Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 07:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://vk.com/video_ext.php?oid=265817687&id=456241880&hd=2
Resource
win10v2004-20240704-en
General
-
Target
http://vk.com/video_ext.php?oid=265817687&id=456241880&hd=2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133649837585932921" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2480455240-981575606-1030659066-1000\{E62FE4BA-8D83-4607-AE71-6838DD1BF6D9} chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3660 chrome.exe 3660 chrome.exe 4820 chrome.exe 4820 chrome.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 648 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: 33 4288 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4288 AUDIODG.EXE Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3660 wrote to memory of 2388 3660 chrome.exe 82 PID 3660 wrote to memory of 2388 3660 chrome.exe 82 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 3380 3660 chrome.exe 84 PID 3660 wrote to memory of 1232 3660 chrome.exe 85 PID 3660 wrote to memory of 1232 3660 chrome.exe 85 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86 PID 3660 wrote to memory of 3548 3660 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://vk.com/video_ext.php?oid=265817687&id=456241880&hd=21⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcecbbab58,0x7ffcecbbab68,0x7ffcecbbab782⤵PID:2388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=2268,i,12142155378000849648,15975373312228095124,131072 /prefetch:22⤵PID:3380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1944 --field-trial-handle=2268,i,12142155378000849648,15975373312228095124,131072 /prefetch:82⤵PID:1232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2008 --field-trial-handle=2268,i,12142155378000849648,15975373312228095124,131072 /prefetch:82⤵PID:3548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=2268,i,12142155378000849648,15975373312228095124,131072 /prefetch:12⤵PID:3476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3004 --field-trial-handle=2268,i,12142155378000849648,15975373312228095124,131072 /prefetch:12⤵PID:3972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4352 --field-trial-handle=2268,i,12142155378000849648,15975373312228095124,131072 /prefetch:12⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4568 --field-trial-handle=2268,i,12142155378000849648,15975373312228095124,131072 /prefetch:82⤵PID:3604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4564 --field-trial-handle=2268,i,12142155378000849648,15975373312228095124,131072 /prefetch:82⤵
- Modifies registry class
PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4188 --field-trial-handle=2268,i,12142155378000849648,15975373312228095124,131072 /prefetch:82⤵PID:1800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 --field-trial-handle=2268,i,12142155378000849648,15975373312228095124,131072 /prefetch:82⤵PID:4692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 --field-trial-handle=2268,i,12142155378000849648,15975373312228095124,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4820
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:112
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x500 0x2a01⤵
- Suspicious use of AdjustPrivilegeToken
PID:4288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c227ec01bdf982d45fea9317abbf23fe
SHA18838948b554442457fb829e8fc258b2b9915dc3c
SHA25655d64b72ad88513904808e98ea55dc935cb93917481243e949f3b1471334191e
SHA512ffbed414098df946d287f8cec49f4ee3d5fbb6391259222481d94e40540195eb59190aa64e9bf923e11d99c203bd821094ac924b43d2a86ae4607ac8e2345da5
-
Filesize
1KB
MD58d909b54506f61893d186c0883e28971
SHA1ff1a0870d0309f2d5be984c580acc71de5b105e4
SHA256f18841c9030f7c019e782156409fd636096bec55d4c72bcdf194e6875093b23c
SHA512035142032e6985e4fca3117f866e51f1d66d8c109993b68574cae763bfb6239b212065bc2d451dd169933d76ce4dde520e578bd1229293a35f289b78480a3613
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5157b571878464f063f7092d2810b8280
SHA1da50e3d10b6b18c9fdcfad38bcefae5b168168bc
SHA256831795805ab9363370e5a978e0c5b95b97ce4eb2b07e3f39a43fce727f2535dc
SHA512fd31247afc4772ae8c05696bd856f716f6596240ca339b854ac4d7b3916dc713406deab26f699d1f2f6f6ac07921cfd906688e4206bd89d8c6303722e57dd294
-
Filesize
1KB
MD55728e28b6e542fd465efb88beb9dcc7a
SHA11c14208f9394edb57aba292a02700f2e22bda613
SHA256c537f33a1942e7a4909b73d730a303b9d519f0b7aad91455992ef2de4ec28eca
SHA5120e809f46b530d71f80e4965d31953e2e3cf396ad4021cf2a4d9d1231556c1df15dbf3490d20dfec76c36a93d0f4356752eb1f821ec9aafc1b65ddf3f0f223039
-
Filesize
7KB
MD57f2327428696a2ae78b00b7d863db3c4
SHA163e53e8e412b2e89a23bcf78791b8f2b59c86a25
SHA256c910208b11a0b0523d72a3f468d622d506d896815784bd70033a1a3b9370a5c8
SHA51270f3ec2fb1cb041f3215bc7557560d9fb45274abdc619f51129606024123d02c2229dce13abf72114c0636f7ba8d76c05a52d2565d8358d8da85a316aae7636c
-
Filesize
7KB
MD5fd7f5f520d88131ec612cff1c91df26a
SHA14cf553c54d8e743dfb7c5c72d0ebd6ba6eab7f1e
SHA256cb935e3a071d8c9d9a1de4f973744596ac24210e210b249f3dcb811790158c47
SHA512266da47c39b8c55e62a659bc393700a820221c940ba9e6a83601d9e4899a6a3ae74ae8552341db02775b53dfc01e399d82f5bc8e2202c502018c2c2c9448c5ea
-
Filesize
144KB
MD5c3cc4b471c551573d3b89f69d98e8f4a
SHA1a83e54131679e97b5ac53995518344812e267ffc
SHA25609435fa5faafff254d114dbd2f35b7fb8b968089573776449e12add409bba12a
SHA512effe1c38a4063db7362d8b1419ff769e714c7d622f64f84bb98412153db46842a4e0ce8be5cf493b506a030cc8f6c4fd4b77107466f63ecece6877a650892c2c