Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2024, 10:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://sogei.torce.com
Resource
win10v2004-20240704-en
General
-
Target
http://sogei.torce.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4616 chrome.exe 4616 chrome.exe 3128 chrome.exe 3128 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4616 wrote to memory of 2940 4616 chrome.exe 80 PID 4616 wrote to memory of 2940 4616 chrome.exe 80 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3332 4616 chrome.exe 82 PID 4616 wrote to memory of 3380 4616 chrome.exe 83 PID 4616 wrote to memory of 3380 4616 chrome.exe 83 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84 PID 4616 wrote to memory of 2668 4616 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://sogei.torce.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffad17ab58,0x7fffad17ab68,0x7fffad17ab782⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1908,i,16827663050843049701,12983798573202478044,131072 /prefetch:22⤵PID:3332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1908,i,16827663050843049701,12983798573202478044,131072 /prefetch:82⤵PID:3380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2240 --field-trial-handle=1908,i,16827663050843049701,12983798573202478044,131072 /prefetch:82⤵PID:2668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2888 --field-trial-handle=1908,i,16827663050843049701,12983798573202478044,131072 /prefetch:12⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2896 --field-trial-handle=1908,i,16827663050843049701,12983798573202478044,131072 /prefetch:12⤵PID:896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4132 --field-trial-handle=1908,i,16827663050843049701,12983798573202478044,131072 /prefetch:12⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3784 --field-trial-handle=1908,i,16827663050843049701,12983798573202478044,131072 /prefetch:12⤵PID:2416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4632 --field-trial-handle=1908,i,16827663050843049701,12983798573202478044,131072 /prefetch:82⤵PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 --field-trial-handle=1908,i,16827663050843049701,12983798573202478044,131072 /prefetch:82⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1548 --field-trial-handle=1908,i,16827663050843049701,12983798573202478044,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3128
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
Filesize
168B
MD59d67a77e44ace7487fb38890685f083c
SHA1c1bb3c103f59662e1971615ab945a9c0c1fb1b30
SHA25672da3e8e2e6929941c59d8b0a92cb54e1ad7c606c7cd1a894874874dd9c5913c
SHA51262314e2c2b22bad2da08429dc3a632f8cd630f376a1f2f40c0759e8e73dbfc43b1768464f4ffcc1ebbbeed8644202fbc19af60d78e8325b9e70d211e6567fd8f
-
Filesize
2KB
MD54e3ba7ea29b36a2a0dbd003d9691d685
SHA1b6dab781ea0145a294c8fa8847f0aa48bf77f37d
SHA256406a27a31bb2baef0a14a076fc6eac361b0e4d77b27c0e70e523be0803a4c3dc
SHA51237634478a86d115f183f97c5bd27020b9811cb947384ef56be538c4b32f7ddce574fc3539e6fe90611b0735af4576e8ab251ab5d847b146517a65d4e194db989
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD50008ef65efc992ae27de6c8582f1c320
SHA109169792ffae34d1b37488975b5ed49f06df26a8
SHA256c6b889a77191e2ff5db273354446eb4f2a848942fa60328a063e22981e1cfc34
SHA51223c282ba09a2793172e615482527a9952319a8faab6526d354092fb92c6439f1af9d5c42a0f6302eb4fcc070b001315276ee0135f53bcc50f9c11367dd7350bc
-
Filesize
144KB
MD5d0748fad7ba2a407ab65a072bb3233a5
SHA1dbcb8cce727bf38c190faa94cba733bb69d6e246
SHA2561e73e9eccda14dcb2d6874f94560fdc36c4392d87098c1fe59fd8588a431a7bf
SHA51253c9386b4394bfc7502c172fa7781f60dbbf5372642eebd4d87768cb2ec989e2af7b5b112aa51630a23b50e0f767dd43f0c7ca7a035e46ee209adb3031580fad