Analysis
-
max time kernel
600s -
max time network
604s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 10:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/realshavkat/shvkt-cloner/archive/refs/tags/main.zip
Resource
win10v2004-20240704-en
General
-
Target
https://github.com/realshavkat/shvkt-cloner/archive/refs/tags/main.zip
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133647377235300702" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 1248 chrome.exe 1248 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4544 chrome.exe 4544 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4544 wrote to memory of 4860 4544 chrome.exe 88 PID 4544 wrote to memory of 4860 4544 chrome.exe 88 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 5092 4544 chrome.exe 92 PID 4544 wrote to memory of 4948 4544 chrome.exe 93 PID 4544 wrote to memory of 4948 4544 chrome.exe 93 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94 PID 4544 wrote to memory of 116 4544 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/realshavkat/shvkt-cloner/archive/refs/tags/main.zip1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeab9eab58,0x7ffeab9eab68,0x7ffeab9eab782⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1660 --field-trial-handle=1864,i,7498085460305969424,15539462207471152967,131072 /prefetch:22⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1864,i,7498085460305969424,15539462207471152967,131072 /prefetch:82⤵PID:4948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2224 --field-trial-handle=1864,i,7498085460305969424,15539462207471152967,131072 /prefetch:82⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2932 --field-trial-handle=1864,i,7498085460305969424,15539462207471152967,131072 /prefetch:12⤵PID:4548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3104 --field-trial-handle=1864,i,7498085460305969424,15539462207471152967,131072 /prefetch:12⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3952 --field-trial-handle=1864,i,7498085460305969424,15539462207471152967,131072 /prefetch:82⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 --field-trial-handle=1864,i,7498085460305969424,15539462207471152967,131072 /prefetch:82⤵PID:3916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 --field-trial-handle=1864,i,7498085460305969424,15539462207471152967,131072 /prefetch:82⤵PID:1248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2748 --field-trial-handle=1864,i,7498085460305969424,15539462207471152967,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1248
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1060
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3896,i,3409420486566309625,12100452682816721435,262144 --variations-seed-version --mojo-platform-channel-handle=3856 /prefetch:81⤵PID:3160
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3848,i,3409420486566309625,12100452682816721435,262144 --variations-seed-version --mojo-platform-channel-handle=1448 /prefetch:81⤵PID:2608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5aa48fabd40851f9e15df7184fb997a48
SHA1f0d8b5c06ae00ec7af4eb4b40e5106b0964a8e46
SHA25656627e6838d84e2a645bf067e83287c770fe4242c471eb9bfa16ff6a02815ced
SHA5123f2ee1ebf39ea752612d769ea0635fa7c681cf5e301fb4a7d2f712fbcc11dec7cc6746b653e88e16bcd5e410ad1351824e5abe70e0e0c410b9f28f88f014a06d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
689B
MD59e616d45ce4089ae29bc277be2ac6d80
SHA1700d952b138572f92118788ecba800496fb34252
SHA256cf6d7f697a2a280d9d19748c3e73b65c0817f9879bd195bed363c14df6bc67cc
SHA5125671e2c450777e17a789779d495baf8028daca4e47ea5858293133d2385bbeba83fd515bf8e7de6e6dd48dbce22099203e8ed8c0459366dc61c9cd4f20a607a1
-
Filesize
6KB
MD5be10f3d745381d5155aeca99fd65ffc9
SHA14a62713f636c38f4df78e6546592aea99b2f515c
SHA25630eb0daaae172a3be97f74911cf0e8ca5b9678cd23e73055d526db554ea9807b
SHA512d4c2bfaa5fe760721c6ecb5862fb97264649674fbdf510e128598a74b07fc3bffb169debec42139a1fec72f79d9449f78d58bf0838eff3224efd29ffe7b43c75
-
Filesize
144KB
MD576f8aa9fa99741f6fa59743f9c19b08f
SHA1a8cdb347eff1fb91e54edc735c875cc3b9ee95bf
SHA2565a813c28fdc8c9831bce50d77dccbda88f1dd010915f739515fa2e8d7ce6d547
SHA512b95a3e6442a8052a5986159053c763c2291d866a4a8bdfc6e7c45aec5c129c75b87fd5b0fafc105766e359f0964e468210eb513224765305717d6653d970237e