Analysis
-
max time kernel
31s -
max time network
40s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2024, 15:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://jrkbd.nudum.tech/4jtSuW12173HBMZ880ufshwfniiq14781DBPBOLCRIGJEWFL1100IOLJ13123z17
Resource
win10v2004-20240704-en
General
-
Target
http://jrkbd.nudum.tech/4jtSuW12173HBMZ880ufshwfniiq14781DBPBOLCRIGJEWFL1100IOLJ13123z17
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133648408404120202" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 60 chrome.exe 60 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 60 chrome.exe 60 chrome.exe -
Suspicious use of AdjustPrivilegeToken 56 IoCs
description pid Process Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe Token: SeShutdownPrivilege 60 chrome.exe Token: SeCreatePagefilePrivilege 60 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe 60 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 60 wrote to memory of 1336 60 chrome.exe 82 PID 60 wrote to memory of 1336 60 chrome.exe 82 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 532 60 chrome.exe 86 PID 60 wrote to memory of 1544 60 chrome.exe 87 PID 60 wrote to memory of 1544 60 chrome.exe 87 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88 PID 60 wrote to memory of 1572 60 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://jrkbd.nudum.tech/4jtSuW12173HBMZ880ufshwfniiq14781DBPBOLCRIGJEWFL1100IOLJ13123z171⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ea20ab58,0x7ff8ea20ab68,0x7ff8ea20ab782⤵PID:1336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1900,i,18277380979413528564,11204549534303618503,131072 /prefetch:22⤵PID:532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1900,i,18277380979413528564,11204549534303618503,131072 /prefetch:82⤵PID:1544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2276 --field-trial-handle=1900,i,18277380979413528564,11204549534303618503,131072 /prefetch:82⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3028 --field-trial-handle=1900,i,18277380979413528564,11204549534303618503,131072 /prefetch:12⤵PID:4076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2952 --field-trial-handle=1900,i,18277380979413528564,11204549534303618503,131072 /prefetch:12⤵PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4448 --field-trial-handle=1900,i,18277380979413528564,11204549534303618503,131072 /prefetch:82⤵PID:1372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4552 --field-trial-handle=1900,i,18277380979413528564,11204549534303618503,131072 /prefetch:82⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD523cb3f7a06614bc7df5366d60d17511b
SHA114001ed9732b3d9b035d7873462ed236dc469b54
SHA256760ed2f7a576e7e83ca54f5132d2b50d1c94bf4de72eea4f072b71f5dae7cdcd
SHA512f400a79c1f8a9a621a7d131ed96e7f837f8b4a0d6a7aae0bdbae91e128b737bdf3b8a65d962607f675758777317a2227f04f16673e41b371b71567ff8156962d
-
Filesize
144KB
MD5b1b705669dc532facf6282b25e469873
SHA169891edb697e51bd7bd4da2728352f47bb96c01d
SHA256a544ba0352ff9f89085144d529205c2ffae0af4b30f47f876cfff433dcf53423
SHA5127c497e6bb00c9e617decd4c8e4b907a7246e9ccaf64d47536a80e9eff1ceeb31afdbc2a65a282640f0378d9d389ac35945fbeb3085804767a73caefb70b8b266