Analysis
-
max time kernel
80s -
max time network
80s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
09/07/2024, 11:11
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ipfs.io/ipfs/bafkreihfypo7uaumnxwux3vsjxvtptxx75x2ux3ux7mf4w7ql4redl6nq4#[email protected]
Resource
win10-20240404-en
General
-
Target
https://ipfs.io/ipfs/bafkreihfypo7uaumnxwux3vsjxvtptxx75x2ux3ux7mf4w7ql4redl6nq4#[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133649971211513899" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4472 chrome.exe 4472 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4472 chrome.exe 4472 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4472 wrote to memory of 3396 4472 chrome.exe 72 PID 4472 wrote to memory of 3396 4472 chrome.exe 72 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2604 4472 chrome.exe 74 PID 4472 wrote to memory of 2304 4472 chrome.exe 75 PID 4472 wrote to memory of 2304 4472 chrome.exe 75 PID 4472 wrote to memory of 3156 4472 chrome.exe 76 PID 4472 wrote to memory of 3156 4472 chrome.exe 76 PID 4472 wrote to memory of 3156 4472 chrome.exe 76 PID 4472 wrote to memory of 3156 4472 chrome.exe 76 PID 4472 wrote to memory of 3156 4472 chrome.exe 76 PID 4472 wrote to memory of 3156 4472 chrome.exe 76 PID 4472 wrote to memory of 3156 4472 chrome.exe 76 PID 4472 wrote to memory of 3156 4472 chrome.exe 76 PID 4472 wrote to memory of 3156 4472 chrome.exe 76 PID 4472 wrote to memory of 3156 4472 chrome.exe 76 PID 4472 wrote to memory of 3156 4472 chrome.exe 76 PID 4472 wrote to memory of 3156 4472 chrome.exe 76 PID 4472 wrote to memory of 3156 4472 chrome.exe 76 PID 4472 wrote to memory of 3156 4472 chrome.exe 76 PID 4472 wrote to memory of 3156 4472 chrome.exe 76 PID 4472 wrote to memory of 3156 4472 chrome.exe 76 PID 4472 wrote to memory of 3156 4472 chrome.exe 76 PID 4472 wrote to memory of 3156 4472 chrome.exe 76 PID 4472 wrote to memory of 3156 4472 chrome.exe 76 PID 4472 wrote to memory of 3156 4472 chrome.exe 76 PID 4472 wrote to memory of 3156 4472 chrome.exe 76 PID 4472 wrote to memory of 3156 4472 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ipfs.io/ipfs/bafkreihfypo7uaumnxwux3vsjxvtptxx75x2ux3ux7mf4w7ql4redl6nq4#[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffc85b19758,0x7ffc85b19768,0x7ffc85b197782⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1800,i,4253748901694165009,8771611142031324478,131072 /prefetch:22⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1800,i,4253748901694165009,8771611142031324478,131072 /prefetch:82⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2084 --field-trial-handle=1800,i,4253748901694165009,8771611142031324478,131072 /prefetch:82⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2888 --field-trial-handle=1800,i,4253748901694165009,8771611142031324478,131072 /prefetch:12⤵PID:4020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3012 --field-trial-handle=1800,i,4253748901694165009,8771611142031324478,131072 /prefetch:12⤵PID:3972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4848 --field-trial-handle=1800,i,4253748901694165009,8771611142031324478,131072 /prefetch:82⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 --field-trial-handle=1800,i,4253748901694165009,8771611142031324478,131072 /prefetch:82⤵PID:3476
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5100e2ffdd1e7a624e2d624933a6d4152
SHA1e92181fba8d84750116155c6df60e911b5e58c81
