Analysis
-
max time kernel
0s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 03:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://clicks.gymlib.com/f/a/Mn8lTChytajzlckpnprKJA~~/AAAHagA~/RgRoZAcJP0QtaHR0cHM6Ly90aW55Lmd5bWxpYi5jb20vR1drQj9saWQ9d280ZTlqbTlxengwVwVzcGNldUIKZnQJgoFmdV5riFIXanVkaXRoLnN0b3JhQG1pdW1pdS5jb21YBAAAApU~
Resource
win10v2004-20240508-en
General
-
Target
http://clicks.gymlib.com/f/a/Mn8lTChytajzlckpnprKJA~~/AAAHagA~/RgRoZAcJP0QtaHR0cHM6Ly90aW55Lmd5bWxpYi5jb20vR1drQj9saWQ9d280ZTlqbTlxengwVwVzcGNldUIKZnQJgoFmdV5riFIXanVkaXRoLnN0b3JhQG1pdW1pdS5jb21YBAAAApU~
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious use of FindShellTrayWindow 17 IoCs
pid Process 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe 1220 chrome.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1220 wrote to memory of 648 1220 chrome.exe 88 PID 1220 wrote to memory of 648 1220 chrome.exe 88 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 2540 1220 chrome.exe 89 PID 1220 wrote to memory of 4588 1220 chrome.exe 90 PID 1220 wrote to memory of 4588 1220 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://clicks.gymlib.com/f/a/Mn8lTChytajzlckpnprKJA~~/AAAHagA~/RgRoZAcJP0QtaHR0cHM6Ly90aW55Lmd5bWxpYi5jb20vR1drQj9saWQ9d280ZTlqbTlxengwVwVzcGNldUIKZnQJgoFmdV5riFIXanVkaXRoLnN0b3JhQG1pdW1pdS5jb21YBAAAApU~1⤵
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdb251ab58,0x7ffdb251ab68,0x7ffdb251ab782⤵PID:648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1904,i,2279041330035432085,15439610648732063317,131072 /prefetch:22⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1904,i,2279041330035432085,15439610648732063317,131072 /prefetch:82⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2244 --field-trial-handle=1904,i,2279041330035432085,15439610648732063317,131072 /prefetch:82⤵PID:3304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2724 --field-trial-handle=1904,i,2279041330035432085,15439610648732063317,131072 /prefetch:12⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2732 --field-trial-handle=1904,i,2279041330035432085,15439610648732063317,131072 /prefetch:12⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4324 --field-trial-handle=1904,i,2279041330035432085,15439610648732063317,131072 /prefetch:12⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4536 --field-trial-handle=1904,i,2279041330035432085,15439610648732063317,131072 /prefetch:82⤵PID:3240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4644 --field-trial-handle=1904,i,2279041330035432085,15439610648732063317,131072 /prefetch:82⤵PID:836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1904,i,2279041330035432085,15439610648732063317,131072 /prefetch:22⤵PID:3624
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1292
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3452,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=4432 /prefetch:81⤵PID:3112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD55fb99e56fcc1fcefdca0718d5c08b12a
SHA1e26a77a893f58d35764771ce02aeeafd5bff459e
SHA256618769684bc28d441057e5c8d2712e6996121094ad0547f46fa6c0b8cdba4441
SHA512e9c3b13dd19428c9395d986b8268f957b16a795b8d76c17567f1f5317a44488200a16af7e15402b5724c8778137039a4e4002eddb2d984342e9523d79c7acc76
-
Filesize
2KB
MD5189e00bdcc69d3392d0e2d9e13bdeac4
SHA13e90db0f2d61084aacc9161400e27138d6b604af
SHA2567669009102ec2f2eee9d88f6b4fb65c80a57677b5e930db4257e57ad293affd3
SHA512e512aef07460f48be275061d697f58146670580d2873a4d904c1194d6135d7f0645e44a8207fa1a342b278936b40c6de8f98f8840ea680f3d36e09875f538801
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD50e655f81d7ce377a50d2cc4b62c278a7
SHA10e7a75dda72e13126b712bea7559a12ffcf6ed17
SHA25618265b85ff6151a2736661ba5aefc1c426a40b20ec5b6235f76f671656ac6fda
SHA512c72bdf8caa52b9eee98997fd1404b0ba68e365378a6406680c8bde2b23acaed73bcf8b4b289021f619afab81d5ad17b05c37febf1c9f409e8b9291fc12c00c70
-
Filesize
1KB
MD5021c8d3627c0142912d4c26370fcdd88
SHA111b8fd273b463169cc35f30fcd0636935768b4fb
SHA2560d7b95e4da3740dd0051f2e83e4e248254398b1e1bb09154c5545d9b0e9b512e
SHA512aaa2810523767510934345a7ba527866ef32aabf6c36c471ced48bcb2fcaa815a5beaf1acd9c4b45e2d44c1e430891048781292e687855496d8ddd6454396af5
-
Filesize
1KB
MD51b01c2f5f8003765144ae527448e300d
SHA167f9f88b31505109ff659b49e84c563100cc9739
SHA25661e7d681a35eea9ebcb191a8b9ca744b676d32ccd46d57bf3dd96db2b6f8c1d9
SHA512e05f48f05bb89538c169b597dab232bbb5b0dd095a1a8af76ca541b2d59a1f151d6c2a89f63e89c63e6ce468434b6cf718b878e98aed255f4e51894780741a5a
-
Filesize
1KB
MD566526a5eb35b51c4821eac669a2d8da7
SHA1b3d279c6f64cd4d582fdbc08da3144a73458ce64
SHA256ff29e2c5024edb280a2a82698aefa50964199326b836d1bbe4b48af04763ec5a
SHA5126ee8ad30daf79b8bff60309a174485d7ebd1f3b0b970e64778a4dfd36997476d165c17a183281cb50c63137e36dfb1703ae018a43018382bd30831044d78fde3
-
Filesize
7KB
MD591bae846471e720b2af63968c04bc17a
SHA1d4b09299f07fa807d54c20da2892ee9d858ec29b
SHA2567b3d235cfe85ce5ab707455901340b2b55cf9dfc3fde09257ef8372c9e3e140d
SHA512771aeec6c3e76715356bfc94f2530a95ad2602096ce9f9e0bf5e10b4fe38be2170e20ecf4401c9a0e219ead2a0a7c4ccebb2fbfe8738e6f26973d90388bc7515
-
Filesize
7KB
MD5eb49672b4eda5cf5378b9fd0a924af9a
SHA1c11caf73a0442c5e5d6641ed2778f8c712928a64
SHA25695281f072bf2c39ed5b36e11f51ab20cf97de4aad2d64f410a71d4375a4d19a7
SHA51243fd73f6caa7863a741abd7d073da3798e0269b8c431cc478037cdf0d394149a16fe8bedb12014000a50e92eaa5e6494a0e039e8f0664060f0b12f5a9675a23b
-
Filesize
255KB
MD5e0facc2a7bd5138880efa2d9620be65c
SHA158992a80388b75d7d7a3e0da3a8c6d6bc0c703a4
SHA256df87f749947afa7386b890426fd84b4d766f0fad51998f5c4ebcb0487e8b7eee
SHA51217efb5163dfadbe09717832fd143999fd2cfcea729a308851005c0454f2c057cf6b45bae0a332570201cdd36f914e25f8f9ae225edeb856da6ad535f56b35c64