Analysis
-
max time kernel
65s -
max time network
65s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
10-07-2024 08:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://web.archive.org/web/20230522220632/gnaa.ga/members
Resource
win10-20240404-en
General
-
Target
http://web.archive.org/web/20230522220632/gnaa.ga/members
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133650722306462550" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2244 chrome.exe 2244 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2244 wrote to memory of 4352 2244 chrome.exe 73 PID 2244 wrote to memory of 4352 2244 chrome.exe 73 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2992 2244 chrome.exe 75 PID 2244 wrote to memory of 2332 2244 chrome.exe 76 PID 2244 wrote to memory of 2332 2244 chrome.exe 76 PID 2244 wrote to memory of 1440 2244 chrome.exe 77 PID 2244 wrote to memory of 1440 2244 chrome.exe 77 PID 2244 wrote to memory of 1440 2244 chrome.exe 77 PID 2244 wrote to memory of 1440 2244 chrome.exe 77 PID 2244 wrote to memory of 1440 2244 chrome.exe 77 PID 2244 wrote to memory of 1440 2244 chrome.exe 77 PID 2244 wrote to memory of 1440 2244 chrome.exe 77 PID 2244 wrote to memory of 1440 2244 chrome.exe 77 PID 2244 wrote to memory of 1440 2244 chrome.exe 77 PID 2244 wrote to memory of 1440 2244 chrome.exe 77 PID 2244 wrote to memory of 1440 2244 chrome.exe 77 PID 2244 wrote to memory of 1440 2244 chrome.exe 77 PID 2244 wrote to memory of 1440 2244 chrome.exe 77 PID 2244 wrote to memory of 1440 2244 chrome.exe 77 PID 2244 wrote to memory of 1440 2244 chrome.exe 77 PID 2244 wrote to memory of 1440 2244 chrome.exe 77 PID 2244 wrote to memory of 1440 2244 chrome.exe 77 PID 2244 wrote to memory of 1440 2244 chrome.exe 77 PID 2244 wrote to memory of 1440 2244 chrome.exe 77 PID 2244 wrote to memory of 1440 2244 chrome.exe 77 PID 2244 wrote to memory of 1440 2244 chrome.exe 77 PID 2244 wrote to memory of 1440 2244 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://web.archive.org/web/20230522220632/gnaa.ga/members1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb70299758,0x7ffb70299768,0x7ffb702997782⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1588 --field-trial-handle=1780,i,9084423190748919143,3935355493069536916,131072 /prefetch:22⤵PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1820 --field-trial-handle=1780,i,9084423190748919143,3935355493069536916,131072 /prefetch:82⤵PID:2332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2104 --field-trial-handle=1780,i,9084423190748919143,3935355493069536916,131072 /prefetch:82⤵PID:1440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2596 --field-trial-handle=1780,i,9084423190748919143,3935355493069536916,131072 /prefetch:12⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2604 --field-trial-handle=1780,i,9084423190748919143,3935355493069536916,131072 /prefetch:12⤵PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4700 --field-trial-handle=1780,i,9084423190748919143,3935355493069536916,131072 /prefetch:12⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3908 --field-trial-handle=1780,i,9084423190748919143,3935355493069536916,131072 /prefetch:12⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 --field-trial-handle=1780,i,9084423190748919143,3935355493069536916,131072 /prefetch:82⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3516 --field-trial-handle=1780,i,9084423190748919143,3935355493069536916,131072 /prefetch:82⤵PID:3568
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD50675cbc3e46775bf52db38f689551ffc
SHA16e63afe33480a8ae0bfee8d967b7a0c4da3b46c0
SHA25660445c65a5ffb629fd364ae6f1e9c8d2fb55bc79cdfd8c1544af73bef9687156
SHA5121ce5f737b0f205844e66c47d8a111ff78229acf9164e34c4c7fad230b72d4b2f65e2645a24d6b2c6dc9fdec7baecb8948e5f1157d537bf3a8432e3d34b216b96
-
Filesize
537B
MD526043a49a1526709dc382bcc6c2f9f05
SHA18d6f3b418e3801dbf46253298f89c471d5970f41
SHA256bc69ddd3b80244f1c979d80f8c0896f41ba331bb9b3965dbd2d84502092d0b94
SHA51202b052dd63f4c0c40a93196ef49765ac42fd0bd5e2a75e07088cd7cbc5fdf843ab6d10dff01673c657403b0e3b5ee59f3d1c9a393a03511d60551cea6f138143
-
Filesize
5KB
MD5f68eb52204ccb2a7eace8d527c1711f0
SHA13be1b473e50b1cee247a4d96f21c585a3865f5f7
SHA256a03d05ff383960e3d007952c76d9b00b81c8bf723de43f28166faed550b446ac
SHA5127f01d3b0d005b2c4804f70ef235deba8dafaca9fce9e5b81934065317cb225ff7a3f09fd4c5d4abf3df6b60763d1e56cb68704867622dc2d39036e6d1e0ceaeb
-
Filesize
5KB
MD53b11d883e674516806c59989536501c4
SHA144b0d6351d21ac071cbbad9ba7ef96492517a1e9
SHA256ec2206bcc4cdb4cf2308c1e954423e55a09e669a0c86a77ef7bec58baae305f0
SHA5122ae4d2123c7343349c0ee2d38875d2258abfbb69531d6a5de51a467ff1e4b35a27deee2e658a116ce0b88c10a89478466c1ff4984202c1596ba9980b738f7288
-
Filesize
5KB
MD530019c52e806ad1d6d7839ef24c15541
SHA1750204299c30d996a805e81cf06d99244a71f3d4
SHA256b7e1c84ec31b84f45710247ecd0d2f1ee3a4e0d61590a6c7d0926a6409f88f5c
SHA512e2455db07868aa15bc39be5aee63f2c4078e5bdeb773f14f2218836173ae3c7974fe1518ea7f2f5915352a8998fc5aec5f0aa05cd49cd095b9fd24f4442ee552
-
Filesize
136KB
MD5a6002d6605696031b1cd34508b271df0
SHA1eae2759c1b7f3091177084e09f27b7111fd19353
SHA256945815ec1950bb16431b3e49fa63b75245b0d4fee23c7abd93cd67091bd89a67
SHA51299aad6d78404c4405be338c583006c5f24f924bd122f6d476bc2c0b63b7570513af1455bd718801797fc400f8261049cdfaf4cdcd09d1f7e7884d3a23fc78799
-
Filesize
136KB
MD582960ace1d0b08798da8e75f503ee53b
SHA12a20674bcb95a8acddf2600012394e05f658129b
SHA256d0fd25de371ed4f0181bf166d854089b7f0ae9259c5779f745f1b2e28be107ff
SHA5120c2193ed9143290489f385001fb1b1cbb75c38e27ae2692aa75716b80d2252e40cfe65124852c3f756ebd390fbbd62f8ff87336d406429ebf0240631900fbaec
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd