Analysis
-
max time kernel
135s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 07:27
Static task
static1
Behavioral task
behavioral1
Sample
Phxnt0m
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Phxnt0m
Resource
win10v2004-20240508-en
General
-
Target
Phxnt0m
-
Size
308KB
-
MD5
97bc9b993c88eae079b00774ed9f5f8a
-
SHA1
1c2712e8faa2e9d5a2e7486462bee05eb90bac4a
-
SHA256
355be06a2b284ed9796702153b194b592d0bcb748740d556a109037969921787
-
SHA512
3bf57dd3a2cc7bbef03b5a0e72c6386e49495b0e9145d05e061f5ac90c30a0dc06142aed730066c212dce9e3a96b54d151a45d2236423298b4543971cc545895
-
SSDEEP
6144:EFoZb2n9dH5M2vkm0aWyRv3pId9RH9XvZJT3CqbMrhryfQNRPaCieMjAkvCJv1VY:MoZb2n9dH5M2vkm0aWyRv3pId9RH9XvJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133628236982370733" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1924 chrome.exe 1924 chrome.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 652 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe Token: SeShutdownPrivilege 1924 chrome.exe Token: SeCreatePagefilePrivilege 1924 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1924 wrote to memory of 3376 1924 chrome.exe 99 PID 1924 wrote to memory of 3376 1924 chrome.exe 99 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 3384 1924 chrome.exe 100 PID 1924 wrote to memory of 1416 1924 chrome.exe 101 PID 1924 wrote to memory of 1416 1924 chrome.exe 101 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102 PID 1924 wrote to memory of 1420 1924 chrome.exe 102
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Phxnt0m1⤵PID:744
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4696,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=3756 /prefetch:81⤵PID:4588
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb3fe4ab58,0x7ffb3fe4ab68,0x7ffb3fe4ab782⤵PID:3376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=2060,i,15947421617577997831,7425490589382831373,131072 /prefetch:22⤵PID:3384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1992 --field-trial-handle=2060,i,15947421617577997831,7425490589382831373,131072 /prefetch:82⤵PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2284 --field-trial-handle=2060,i,15947421617577997831,7425490589382831373,131072 /prefetch:82⤵PID:1420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2944 --field-trial-handle=2060,i,15947421617577997831,7425490589382831373,131072 /prefetch:12⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2952 --field-trial-handle=2060,i,15947421617577997831,7425490589382831373,131072 /prefetch:12⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4356 --field-trial-handle=2060,i,15947421617577997831,7425490589382831373,131072 /prefetch:12⤵PID:1244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4684 --field-trial-handle=2060,i,15947421617577997831,7425490589382831373,131072 /prefetch:82⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 --field-trial-handle=2060,i,15947421617577997831,7425490589382831373,131072 /prefetch:82⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4156 --field-trial-handle=2060,i,15947421617577997831,7425490589382831373,131072 /prefetch:12⤵PID:2796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4684 --field-trial-handle=2060,i,15947421617577997831,7425490589382831373,131072 /prefetch:12⤵PID:3216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4928 --field-trial-handle=2060,i,15947421617577997831,7425490589382831373,131072 /prefetch:12⤵PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5136 --field-trial-handle=2060,i,15947421617577997831,7425490589382831373,131072 /prefetch:12⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2952 --field-trial-handle=2060,i,15947421617577997831,7425490589382831373,131072 /prefetch:12⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4988 --field-trial-handle=2060,i,15947421617577997831,7425490589382831373,131072 /prefetch:12⤵PID:2352
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
810B
MD596bf896321cbfe8d49c62942c013629b
SHA1417a2471c6f4c4d8842a087978b44699f39933b3
SHA25636056eba34e64cb14f67c62a16d6a9622b3a732f060aff2ddc540444a7357dd8
SHA5126876196cef5eb399045cb4ff896aeb1e919736bc44ebd64c7f4662e03a9d2c45c05cb2892cedd11046aa3bf49932a889852abf64dd74b1e5bdb3ef5ba70fcd24
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD572ba6a7f0548410c855e6e910796267a
SHA1cb6aba014beb8b75bde0e9c8ccf9a0807660d4e2
SHA2563ecfa1ca21b2d2d08cea7011f5200e19a0a5cdb2e57a46839f3e0bc4d7239327
SHA512296e8133cd2a1a9bf6afefa6d0ba2250dcdb4cd92cd54933fca2efb8747b3959632c43b69a0db65c5ee4f91a8f32476c5de9416b81678108c7466082de0542fc
-
Filesize
255KB
MD54c7df617d46976d5741ea1b96a069e5f
SHA1366613304791baa739d9de6455edc673771ac203
SHA25603fe9ba685b7ab62b445f718f49984bfc3eadf6e33620fd58dc92e3c34057432
SHA5121b778468c949cb7bb4d962967650cb287cb2d392835f6ca0718479a6fc20858bf44ad80e1bf88105a2fc7af200e4198074803ab06845dda0b4fe84e175bbf955
-
Filesize
255KB
MD5bccd1f763c6e629afb8ac9bc602fac5f
SHA13c2708d2669e8e6dc6a4b05f3025d58622ccd4cd
SHA256a80bd910027daa2fef68442565cf1c301cff28c0f6c002f11d59da176d9e73c1
SHA5122cf9c02313fb52b0da080db802ece829080584e356694380ff51049b8e2e7471801b786db01004bd9de4cff4e734a1fe0de188fc215a8352d57e5e4c4061ae98
-
Filesize
264KB
MD51c2213506906370105a3d05f5f0f2bc7
SHA18db34998e3a22d89ce523b4b42a26c347b5528b6
SHA25635a032d8d58c79817aad928a068488c3d07618a158be9141798e8b38d45a616c
SHA51212f0088601fcdd73b2e19880d9a780d7019ba8d4e4a6e6f483eaa576d4dc585f07b0a5700b18955a6d62871900c5ab720ae7e0fb37a887cdd78853f9e7755d93