Analysis
-
max time kernel
134s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
29/06/2024, 01:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.instagram.com/just_donut0/
Resource
win10-20240404-en
General
-
Target
https://www.instagram.com/just_donut0/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133640966757220625" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4364 chrome.exe 4364 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4364 chrome.exe 4364 chrome.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4364 wrote to memory of 2776 4364 chrome.exe 72 PID 4364 wrote to memory of 2776 4364 chrome.exe 72 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 3568 4364 chrome.exe 74 PID 4364 wrote to memory of 4092 4364 chrome.exe 75 PID 4364 wrote to memory of 4092 4364 chrome.exe 75 PID 4364 wrote to memory of 4872 4364 chrome.exe 76 PID 4364 wrote to memory of 4872 4364 chrome.exe 76 PID 4364 wrote to memory of 4872 4364 chrome.exe 76 PID 4364 wrote to memory of 4872 4364 chrome.exe 76 PID 4364 wrote to memory of 4872 4364 chrome.exe 76 PID 4364 wrote to memory of 4872 4364 chrome.exe 76 PID 4364 wrote to memory of 4872 4364 chrome.exe 76 PID 4364 wrote to memory of 4872 4364 chrome.exe 76 PID 4364 wrote to memory of 4872 4364 chrome.exe 76 PID 4364 wrote to memory of 4872 4364 chrome.exe 76 PID 4364 wrote to memory of 4872 4364 chrome.exe 76 PID 4364 wrote to memory of 4872 4364 chrome.exe 76 PID 4364 wrote to memory of 4872 4364 chrome.exe 76 PID 4364 wrote to memory of 4872 4364 chrome.exe 76 PID 4364 wrote to memory of 4872 4364 chrome.exe 76 PID 4364 wrote to memory of 4872 4364 chrome.exe 76 PID 4364 wrote to memory of 4872 4364 chrome.exe 76 PID 4364 wrote to memory of 4872 4364 chrome.exe 76 PID 4364 wrote to memory of 4872 4364 chrome.exe 76 PID 4364 wrote to memory of 4872 4364 chrome.exe 76 PID 4364 wrote to memory of 4872 4364 chrome.exe 76 PID 4364 wrote to memory of 4872 4364 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.instagram.com/just_donut0/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffd9edc9758,0x7ffd9edc9768,0x7ffd9edc97782⤵PID:2776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1572 --field-trial-handle=1780,i,11855825379592516803,3756277435997470327,131072 /prefetch:22⤵PID:3568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1812 --field-trial-handle=1780,i,11855825379592516803,3756277435997470327,131072 /prefetch:82⤵PID:4092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2068 --field-trial-handle=1780,i,11855825379592516803,3756277435997470327,131072 /prefetch:82⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2848 --field-trial-handle=1780,i,11855825379592516803,3756277435997470327,131072 /prefetch:12⤵PID:1852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2868 --field-trial-handle=1780,i,11855825379592516803,3756277435997470327,131072 /prefetch:12⤵PID:3576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4652 --field-trial-handle=1780,i,11855825379592516803,3756277435997470327,131072 /prefetch:82⤵PID:1396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4732 --field-trial-handle=1780,i,11855825379592516803,3756277435997470327,131072 /prefetch:82⤵PID:4948
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456B
MD5aee6c11b3515d48440b363f5ba6ef03b
SHA177b799a2dc694f474690e246a95ad2f32c12d112
SHA256a9c4c1ed8d3d5e99f9e65b167533e3aa4e99ab5917761149597a4c03563e1889
SHA51287da19d3ff8a2f70f9dece3383575377d2b0d104a3ecb8f01ead24be10d81400c00eafde9e6fa3f017f79e57b0fd841c8cadc576331826f1eb0d5ec081b7d6d6
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD582fa7a6b3d78713403881c1e45d3b71d
SHA18567e4fc988684f226d96200e031bac4c0f237c4
SHA256366542ec862562a8eb031afd0ed53896cf13074545113a42dcedcbb36fe55c14
SHA5122a814103ea4425dfcc10cd98331cb0352cb4df16c612113d35d1d0799beeeea3d7e090a46a6a03c9fe61a08dd8e57698c7710ff73a1e874849a1fcdb602227f5
-
Filesize
873B
MD5a516c5d55e540015ccdf753dffdf73f7
SHA1eab257e43dfdbf63ee2a01516b0d36c39aa7da91
SHA256bb3171abd0e2189e59554ca745b5f73785aeb624a3591e7fca2272de3c11ffa6
SHA512b7cfb20ef5e2ea4d98d8d4f8306b41565a871ec1dd05f129827f1c8f11b9ac7f45850b5ccf5de74625871a29c9957d15af3f9b91a4cbe0b2a862a51557c75384
-
Filesize
873B
MD5515340306356448a38f937d421b8ef39
SHA1b5c5a7a7f805d789ed8447765792564ce997734f
SHA256d4ec4f64b2a6232404c65ae7b372fbdc423e512d4055bec51e5bb40bf6d872b7
SHA512d0291bec592be6600f7dd154b2be12e150836534a213ea7d57d6599c4f1625fcf0021edd6cbe5829880182b4e99a893277c232727659828c2264edaf9b67f195
-
Filesize
6KB
MD574d900830cd69573bd7bcff1557edc79
SHA19471939e16d0915e4e5b1a9fd5ca5dee33670130
SHA25696cd808f144b5f80ca5ba0dfde778651525683386f469f1ce220d83d06d865cb
SHA512f8d5457291fcc03fdd3049c7e2027767a0c5c5dfa661406e8cb32666791bcda2424fc248061c13c73a84a008cdff6d4fe2bb559d71133ab26c9c4e5d340227cc
-
Filesize
6KB
MD56b0cf6145c374aecc261e6930c1c792b
SHA13fee19396df6a2f4bb25fb47edecb5dc86ef61b5
SHA256cec446d64167b812832f658f4a2aa9d306c103587deefe9380dbcdbe92f71042
SHA51273e577f195c01db726895b0d7528795e7c9112c81372f3ed5aa7a35c5e66fbce21adb5bccce9687ddacea88007d43564182b49c352f7ed90d2a251c312f429a4
-
Filesize
136KB
MD5291d9ca20bd353bd6892f2be203a5ff5
SHA181da90891f195183d2f4758aa6c682cc4eaf9549
SHA256f71d1c97d0536c098f47313e518a65c0e30cc2bdfb0e4647ce0942b457566736
SHA51214421a29f4e9425136904be7d19f93b9f3fed00b13e5a3487e017ddbdb3bffd28a57800d1af748b6639366eaea30c50814a9b02f53cf7aed704cc452b2689833
-
Filesize
136KB
MD5b11531a07880782ac9a0cafa28a3d9aa
SHA129211f8617a93d639ad8c843860361c803ea6bb8
SHA2560db1ebaf127ebdb21f7611e5b1f2e99701f0a0f2e0a4ac2926e98ac082d8dc1f
SHA5128c14e2f3d6fed21e2b809baef5795084dc9031a63ece56c9c2739a0e4d2a6ece7e0f9976547bc341cb820c03feae511d974ae904ba793c81571301ce359b2ee7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd