Analysis
-
max time kernel
73s -
max time network
75s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/06/2024, 08:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://store.lylanodes.xyz/servers
Resource
win11-20240508-en
Errors
General
-
Target
https://store.lylanodes.xyz/servers
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 17 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133636920468699647" chrome.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "24" LogonUI.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2284 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3164 chrome.exe 3164 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2284 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 2284 vlc.exe 2284 vlc.exe 2284 vlc.exe 2284 vlc.exe 2284 vlc.exe 2284 vlc.exe 2284 vlc.exe 2284 vlc.exe 2284 vlc.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 2284 vlc.exe 2284 vlc.exe 2284 vlc.exe 2284 vlc.exe 2284 vlc.exe 2284 vlc.exe 2284 vlc.exe 2284 vlc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2284 vlc.exe 4740 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3164 wrote to memory of 2596 3164 chrome.exe 77 PID 3164 wrote to memory of 2596 3164 chrome.exe 77 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4948 3164 chrome.exe 78 PID 3164 wrote to memory of 4424 3164 chrome.exe 79 PID 3164 wrote to memory of 4424 3164 chrome.exe 79 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80 PID 3164 wrote to memory of 1940 3164 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://store.lylanodes.xyz/servers1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8c32eab58,0x7ff8c32eab68,0x7ff8c32eab782⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1812,i,12227965106711818171,18055549148953040155,131072 /prefetch:22⤵PID:4948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=1812,i,12227965106711818171,18055549148953040155,131072 /prefetch:82⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2112 --field-trial-handle=1812,i,12227965106711818171,18055549148953040155,131072 /prefetch:82⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1812,i,12227965106711818171,18055549148953040155,131072 /prefetch:12⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2912 --field-trial-handle=1812,i,12227965106711818171,18055549148953040155,131072 /prefetch:12⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4060 --field-trial-handle=1812,i,12227965106711818171,18055549148953040155,131072 /prefetch:12⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4364 --field-trial-handle=1812,i,12227965106711818171,18055549148953040155,131072 /prefetch:82⤵PID:904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4492 --field-trial-handle=1812,i,12227965106711818171,18055549148953040155,131072 /prefetch:82⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3708
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4804
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\DisconnectLimit.mp2v"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2284
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a0e855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5081c4aa5292d279891a28a6520fdc047
SHA1c3dbb6c15f3555487c7b327f4f62235ddb568b84
SHA25612cc87773068d1cd7105463287447561740be1cf4caefd563d0664da1f5f995f
SHA5129a78ec4c2709c9f1b7e12fd9105552b1b5a2b033507de0c876d9a55d31678e6b81cec20e01cf0a9e536b013cdb862816601a79ce0a2bb92cb860d267501c0b69
-
Filesize
216B
MD56899c46112b4a14763942d004a5ffbdc
SHA1caceee7fe0c405bea215b60dcece781bc1bf4451
SHA256b7752ce5e36e677d1a5de2c95602fec487738d5eb1415cb66898e16ec1a5485a
SHA51227e247962d656a97eaea8b61e1f0abc5ee368f41ad19fe988ca1c9a0d1484032f89790cfce51b36b1404224222238223f5c876e2ea739ae5eb1189718ddbf6c8
-
Filesize
2KB
MD5971890d298527b7b62b8c8a14995d99e
SHA1ab25c3129d9dc22f8de1d8b3f87dc0ed9dd956bb
SHA25642b5cea74fddcbce71889d690f4aea076b1082bfb6b38c100ded70ba6eb91265
SHA512ed70d1622b64728a5ad11b591ca7f65c8f7a3ce06d8c3b55b023ca591ea02f64541b670f5cf2ac76161ebbc8803454d0b99a2f99fcbda9e0c4a770502cdff631
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
691B
MD502904c5b07b53dfc0a55d3e06980dc9b
SHA111caf5c23be37ae5cefc650a631519a143cb8c73
SHA2567bba7eb3f2a95d3e020182c84c48b31904035a74e3dbf1d3c903208715eb12ca
SHA512e660e0b7947042ae092f076f719becd4cdbb8e6eddefe0125ee03cb1d50c5e3266241ebdf5e772d542c37c74d1a8f20904654c1ae9c90e5879a2c5d590e956ed
-
Filesize
7KB
MD5a481d1991ca0854c2a77f52efa57377e
SHA1f552407326a605c8cbdc2e6364ac73c642e68662
SHA25671fde10dfe5141cbb1929b4adf2aee9eeea55b1c04f4182d3cf29d8f8ecab239
SHA512714d3841b7c85a2b4a750c3046ba750e56a77a4ccafe0465ceb4c8b1db0ca9cee03d40740f965ce6be060d782b13ecb3e73e64c921a1baf5899f8237eaba7807
-
Filesize
7KB
MD59e29d170820c7a9264b1424d8e742c7a
SHA12f971ed43be4d3ff1a898d008c420d32cba17431
SHA2561b840cb3fa3612c6804aec58d423f671c63f74be5a9f08d65f25d04b9d3e6188
SHA512f4d29bd63643a3944d283c1fca591d6906f1c72f123dbf9f84188b2a9afc070fdd1b293828e2687b1faab773e9246b77ae6abbaab34bf7c852fca202b2353630
-
Filesize
129KB
MD5a2bf5f14afd729c7f98d1252cb3c1345
SHA1a9db3857eb771edff7399f8493430981c072a5df
SHA2567a148f3c1081cd93580c4e3246e5bec5cf6d236e538b28ad2861d58d49a72a37
SHA512038910fc6dc09eab1a9ef817ff92f439e63584ed8a25f64d0aa06309664b6822ff824b6a1f4f5d2287d6da10f4dfb88b38783b1aa9ac356a348c049dbd7ba2cf
-
Filesize
129KB
MD5624ed6d8f17c4f1d8cc7739b99624b47
SHA15b9aec870ca98fdce0e3bd46bbe19c57b20bbd98
SHA256a6505966fb821aca5503b397a6a02e31536e3620b22552ced9d0cfefb8fcc90b
SHA5125d1a8bfc811e79e69662f8cd8cdddb3a3a530d6941bb857644c28e0bac0073d5f94132b50ef6ddc3d978e3f0e1843ff788219801ce84ef630573b7280f4129ed
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58