Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 16:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://n.wptrace.net/autograph/new_autograph/2R5M2/88QBIGI_.html
Resource
win10v2004-20240508-en
General
-
Target
https://n.wptrace.net/autograph/new_autograph/2R5M2/88QBIGI_.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133637212689678257" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1628 chrome.exe 1628 chrome.exe 3380 chrome.exe 3380 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2356 1628 chrome.exe 80 PID 1628 wrote to memory of 2356 1628 chrome.exe 80 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 5072 1628 chrome.exe 81 PID 1628 wrote to memory of 3096 1628 chrome.exe 82 PID 1628 wrote to memory of 3096 1628 chrome.exe 82 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83 PID 1628 wrote to memory of 3060 1628 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://n.wptrace.net/autograph/new_autograph/2R5M2/88QBIGI_.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb263eab58,0x7ffb263eab68,0x7ffb263eab782⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1604 --field-trial-handle=1972,i,5950089889194076581,6387441276138244979,131072 /prefetch:22⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1972,i,5950089889194076581,6387441276138244979,131072 /prefetch:82⤵PID:3096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2208 --field-trial-handle=1972,i,5950089889194076581,6387441276138244979,131072 /prefetch:82⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2992 --field-trial-handle=1972,i,5950089889194076581,6387441276138244979,131072 /prefetch:12⤵PID:1080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=1972,i,5950089889194076581,6387441276138244979,131072 /prefetch:12⤵PID:1288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=1972,i,5950089889194076581,6387441276138244979,131072 /prefetch:82⤵PID:3532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4104 --field-trial-handle=1972,i,5950089889194076581,6387441276138244979,131072 /prefetch:82⤵PID:1036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5112 --field-trial-handle=1972,i,5950089889194076581,6387441276138244979,131072 /prefetch:12⤵PID:392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3996 --field-trial-handle=1972,i,5950089889194076581,6387441276138244979,131072 /prefetch:12⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3944 --field-trial-handle=1972,i,5950089889194076581,6387441276138244979,131072 /prefetch:12⤵PID:2436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4144 --field-trial-handle=1972,i,5950089889194076581,6387441276138244979,131072 /prefetch:12⤵PID:4324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4124 --field-trial-handle=1972,i,5950089889194076581,6387441276138244979,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3008 --field-trial-handle=1972,i,5950089889194076581,6387441276138244979,131072 /prefetch:12⤵PID:744
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5621fecfcbf02bb67b059ff4fa1aa9f2a
SHA157edeb4fe8f2ca88ea2be84bb89253ac6e06a2b8
SHA256f921b5a27c722923c038c46c18db26a75a2e9453f2e3db85f4b7bda991d8672a
SHA51255f71ef6f34e392fe30d94a4cd597aaf8727aa426f08c7ac054d5674aa928a83c6296337943b7f40b0d9dffea4b845335acc9ec516136e143b5c3803d26f41fe
-
Filesize
7KB
MD54add45038ecf0cd7caf2078bb37c9f03
SHA113c2e18f4dbdeb71913ccde615e32e8588415b0a
SHA25678bd40c4a89e312da541a80b0d049350486b286b8dcbfd8a91e78d58492dbe85
SHA512e1409209c4eb1b2a2dc12bc4531627dfdf561f3577cf7ebfb93dabee0e902fa6fd12b4e6c94af6ce787ff12c2fa6aea776bbacc4703cc1890fdbfa1aeacafb3e
-
Filesize
129KB
MD5e4de1c2ba5e60cc93d49de02da0085ee
SHA128720f447f63daba6799024cf01efccd95b4426d
SHA256ce6a79d827e2d57765889997606b12b401f3eb182705a28c43f8dab11c1286f3
SHA512e2ff337028d56273f7bd3d2cd3f0d89d6943f1a214e7d9162546276b47a54e3f0ace22201d0f71893e927d27ed8677addc0d7c5995bfb2741317047f7f73acfb