHA51215c5e8c9c09fe745994b419c22f7849b8ea15108a841eb8a967a4bcd076d006e980eaadd3ce12f59d89704dfeefd22a2546e04b5965c9ca3b8cf8c6e705f94ed
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5f06e6fc4c8c8908d5c3a21121388e932
SHA1a34621cda93a172ccfa8c8b0d575e930bf664008
SHA256441ac13cef9dbe87dc2573eea1eb71bb6ad37800d7650fddc16adcc0ddab2521
SHA512caebcc7fa933692d3a41517fe4c6e432819a54720ada7314a0afe6f1b40b83ca98195d3265b5020ddfbb5439e74499c2bad78870c5c05df5fba1fb7d5ee2357e
-
Filesize
138KB
MD5dc17ceddabe00a62623fcd5f3cb0fe77
SHA10952b10152eb077a050fcbfc805d91821d915801
SHA256d1d4c5ded52b17cca9fea6ebeb673e39a70a061eed3fcf36bc4de2b8457375df
SHA512f7f1f21de8ce81d7a33ec9652bfde867a97aeae8da9b9a77e3991474d8306d198c4faa9eb02c80c892894bcd861c9809e5b228ac89d175ec035004996a35d52a
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e