Analysis
-
max time kernel
1800s -
max time network
1691s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
24-06-2024 17:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://hatching.io/blog/tt-2024-06-13/
Resource
win10-20240611-en
General
-
Target
https://hatching.io/blog/tt-2024-06-13/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133637227739578758" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2184 chrome.exe 2184 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2980 chrome.exe 2980 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2980 wrote to memory of 1368 2980 chrome.exe 70 PID 2980 wrote to memory of 1368 2980 chrome.exe 70 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1648 2980 chrome.exe 72 PID 2980 wrote to memory of 1680 2980 chrome.exe 73 PID 2980 wrote to memory of 1680 2980 chrome.exe 73 PID 2980 wrote to memory of 1556 2980 chrome.exe 74 PID 2980 wrote to memory of 1556 2980 chrome.exe 74 PID 2980 wrote to memory of 1556 2980 chrome.exe 74 PID 2980 wrote to memory of 1556 2980 chrome.exe 74 PID 2980 wrote to memory of 1556 2980 chrome.exe 74 PID 2980 wrote to memory of 1556 2980 chrome.exe 74 PID 2980 wrote to memory of 1556 2980 chrome.exe 74 PID 2980 wrote to memory of 1556 2980 chrome.exe 74 PID 2980 wrote to memory of 1556 2980 chrome.exe 74 PID 2980 wrote to memory of 1556 2980 chrome.exe 74 PID 2980 wrote to memory of 1556 2980 chrome.exe 74 PID 2980 wrote to memory of 1556 2980 chrome.exe 74 PID 2980 wrote to memory of 1556 2980 chrome.exe 74 PID 2980 wrote to memory of 1556 2980 chrome.exe 74 PID 2980 wrote to memory of 1556 2980 chrome.exe 74 PID 2980 wrote to memory of 1556 2980 chrome.exe 74 PID 2980 wrote to memory of 1556 2980 chrome.exe 74 PID 2980 wrote to memory of 1556 2980 chrome.exe 74 PID 2980 wrote to memory of 1556 2980 chrome.exe 74 PID 2980 wrote to memory of 1556 2980 chrome.exe 74 PID 2980 wrote to memory of 1556 2980 chrome.exe 74 PID 2980 wrote to memory of 1556 2980 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://hatching.io/blog/tt-2024-06-13/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff8fe089758,0x7ff8fe089768,0x7ff8fe0897782⤵PID:1368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1800,i,12578079047524421355,10492775313975021198,131072 /prefetch:22⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1816 --field-trial-handle=1800,i,12578079047524421355,10492775313975021198,131072 /prefetch:82⤵PID:1680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2112 --field-trial-handle=1800,i,12578079047524421355,10492775313975021198,131072 /prefetch:82⤵PID:1556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2892 --field-trial-handle=1800,i,12578079047524421355,10492775313975021198,131072 /prefetch:12⤵PID:1320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2900 --field-trial-handle=1800,i,12578079047524421355,10492775313975021198,131072 /prefetch:12⤵PID:240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4612 --field-trial-handle=1800,i,12578079047524421355,10492775313975021198,131072 /prefetch:82⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4692 --field-trial-handle=1800,i,12578079047524421355,10492775313975021198,131072 /prefetch:82⤵PID:4752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4724 --field-trial-handle=1800,i,12578079047524421355,10492775313975021198,131072 /prefetch:82⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4888 --field-trial-handle=1800,i,12578079047524421355,10492775313975021198,131072 /prefetch:82⤵PID:1808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1800,i,12578079047524421355,10492775313975021198,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2184
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5cef22e5565cb7c2c3807d9154c7eeb78
SHA1500cd59d4b6458c10e91fcbe2adb7b810ce25e08
SHA25680da1dcc66735ec193243f4fdfd6df8651dd9781ccad47a69917ac39d3bff23c
SHA51283c2c4a397446f8fccdcf029a3d817932d2e0d03410fa08efc37dcae8957537885de2e2b0632e5e60da499e22a4f35042aa705ce8c0c178b583c1681f9c89ffa
-
Filesize
1KB
MD538b9ee423e10fa01f5a76c17890d4735
SHA102e607fb99267fe20c01e5ec9533c5bbf1dba11f
SHA2561d1fde1a812884b0b711805ea86cc61f12d6fde431fcc2beceebbb21328f9f46
SHA512bf18b3fc25b5bccf7985985e1a8293e88be4f54327c5ac9e909a719d442d2a097edd0952b6c0fc4540f413b2a1099a26a492e4f7fc15508a41aa39700a265c39
-
Filesize
706B
MD5428fd2a725f3ac90f064a7fec29f6c2d
SHA1474733c52fe78f28d2fd60154bf36901fd9dc23b
SHA256da1d0640a6c8ef0984f7e23eff325d86fb20cbcb494cfe5dd7a3b32a4a9e5708
SHA512e0bbd5e27facdfcbbb7e2e18cd7a5f0b5ead1f9d195e4e671eba4ac249adc21d4ca2c6095cae1fb310787518edf16c8149f6732d9f82a911724469f406ed31c4
-
Filesize
5KB
MD5babe45cd2a15af19c1609d627328c137
SHA1b53aabe5fafaeffd86d9e140d1cc1abc05e26c0a
SHA25670330ee3dc9b5262b0ad7bb3cf08030f1776ebc51850486972d1d978055d6fdb
SHA51211e369a43181af6610ce5864fcd74204c5be408b9505d3d2085436b8141d762b57d53514e5c075822cb34b8c2f8bd535164a8dca2a932a539b59b2faa87792f1
-
Filesize
5KB
MD58b530ec8e4581a12c68860febef69e9f
SHA19aa39a08d3cd1f0e9fa6a67f17f1994f091d0fb5
SHA256cb4be41bba1feffeb38dd05b6cab2ddc30f31672fe4527bdc6b2eab8513fbaca
SHA51287b252c12b20bd3471c9b51117f6ea9ecc36721db0a9658efe13c6b5b8040bd1e24862337709f7175a4eacd56b4ad2f2197b2925d7854db17af7c1ff926a1392
-
Filesize
5KB
MD53c6e3e3a50fa530df013dce5cde832da
SHA1762c5a815e9500ceddf4f39b8cf409df079af833
SHA256aa5d5e1d1de87a7f72ac3970c72f1d965cb9ef99060fb53f338eb781333b2a93
SHA5124c4e1ee6eccfeeac0990c3acce5fae6b66c0872db016211c850faa17e1984a5523d646c29ac52124841c4bf995e418c356797d2d0754f1473602f1dba1d091d3
-
Filesize
150KB
MD5af3f26b47d670eaa06cbc29a874a35e7
SHA16c1795cb8c31a448e5810297f8867ec4cbff2f58
SHA256b4fdecc4fad5e9511536a6de9e498d4987e70a89370e3956c3295f8a107ccef8
SHA5127519b9838d4929d03c69d08444a751ccc527801497fc812e6964e511491a2f5831911f5c067a62cc8c0d27e3122e04105d6d56dc3ed31bc23cd3b6cee575dfa5
-
Filesize
150KB
MD54eee98e3652cbd6f80bd80d3e782bc21
SHA1594d034ad7ff8da82e5ce988169536d3b48a2641
SHA25695f11ecd1e268e3eb335e841667ed0ff99556b875854cb80cde709b522a65849
SHA512d12f545deb7eb7fd4825b473bdc6662f85eafde0072a7fbb565236bb2ee316a63ac8b83bacb96e2bdda919b308d171e42dd8d9cffa5af350482a39dbe81cc069
-
Filesize
150KB
MD56bbdd042cf4801c10c4b293c2e2f7ccb
SHA1bc7a02767bcd64ff94ea3f9cfbf0b069c8327643
SHA25632ac202fa4eb123e781d580b59c48b5ce97c170e9dd9c8f5ef15c5915b7575ed
SHA5120386d4287087a73188bbd8f07e166465fce9f1ca91bf1de95b68484670b439096b784df37b523315411a6938353ec62b7388a73450a8626341f2a332e6be2e1f
-
Filesize
167KB
MD58512773a8a49c15fbf6b5b9153baa6ab
SHA1650677e473212550bf6d8c8988af9093a2b1c0d5
SHA25658e2840c2f46586fbeaf0b8b41295753cd03d0cbc0bce90ba4909ae8b0d3dba8
SHA512930ce6417ce2f1aadcd03a9479ef2af9a4a6bb53cb4511bcd31b90730375a94e6fc59151935abc17bcc71ada12f827b7f439fc4354ab40c80c5eb7d6941cf91d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd