Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 00:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://pramium.blogspot.com/
Resource
win10v2004-20240704-en
General
-
Target
https://pramium.blogspot.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133649580647086456" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3436 chrome.exe 3436 chrome.exe 4052 chrome.exe 4052 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe Token: SeShutdownPrivilege 3436 chrome.exe Token: SeCreatePagefilePrivilege 3436 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe 3436 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3436 wrote to memory of 4732 3436 chrome.exe 81 PID 3436 wrote to memory of 4732 3436 chrome.exe 81 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 4268 3436 chrome.exe 84 PID 3436 wrote to memory of 3400 3436 chrome.exe 85 PID 3436 wrote to memory of 3400 3436 chrome.exe 85 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86 PID 3436 wrote to memory of 2472 3436 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://pramium.blogspot.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0e0bab58,0x7fff0e0bab68,0x7fff0e0bab782⤵PID:4732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=2032,i,17333506197649614272,11408518757497599071,131072 /prefetch:22⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1952 --field-trial-handle=2032,i,17333506197649614272,11408518757497599071,131072 /prefetch:82⤵PID:3400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2248 --field-trial-handle=2032,i,17333506197649614272,11408518757497599071,131072 /prefetch:82⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=2032,i,17333506197649614272,11408518757497599071,131072 /prefetch:12⤵PID:1208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=2032,i,17333506197649614272,11408518757497599071,131072 /prefetch:12⤵PID:1180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4448 --field-trial-handle=2032,i,17333506197649614272,11408518757497599071,131072 /prefetch:12⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 --field-trial-handle=2032,i,17333506197649614272,11408518757497599071,131072 /prefetch:82⤵PID:4668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 --field-trial-handle=2032,i,17333506197649614272,11408518757497599071,131072 /prefetch:82⤵PID:4032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=2032,i,17333506197649614272,11408518757497599071,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4052
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD54aff5765372eb90f541d3eabd834fe3f
SHA17641f4ada7594fe5d9381b78aaec873c9865bf07
SHA256b2c89e3d4b407d4a2213d913394cf174657979b15b7f45a443947577f8048788
SHA512defb7e206373cd435915de2815f89c4cf939a816a573451f50dfcac5da4cca1faedcc7184f57ee748ce7e19c73229a68f8330ca59badd7c5e726f8a32edb92c3
-
Filesize
3KB
MD5b5192b126f0d10dd367f5679f1ddf6be
SHA12645ccbf7012f1c7fcf10494fcd82f120452c3ae
SHA2562356012ab1dbfd367c1caeda884eb4310f9ea1635695f3b140cc900b1d4b55e0
SHA512ccde3f3d5aff8e0a950bce9bad49f924f07c2cbb409c18ad77977ff41838a1a69c83671f9594ccca01b4476786955784194b7824bd523db1ce3c24253a079d8e
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD526c3d024c0a45fce51311f69d3c95c61
SHA19c3f9db03b3ab9fc19917c5095d44e82ed771096
SHA2567d0cc84aa8d118d55e76c925775cfbbd5b98dff9c055e7a3ee24f19ef795d93b
SHA51232e42bcee74d65bb9f7cb647ef1efabd53e4a7d2676a5cd4d941634292565fc3dc2a9a92b2c205ba26da3467009b93e61acac448e82586480c3270e102f012e0
-
Filesize
7KB
MD5d7fa7425c28ccd2e1b3c82a0d3f865a8
SHA1f68c68051cd3d74fbbb7ad6f487c38a7179e8fb7
SHA256b2892f8c0154fe81a2c1a9f4b812ac8339cf0d6a2548066eb4bb4b55e3759901
SHA512efbbe96b702d7d17550b5f9fc39ee51503cabfba6d929c0bf62f75f93cf385c4d320b1b1a81c7a89e5636de57f195619b7902a9ccd4138902408fe1802f3a2df
-
Filesize
144KB
MD5bcfb43ca76f8d8d1247dc3072c8959eb
SHA1ae046079272631a19233035fcff4956a3c8d05a8
SHA256fb40db8a99f7e6071437429e3d1d0e612cb6fb0dfb7e019a4972038d55c19ff6
SHA5123315a7b9607c7ed6ee642092aeca981fa4770b9d5aff9f48ef567cc5be923a5f0bd411260e8c801ed80953b7c0c62691553d97e25d2939b63c3466a50da6f2a8