Analysis
-
max time kernel
20s -
max time network
23s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
10-07-2024 18:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://67dogkhbb.cc.rs6.net/tn.jsp?f=0011KA_0jQ3uKb_7aqivLOzxM3AQtIY357Csn9CcDJIU87FgyCMU7EqDQaDA4GbuJyAy9u-jiZA6KYhv9tfydZSSTJqsEJIOZMyGMNmfYFUiOd6CpBkIVsiOwpKZELy_T6sufkCIVqO9EEuqBW3BC92qkKBTRcVg9FL-Lv7_4cjRzqUdVMulwJrXrmFjPOYIfNOgGtwNZ5zkuHQwZ3b8qO7q18hS0lPLl7hKmETbMVL0Js8Rqd1sKzcyFP1BWsUXMQLa_5ZrFWmdMiA9VHa2ZR9U6JVfZgt8z06_ApDwE0NboWzJ-O8MAFyW3nyekiNzjjvxxsPKdsIhwWlDTvTzFsFkcwL85CLozdRANhIuA40gUpJiiJ0NjifsU5SWvorTZe0xAViR-lnYB_i-5hKLK4dT16GlWoScu2YMA50TPBeIAYkj2IbktM5n4jhSjBLfxzgL3pj5iM1I4b16Uftr7dXG3lmpku5Im5gwCFhz2K1plXQwrbZtGYrERLrh8WKI0L0OAWTJMwVMuL2sUUcvvC8rXgKGB0ylGWHHsfK9JmgsI-2v1tnZiaxhhFQ54ksDamupNrWf7vHpx8sR-PXpav4FN8qzhSwgKoL&c=CRV_DUsE42nU3LlwoR-xFYoihZd_MnN50Kg6vr702LD8RFPY_pdeYw==&ch=1K03Jztj-L_zPf1U7gt8xGcH_emNpDQuOIt9i2cnGeYG4dOaoLt39Q==
Resource
win11-20240709-en
General
-
Target
https://67dogkhbb.cc.rs6.net/tn.jsp?f=0011KA_0jQ3uKb_7aqivLOzxM3AQtIY357Csn9CcDJIU87FgyCMU7EqDQaDA4GbuJyAy9u-jiZA6KYhv9tfydZSSTJqsEJIOZMyGMNmfYFUiOd6CpBkIVsiOwpKZELy_T6sufkCIVqO9EEuqBW3BC92qkKBTRcVg9FL-Lv7_4cjRzqUdVMulwJrXrmFjPOYIfNOgGtwNZ5zkuHQwZ3b8qO7q18hS0lPLl7hKmETbMVL0Js8Rqd1sKzcyFP1BWsUXMQLa_5ZrFWmdMiA9VHa2ZR9U6JVfZgt8z06_ApDwE0NboWzJ-O8MAFyW3nyekiNzjjvxxsPKdsIhwWlDTvTzFsFkcwL85CLozdRANhIuA40gUpJiiJ0NjifsU5SWvorTZe0xAViR-lnYB_i-5hKLK4dT16GlWoScu2YMA50TPBeIAYkj2IbktM5n4jhSjBLfxzgL3pj5iM1I4b16Uftr7dXG3lmpku5Im5gwCFhz2K1plXQwrbZtGYrERLrh8WKI0L0OAWTJMwVMuL2sUUcvvC8rXgKGB0ylGWHHsfK9JmgsI-2v1tnZiaxhhFQ54ksDamupNrWf7vHpx8sR-PXpav4FN8qzhSwgKoL&c=CRV_DUsE42nU3LlwoR-xFYoihZd_MnN50Kg6vr702LD8RFPY_pdeYw==&ch=1K03Jztj-L_zPf1U7gt8xGcH_emNpDQuOIt9i2cnGeYG4dOaoLt39Q==
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133651085094911099" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4652 chrome.exe 4652 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4652 wrote to memory of 4456 4652 chrome.exe 81 PID 4652 wrote to memory of 4456 4652 chrome.exe 81 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 892 4652 chrome.exe 82 PID 4652 wrote to memory of 4608 4652 chrome.exe 83 PID 4652 wrote to memory of 4608 4652 chrome.exe 83 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84 PID 4652 wrote to memory of 3220 4652 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://67dogkhbb.cc.rs6.net/tn.jsp?f=0011KA_0jQ3uKb_7aqivLOzxM3AQtIY357Csn9CcDJIU87FgyCMU7EqDQaDA4GbuJyAy9u-jiZA6KYhv9tfydZSSTJqsEJIOZMyGMNmfYFUiOd6CpBkIVsiOwpKZELy_T6sufkCIVqO9EEuqBW3BC92qkKBTRcVg9FL-Lv7_4cjRzqUdVMulwJrXrmFjPOYIfNOgGtwNZ5zkuHQwZ3b8qO7q18hS0lPLl7hKmETbMVL0Js8Rqd1sKzcyFP1BWsUXMQLa_5ZrFWmdMiA9VHa2ZR9U6JVfZgt8z06_ApDwE0NboWzJ-O8MAFyW3nyekiNzjjvxxsPKdsIhwWlDTvTzFsFkcwL85CLozdRANhIuA40gUpJiiJ0NjifsU5SWvorTZe0xAViR-lnYB_i-5hKLK4dT16GlWoScu2YMA50TPBeIAYkj2IbktM5n4jhSjBLfxzgL3pj5iM1I4b16Uftr7dXG3lmpku5Im5gwCFhz2K1plXQwrbZtGYrERLrh8WKI0L0OAWTJMwVMuL2sUUcvvC8rXgKGB0ylGWHHsfK9JmgsI-2v1tnZiaxhhFQ54ksDamupNrWf7vHpx8sR-PXpav4FN8qzhSwgKoL&c=CRV_DUsE42nU3LlwoR-xFYoihZd_MnN50Kg6vr702LD8RFPY_pdeYw==&ch=1K03Jztj-L_zPf1U7gt8xGcH_emNpDQuOIt9i2cnGeYG4dOaoLt39Q==1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff59a7cc40,0x7fff59a7cc4c,0x7fff59a7cc582⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1808,i,11004329846211989074,14409956953238054123,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=1804 /prefetch:22⤵PID:892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2044,i,11004329846211989074,14409956953238054123,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2104 /prefetch:32⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2156,i,11004329846211989074,14409956953238054123,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2172 /prefetch:82⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3056,i,11004329846211989074,14409956953238054123,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3084 /prefetch:12⤵PID:3244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3064,i,11004329846211989074,14409956953238054123,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4408,i,11004329846211989074,14409956953238054123,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4272 /prefetch:12⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3720,i,11004329846211989074,14409956953238054123,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4540 /prefetch:12⤵PID:1104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=3220,i,11004329846211989074,14409956953238054123,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4336 /prefetch:12⤵PID:1964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4760,i,11004329846211989074,14409956953238054123,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4772 /prefetch:82⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4244,i,11004329846211989074,14409956953238054123,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:1524
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD58574c72aa6ab5d1c1a73bd75bb9de001
SHA1e085bb3691c889ada15117edbf2d132421c8b43d
SHA25618841ecf614df979ad359bda05acee94bd3a1c9823f85f646682dc96e8448788
SHA512cd519aadef9d9b9ddcc6677632aa6eccd89ace1a544a870d0da9ad811f5137b0d4148dc2cbf41d0e8176716b6fb12cb6500d2b0ec0710f98cefd9df256eecce3
-
Filesize
8KB
MD5b0c9576e6aaa4de2662eac523f7812f7
SHA1312c022781ffee9a676fb83a2ed19f0e9437fba4
SHA256375da33206032871b0c8c203d6905557f41e0294cc3c866f6e2a7872ed17ebcc
SHA51264aa6ed55bd3f0f46f5fd9c186a8891854c1e4afc2f87d36772d297fcd1d151063fe6c7f696cf666b9f657a5a7954634ae9bbe677994adb1376c721210ad77e6
-
Filesize
92KB
MD5d93f0e9c8a88586f5b189c351bbac35a
SHA1ecccdabf2e937c4a1b6874df00d8fbdb412e703c
SHA256eb2f18364b38f55a166f1dd96880832304999599ead5d8185b25d5964c460285
SHA51227c2ff60f554678f252ff527cc405d57c7d300c913ca53863b5b12b832d9575aa36594f5fad76d75f9c211cfc0862c40935bbe6ddaf935cf38eaedf77191cf5f