Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2024, 00:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://youtube-hussain-tools.replit.app/eyJpZCI6IjEwODQ5ODEwMTMifQ.HJdubseohksgO9PrmlW7YXImVe5aqSEAnyhR8tNUEk4/L3N0YXJ0/MTIzNA==
Resource
win10v2004-20240611-en
General
-
Target
https://youtube-hussain-tools.replit.app/eyJpZCI6IjEwODQ5ODEwMTMifQ.HJdubseohksgO9PrmlW7YXImVe5aqSEAnyhR8tNUEk4/L3N0YXJ0/MTIzNA==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133640097130138412" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3169499791-3545231813-3156325206-1000\{507C134B-404A-4C9E-AF81-7A491767B469} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1740 chrome.exe 1740 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1740 chrome.exe 1740 chrome.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: 33 3940 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3940 AUDIODG.EXE Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1740 wrote to memory of 1220 1740 chrome.exe 84 PID 1740 wrote to memory of 1220 1740 chrome.exe 84 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4716 1740 chrome.exe 85 PID 1740 wrote to memory of 4484 1740 chrome.exe 86 PID 1740 wrote to memory of 4484 1740 chrome.exe 86 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87 PID 1740 wrote to memory of 2504 1740 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://youtube-hussain-tools.replit.app/eyJpZCI6IjEwODQ5ODEwMTMifQ.HJdubseohksgO9PrmlW7YXImVe5aqSEAnyhR8tNUEk4/L3N0YXJ0/MTIzNA==1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff8c58ab58,0x7fff8c58ab68,0x7fff8c58ab782⤵PID:1220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1944,i,2916877008390717504,18055708258080362237,131072 /prefetch:22⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=1944,i,2916877008390717504,18055708258080362237,131072 /prefetch:82⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2260 --field-trial-handle=1944,i,2916877008390717504,18055708258080362237,131072 /prefetch:82⤵PID:2504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2980 --field-trial-handle=1944,i,2916877008390717504,18055708258080362237,131072 /prefetch:12⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=1944,i,2916877008390717504,18055708258080362237,131072 /prefetch:12⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4396 --field-trial-handle=1944,i,2916877008390717504,18055708258080362237,131072 /prefetch:82⤵PID:400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4556 --field-trial-handle=1944,i,2916877008390717504,18055708258080362237,131072 /prefetch:82⤵PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4088 --field-trial-handle=1944,i,2916877008390717504,18055708258080362237,131072 /prefetch:82⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4608 --field-trial-handle=1944,i,2916877008390717504,18055708258080362237,131072 /prefetch:82⤵
- Modifies registry class
PID:2300
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:740
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x548 0x5581⤵
- Suspicious use of AdjustPrivilegeToken
PID:3940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\8df12ede-a933-471d-b4fe-cc982a1857a9.tmp
Filesize2KB
MD5c240d00c3ddac42cf843bd9d1c63cf40
SHA1ba3ce795147372276bf9b95f4f6d9c112a98f3a5
SHA2562621ca8158fff281e256374a5dab766d82da96d08b79c05407f6700e48bab3ea
SHA512d886394c28e56cc878cb65fbfc9b7df8bc37ce93fd2109dcf50200932a350e43f1fbc5a25a908c74a511ae4c6e5913ee8189d6bfa7138c07f62d68049d6eb617
-
Filesize
1KB
MD575c90d07ba2bf15f4038141c8dd51c7a
SHA11ca3901facdb82fb80ad03f5b59f008737e6eca5
SHA25651b19f922ed5a2ad82ab535249caf66fe33a4f83714982a50baa4964e7b991d4
SHA512bf59da19e825bce51e810270592d947e62586a27b705d21414643d3c1a7083db407cc784ee651e5236b03d95df1f43a9036122556495f67c61e691c314f1e4d9
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD564c31c8b8767c7a23dd71146fa88e56c
SHA12099fcc6e199d630f4fd0bd121096a40b5e40f5d
SHA2565a21a34eb67e0fe9b7eb494eebc145a17db23f91c34f064d8402c54d4e26234c
SHA51270eac0483fa7e781dfe113c5d3e115088608d8f5b3da7b29898adae5ae8f95d4915689ab322955e77d225a91141956e56571799fa955f14d9ef7970168994f4e
-
Filesize
523B
MD5298d4d3cc12554dc1280c6d0f8b7fe85
SHA105a56ad6dccc908ff9c84adfa504fc97657dab16
SHA2561f32f31908d27b0a8e9d7e454a13db492f4da0d6cced9800123e8657c73627b0
SHA512d88bcc6c5f5fc50b6e0fd4635279ea1d05cc490a031807447e6c80a94a77f40e78b0e49f4df03fe80a780353d0f003fee289313865e7a1fd82f81167233c7f6e
-
Filesize
8KB
MD56eda37ae8c4cfb09541b829b8a83ebbe
SHA1ffd0b9c86712d31e53857b65b9aefed84cb586b7
SHA256a9ba0245c33aa1069d41b3c5b99c0b2a3ea1c2f6561ce826626d8cfb312dbfe9
SHA5129a7cc6afe9e4394b052e7fe75e5b1b851607bdfbaa138657ce27e624ddaf8c3ca5db7fd5b4cb6555f6a2fe6875242807c9069838af8453eee36d16289d2b68db
-
Filesize
7KB
MD57b365045b5ea3b2c9e3937e65feed5b3
SHA19d185e4251143259e848d9ad1718bc08d31bef36
SHA25682f71c0a9e62f12ad53ce85f4ee83d2ea034a7aa3b8712eb007d5063321ce3fc
SHA51241c1fcc6ddc2577260e2b7c94ef1b6a82c72569fa3fb727e5157d052cdd80692ada63221e3200e71ffad904f8da1ae3a5f00f2589bdf6e65c1089be41d54112e
-
Filesize
138KB
MD5a00c62d6afc0a03ca0e14061268a4fe4
SHA152be88c96a32aada2691a5fad3e67e88dd9c7c6c
SHA256a03c09f51d5c4cb5788adb1517db4591ee58d1e9e450a6d42b8544b122225aba
SHA512f8f82fe675dc0b38819767600691f52df496c7818429822e568961c597f37ccf28536c7cc4465c22c5e50dc5331ea3cc31f3a31fa5b285374249a99c3df02306
-
Filesize
138KB
MD535cb14330a53c482c22c14fec7cc1b49
SHA1b91819c44dda9386df634ecb63549b0e871a7858
SHA256adcd76cbab561c490fa86a5a3c4041b19dcb7f9b54c755de781c21c219a74203
SHA51207c65909dcf9c0b573708d82ae90e486f922e82ca1874876cbacee738c729f27ce06bdb482e27010d0fa81319a24b625226455d66e2a32b419df17ebc1ab8ee3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58