Resubmissions
15/06/2024, 16:28
240615-tyqrqaxbmb 115/06/2024, 16:02
240615-tgvz4swfjf 115/06/2024, 15:59
240615-tfeazazeqj 115/06/2024, 15:48
240615-s85syswcpg 10Analysis
-
max time kernel
1802s -
max time network
1803s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 15:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://45.207.168.170:7744/
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
http://45.207.168.170:7744/
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
http://45.207.168.170:7744/
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
http://45.207.168.170:7744/
Resource
win11-20240508-en
General
-
Target
http://45.207.168.170:7744/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133629530947920827" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4752 chrome.exe 4752 chrome.exe 4856 chrome.exe 4856 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4752 chrome.exe 4752 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4752 wrote to memory of 1804 4752 chrome.exe 90 PID 4752 wrote to memory of 1804 4752 chrome.exe 90 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 488 4752 chrome.exe 92 PID 4752 wrote to memory of 4492 4752 chrome.exe 93 PID 4752 wrote to memory of 4492 4752 chrome.exe 93 PID 4752 wrote to memory of 1852 4752 chrome.exe 94 PID 4752 wrote to memory of 1852 4752 chrome.exe 94 PID 4752 wrote to memory of 1852 4752 chrome.exe 94 PID 4752 wrote to memory of 1852 4752 chrome.exe 94 PID 4752 wrote to memory of 1852 4752 chrome.exe 94 PID 4752 wrote to memory of 1852 4752 chrome.exe 94 PID 4752 wrote to memory of 1852 4752 chrome.exe 94 PID 4752 wrote to memory of 1852 4752 chrome.exe 94 PID 4752 wrote to memory of 1852 4752 chrome.exe 94 PID 4752 wrote to memory of 1852 4752 chrome.exe 94 PID 4752 wrote to memory of 1852 4752 chrome.exe 94 PID 4752 wrote to memory of 1852 4752 chrome.exe 94 PID 4752 wrote to memory of 1852 4752 chrome.exe 94 PID 4752 wrote to memory of 1852 4752 chrome.exe 94 PID 4752 wrote to memory of 1852 4752 chrome.exe 94 PID 4752 wrote to memory of 1852 4752 chrome.exe 94 PID 4752 wrote to memory of 1852 4752 chrome.exe 94 PID 4752 wrote to memory of 1852 4752 chrome.exe 94 PID 4752 wrote to memory of 1852 4752 chrome.exe 94 PID 4752 wrote to memory of 1852 4752 chrome.exe 94 PID 4752 wrote to memory of 1852 4752 chrome.exe 94 PID 4752 wrote to memory of 1852 4752 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://45.207.168.170:7744/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe6e939758,0x7ffe6e939768,0x7ffe6e9397782⤵PID:1804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1864,i,1217913736295027448,15633892319655810231,131072 /prefetch:22⤵PID:488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2004 --field-trial-handle=1864,i,1217913736295027448,15633892319655810231,131072 /prefetch:82⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1864,i,1217913736295027448,15633892319655810231,131072 /prefetch:82⤵PID:1852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2908 --field-trial-handle=1864,i,1217913736295027448,15633892319655810231,131072 /prefetch:12⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2924 --field-trial-handle=1864,i,1217913736295027448,15633892319655810231,131072 /prefetch:12⤵PID:4728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4252 --field-trial-handle=1864,i,1217913736295027448,15633892319655810231,131072 /prefetch:82⤵PID:876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4328 --field-trial-handle=1864,i,1217913736295027448,15633892319655810231,131072 /prefetch:82⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2660 --field-trial-handle=1864,i,1217913736295027448,15633892319655810231,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1964
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4076 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:81⤵PID:4400
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3948 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:81⤵PID:2276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD5c92dd18f97005a26aa6b38454b0a3039
SHA1b8c0fa3fb1d0b9bef2a3138596934e7ce4334201
SHA25650d19eff275732bfab114d444eff96d6e50a5d11ecbe145789fa9ace7ac31192
SHA5124afbde79718f931069140cad6b62cea685752abd7cdfa2c91c72481377fb3770023f29c63a00345108d8e1126726c3ce24349ac4b71f85d789c707ef87893f70
-
Filesize
986B
MD5787a4711bb5eadac55bfc416e22277f8
SHA16f1f924a405fcff8f669be457e2e15330551a447
SHA2561e23fd1cdcbe6e3092a83730f462f4670982d0c1a64f55dbb1f68d0a48ce49d3
SHA51265fb9d095104aee2f514906ccba746f3160e367987037ca4c0aa21df06acae3a80daac650944bdda8161173cbd18c3290c53f18987b22716b28be2c80af15a4c
-
Filesize
690B
MD59181193f9164c1e577a5e9a88fae8a0e
SHA1c8775f9a996320a69af8e3839e9d2e8a86bf4ad7
SHA2565b70e25a258934d6fc92767c7ea03f84e03b178203c647a6dbf51d8388eab05d
SHA512f01f7406ad9cfa0e6c735870fc4dabfdb5d6cf62b18b9aa93b78999279111c226a4db2f9bec6de85e63f5c5954b3eb0a938e6739d244de27fda4d2eaf468b979
-
Filesize
6KB
MD50c359835bb74bec5329ba8e8aaaf27c7
SHA13d7c64b153cb9a446fa38d9a9decb45b061f8fe2
SHA256b631ae570d340d466345541a66ec72ad733a51c31081663d6d8e694c80d4dc7b
SHA512c79f502a636de005f88afd3bf278d62b649734252b4d302da62cda56e9159b3d2100b0f5a5968cbf9b67c2e1abcdad0faf3de065b3cd8fef54756f5854237588
-
Filesize
5KB
MD50c7cc5179c801928672d2fcf8c5f0ce0
SHA13397c29413ce2ec2bda2d990da32eee8376f9316
SHA2569b3003ff04ce6b806c327f58ea2da6edfc6709f427d7bd0f6bfa359b2ff6635e
SHA51230e06b06dc031106eacc201dabcc6a764a95745a2b89fe1bcce6b81f86347ec8dd8aaedbac4f1b4687e998f8a823af4d3183674349e87ab821374ffaeada68e2
-
Filesize
5KB
MD50b1d37e5c0af8a91cc059a378ee0f269
SHA1fabe701e0ff78f6ccdede7a61e15875ac1846b41
SHA256fb5a4301a6d9d1c900de5d22c53f5f4cce02da4f4b8a6a6bf113acd61c0cdfd5
SHA51232641b21dc91c779fb8a1b3771bc3f724883e86ce9e8c7d19057dabc894cc3e365ec2536aa58716c44cb71edbcbe1be3a80ee485a5bc339291920dd5cf30bed5
-
Filesize
6KB
MD5fb70eb0df29c8bf8363e1e37d278beec
SHA18aeeae0fcd32de70301bbdbda2da66f49d74dce6
SHA256ff2cde18d3045ba06f44dd49f6a5252b369ae9031bd23be36f4563437b488c32
SHA51228334c279057b789e35761c185ecbcd655579a60ad024f6aeca83a3d3abf99ce3696617a84c9d309a69d3751a278ac94fbf133e686fcecfae3746810b0b54799
-
Filesize
128KB
MD5a84c6c9d76196094de7287f4930cd0af
SHA15c19ac1b4f583045dd4e0c25f3fc7a2b7e931997
SHA2560793248aa479c61275b5cec8de0151a9c1054e91dceb117fc65359a14bcd0d18
SHA5120252048bf7aef7c323211672fe27ca0e37f4fbb3e66be607317ca725aa11164ca6f22dd9432d93eea2814d7ae6b0a13a663a8b732c920ad073d33a0451bd3704
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd