Analysis
-
max time kernel
71s -
max time network
78s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
27/06/2024, 10:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://AhV3cTpms4e.softwarepatches.support/3/76708532-ac39-4f18-a476-b0b913a60663.png
Resource
win10-20240611-en
General
-
Target
http://AhV3cTpms4e.softwarepatches.support/3/76708532-ac39-4f18-a476-b0b913a60663.png
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133639584234013336" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5060 chrome.exe 5060 chrome.exe 3716 mspaint.exe 3716 mspaint.exe 5060 chrome.exe 5060 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5060 chrome.exe 5060 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 5108 OpenWith.exe 5108 OpenWith.exe 5108 OpenWith.exe 3716 mspaint.exe 3716 mspaint.exe 3716 mspaint.exe 3716 mspaint.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5060 wrote to memory of 4268 5060 chrome.exe 71 PID 5060 wrote to memory of 4268 5060 chrome.exe 71 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4856 5060 chrome.exe 73 PID 5060 wrote to memory of 4300 5060 chrome.exe 74 PID 5060 wrote to memory of 4300 5060 chrome.exe 74 PID 5060 wrote to memory of 236 5060 chrome.exe 75 PID 5060 wrote to memory of 236 5060 chrome.exe 75 PID 5060 wrote to memory of 236 5060 chrome.exe 75 PID 5060 wrote to memory of 236 5060 chrome.exe 75 PID 5060 wrote to memory of 236 5060 chrome.exe 75 PID 5060 wrote to memory of 236 5060 chrome.exe 75 PID 5060 wrote to memory of 236 5060 chrome.exe 75 PID 5060 wrote to memory of 236 5060 chrome.exe 75 PID 5060 wrote to memory of 236 5060 chrome.exe 75 PID 5060 wrote to memory of 236 5060 chrome.exe 75 PID 5060 wrote to memory of 236 5060 chrome.exe 75 PID 5060 wrote to memory of 236 5060 chrome.exe 75 PID 5060 wrote to memory of 236 5060 chrome.exe 75 PID 5060 wrote to memory of 236 5060 chrome.exe 75 PID 5060 wrote to memory of 236 5060 chrome.exe 75 PID 5060 wrote to memory of 236 5060 chrome.exe 75 PID 5060 wrote to memory of 236 5060 chrome.exe 75 PID 5060 wrote to memory of 236 5060 chrome.exe 75 PID 5060 wrote to memory of 236 5060 chrome.exe 75 PID 5060 wrote to memory of 236 5060 chrome.exe 75 PID 5060 wrote to memory of 236 5060 chrome.exe 75 PID 5060 wrote to memory of 236 5060 chrome.exe 75
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://AhV3cTpms4e.softwarepatches.support/3/76708532-ac39-4f18-a476-b0b913a60663.png1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffa0b0a9758,0x7ffa0b0a9768,0x7ffa0b0a97782⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1864,i,16795013552567495861,195315250885242247,131072 /prefetch:22⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1824 --field-trial-handle=1864,i,16795013552567495861,195315250885242247,131072 /prefetch:82⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2120 --field-trial-handle=1864,i,16795013552567495861,195315250885242247,131072 /prefetch:82⤵PID:236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2704 --field-trial-handle=1864,i,16795013552567495861,195315250885242247,131072 /prefetch:12⤵PID:4732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2732 --field-trial-handle=1864,i,16795013552567495861,195315250885242247,131072 /prefetch:12⤵PID:728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4184 --field-trial-handle=1864,i,16795013552567495861,195315250885242247,131072 /prefetch:82⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4572 --field-trial-handle=1864,i,16795013552567495861,195315250885242247,131072 /prefetch:82⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 --field-trial-handle=1864,i,16795013552567495861,195315250885242247,131072 /prefetch:82⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 --field-trial-handle=1864,i,16795013552567495861,195315250885242247,131072 /prefetch:82⤵PID:2680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4688 --field-trial-handle=1864,i,16795013552567495861,195315250885242247,131072 /prefetch:82⤵PID:4332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3752 --field-trial-handle=1864,i,16795013552567495861,195315250885242247,131072 /prefetch:82⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2812
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4408
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s DeviceAssociationService1⤵PID:824
-
C:\Windows\system32\dashost.exedashost.exe {ff72b258-83c8-420d-854b4d3698edd36d}2⤵PID:3416
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5108 -
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\76708532-ac39-4f18-a476-b0b913a60663.png"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD51e138da4fd3356c12df8869ac387a765
SHA18b12b1b05947a8a9783c9d6727e9e75a1aa46942
SHA256f49dbb5b400e4f56173816d605dde2d09e307346836c9dd79af3b5f1968d50f8
SHA512ecf87060920994706ccff7e19f0cdcc3805336ef66daa76ec0431dde86505c88636ae7c113207fd6cc403cbbcd07f92a019b0c9721c327cc6db46288ba418db5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\afd3459f-0cfd-4924-8896-626629fc3eb3.tmp
Filesize5KB
MD5a9172ad38bfef4c48d3694bdada84495
SHA1010f6821d6d10b7601c631a114cd3d25e27abb6c
SHA25693e31946e9268b85e7864ac6c3f616e7856e6f61ab0b04fe51e6f9a2d3b8e1a7
SHA512a53e3160518b77edc3a77ed2616d820e1b5c14ebf2a9eefc7bbfdd6412e97e92150f5daf82852fd62621cedd98c85f7512510d679f4c5b0f5d1826660474a0e1
-
Filesize
150KB
MD5ef9ab2cd5bfc6f71d2790c7c26da8368
SHA1ada1f6960c296bef7c8a852c6ac0a2b9c8a88891
SHA2562e5f4fa1fecb543ceac8233873be8956d360be7f98f0c0d6b4df7e469aca2249
SHA51279bd432e9655a628ff33b1074e39bde502b16cc683b552f59e5aea11236360cce53ff88b340639ed691193aae922d69726f9bbfec723a0d7d98816151e051cd3
-
Filesize
150KB
MD595aed71ebd725ef441a7ded6353e1532
SHA1972e8269fe96ceb3657128cb771d01577f506aa9
SHA25635cd4ea249bc404a77dc6574d318b38e4ec1d5959f7d66e515ba6d288a97b9e6
SHA51212ca17f4d7604947d704a8b5f5a5f7b7111908302c85d885c4b40589c865c0ff560c5c98cf5d06cf50a1440c833afa44324d4ce41b9d386211ffbd1216cb4db8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
68B
MD54cb1af037c42e0c2261d44f0628e6945
SHA10da4dfd0e66d2730bcacfe06f94579eef2483bd7
SHA2564e754b6398ee1dbd5e404322f751c6cab7e531ee0a4056a146a08afa1c80fece
SHA512089f5ed58235ef47e37747b803ba1364bb4f24164e727e77f42e3deb0ec699fec94f659b6e22de1fd472074dc48089b241d95643b973ea9a4a1296a3c76b08be