SHA256c886cede2fbe3c302d70e3ac387a496b06a3a74da61a47f49262acaaa72a791c
SHA51257a353a701b61ee3afd0df395be2650a2333a61b9b5f3cb4b51fa6e5a0d376db87a143edf02642f9cfb57408a6e1e7f9ce4b95adf5ad2e4da65d964bdc58c16b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5e38891adbe543cc70d5efb3896f89d46
SHA1ee6bf65b4877dd9ff29ac59ca8bd6a35cdc2f606
SHA256558047e26f815c08e76202d605d03b39684c810938bad283de639ea6131c6b89
SHA512b06a76bbb6d56eab7651eba05a2301e73d3881d540dc8da6adc2a6ec72364383761a1efa9be76c56341c621bf8a48f2ed545ed39c5104eb03341560a2ae7a011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD54ae978c441798719ccf9e7cac3920e18
SHA170d01a4bb4293f0257faa64ddc8af5510eca9f97
SHA2567663cb0bd6c44aca7eb4fe741dcf749ce65d97a7844c896061c3867d6a26bf20
SHA5127564d0647aa56eeea340e5a15daad1aff436c527cdefd44bf223b0c6fdc6a8bb7d11a91d81d1a1b0968948aef38edecb3b0d4974c790153f3853e78f50f97e59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD56779a55cc0d0219d3279c7db1345259d
SHA1db58725d3c60f2ba0e3d65a4e36f4626da24250c
SHA25673368c814ed7585f22e810e8ec786b979af3e13b27a364f3f9b187fff1ea40b0
SHA512eedab3f9a97b61b602dc69b5ee8e5b929e88e00850f2e19156e3f9da1b0ee875be6523a0e8f8a7a7d366d5b7deba1649706f4865e4588173374e21d39f7a29de
-
Filesize
264B
MD5e7091dc3339bc944ebbfb209bb669ebc
SHA1feb26fbbe6f206e62716d06acf00459997e45663
SHA2565b2fb18743ff83a24d1da959935dd0b8e64e749d2d2725e89b8f05ed6f463906
SHA512e25982a88948b8ee29f161f67edbf9980364d1cf79f25a0a9862f83cce758a1e4fcd4c766f1b2478a89a7ec3c34a7266b74bcf3215c7fe6e5a1bf711f32aa1a3
-
Filesize
2KB
MD54ddada18c31b2dce98a527f115aa151c
SHA19cf1368d581dc704adf9369c1f240067c17a0c0b
SHA256d2df6a57ff739a1cf979c503a9e2426e76739575d6afc18baa13b79bf84c09bf
SHA512f2eab6a0d7247a05c585d697cd430223600c2137ae103bd3e995201ff03358d0a9baeb4328e4237ba347fc3dcbc92e0dbfc4d495380d5db3a08e2507eae250f1
-
Filesize
1KB
MD5625721e961b4b9489330805d3ef2579f
SHA167d6719cf112f2a8cbf6f72ba49b64711592af3a
SHA256ac7d29629e3b405203ab7dc9b690c941ebaaa7c43c0a271eb317e71fc91d28a3
SHA512cee0af2657d1c62ce3bd83a911cd744538fc65f4a3d0b195e9d0789223a36c6e1c6cb81c46e2bff24981e14b813551baec60442203baf061b6fa61ae76961265
-
Filesize
6KB
MD5465a7de62eb442679b9fd2cacfc7d2ac
SHA1ffba719d365363c462fb12c2c8e522ca6926b0af
SHA256448a499a8993f647001f0ec7ac7cb69f84c88b6a0def992145d821d9c08c650e
SHA5129b5e45fb0fa49a9254b9a3895b2655336bfc22a5b5dc0bdd8e76a22b8c6083bd479406c3994adc1a874e9a4a50962c48700ab5bd1ae479a65ebd9390cb1dd326
-
Filesize
6KB
MD5cc91a55f99d3fea06b901847b3f67aeb
SHA13d56ce631e879f127bd6a043e316d40b8c7d2e4d
SHA2561912454c032d4a37e9f53f52095c290e54ee5de63224155ac18e397f0eb5c4f6
SHA512b3a6f487247d2d312361cd92935a4d46d06ea33ba2068ff5285e92d7a7580c4a4a815aa8c0eef3b5e8e7025d1d01c843f81abe77572be80d1d5259996c3f3be3
-
Filesize
6KB
MD577a22a7b17fb4d962c3516d3bba2bb4e
SHA13f57bcdfd8a230025c3f55d9f21d328710f7f0e4
SHA2560ff15393a71316e933d7a3b8aae978a0dd69dc772641200a0ffa2771cad58525
SHA51258eec6786c12d23bf2f839dd57eac21fd54fcc45ca56441be80732c944ebd25f30a9035873a132505e524d8650c535aaaa90f6404eb48947d870aa0b6716f9e4
-
Filesize
136KB
MD5c64930e93e2644275660f098e836765f
SHA12ed7c52085d4fa6cedfc200052495640e878571a
SHA25623603371c6a068f3cd6f893e7ddc4e0bc58c268bd18bd073c58479fefe6d7921
SHA512d987afc12a401a16d67aeed6d0929c15390114b2bc0c2691e492703fa6e6617a6e12c981cff33daad024d9061e2cfc74ba6db5d9b0326431992531c214f34d6a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd