Analysis
-
max time kernel
55s -
max time network
48s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 05:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://media.discordapp.net/attachments/956622813937139773/1129234398961741845/SPOILER_VID_26830720_040432_628.mp4?ex=669728fc&is=6695d77c&hm=968a69c93a21414442cbd40d7a8f6225c16c0e6e69057a02a752154f2c8a7a9b&
Resource
win10v2004-20240709-en
General
-
Target
https://media.discordapp.net/attachments/956622813937139773/1129234398961741845/SPOILER_VID_26830720_040432_628.mp4?ex=669728fc&is=6695d77c&hm=968a69c93a21414442cbd40d7a8f6225c16c0e6e69057a02a752154f2c8a7a9b&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133655827921858409" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3596 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3380 chrome.exe 3380 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3596 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3380 chrome.exe 3380 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: 33 448 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 448 AUDIODG.EXE Token: 33 3596 vlc.exe Token: SeIncBasePriorityPrivilege 3596 vlc.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe -
Suspicious use of FindShellTrayWindow 61 IoCs
pid Process 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe 3596 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3380 wrote to memory of 4740 3380 chrome.exe 83 PID 3380 wrote to memory of 4740 3380 chrome.exe 83 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 2108 3380 chrome.exe 84 PID 3380 wrote to memory of 4988 3380 chrome.exe 85 PID 3380 wrote to memory of 4988 3380 chrome.exe 85 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86 PID 3380 wrote to memory of 816 3380 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://media.discordapp.net/attachments/956622813937139773/1129234398961741845/SPOILER_VID_26830720_040432_628.mp4?ex=669728fc&is=6695d77c&hm=968a69c93a21414442cbd40d7a8f6225c16c0e6e69057a02a752154f2c8a7a9b&1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc833ccc40,0x7ffc833ccc4c,0x7ffc833ccc582⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1988,i,15775118797818744842,13188984892917746110,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1984 /prefetch:22⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,15775118797818744842,13188984892917746110,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2172 /prefetch:32⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2228,i,15775118797818744842,13188984892917746110,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2420 /prefetch:82⤵PID:816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3132,i,15775118797818744842,13188984892917746110,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:1584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3152,i,15775118797818744842,13188984892917746110,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4696,i,15775118797818744842,13188984892917746110,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4788 /prefetch:82⤵PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4984,i,15775118797818744842,13188984892917746110,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4880 /prefetch:82⤵PID:228
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\SPOILER_VID_26830720_040432_628.mp4"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3596
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:3012
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3364
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f8 0x4401⤵
- Suspicious use of AdjustPrivilegeToken
PID:448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD55f3cd6810848d11a159413b6ec98f33c
SHA18e8858eaee18e417422b73474ff9d2ce9f945ae7
SHA256a851c0c41a27934713fbf2cd22bd6e7932b570cf1262bdebca2699d74b918e62
SHA5127ad4081fb4f3a93d6ee4f2ff1922918a0b717e06b743af7a579b590696ef530a83d02c2d415ccd66ed87cf39be46582f241d01f20f3d7af2346daee6ac5b9be6
-
Filesize
8KB
MD583b9aff4260afbf4828c7ed5272d4207
SHA11cf24b70a59e0569387dd89d6079cd7fdf0a6175
SHA256ec6f7106390f2e4c0a85df8e59f75f5145d5247b97f95039f85a7d20d1d59020
SHA512870b807daa39c078c404dc79f608a169cb23d63af4435d52a1dec7a9e031ff50e129bc86501d685a8619d7cb3a51b9a565bed66293c3ba0b2021ef80f23cd90e
-
Filesize
8KB
MD5631e251a2351e23e2e29adc1b739f0a4
SHA199b6b813e6831354528eed31bfd95fe5df3522cb
SHA256b03285095480071b84d305b1bce06d70b535d6c05d6781b9b372edf2fa6c8296
SHA512f5b201c2fa9cae736d489df510ac20f446fc154910c922e7da03651721c3fd59b2c715fd1833d355d285692969d502d46b543858803857d85cb6e300b8869a21
-
Filesize
8KB
MD5e91a5d416169e3be1493b9a87b76c250
SHA1047b0bef3a1b921df5e7219ac7760f7384dfef4f
SHA2568cd9ec36640894c4835ad2d0c1991995628f07f20d4aa17addaa947e3fb3d013
SHA5127bdc7f5e467c907dd3f6712268aadb34c0126abcff7e5fdf76e0a685dbd3f88c2dc44bb61c2812742ab20a3846231bfb40c656e7d6ce9d7393fe934129479179
-
Filesize
92KB
MD5af2bf6fb024c39edc1f876f3c98ea6b7
SHA19bd1abb20ae649b1a1ce960b9a5821bd5d64a267
SHA2567e5de82ee79fe921f255166848bcfb6ce9ce58d8e499607bcaff7f00b57f696e
SHA512ed0daa35a7bf115a9af92371121a2cc366758689e84d85e00fdcc7e97b7a3b8d3b3fb6e39b35c6ee00190c83a4190b9c7b19e5ef4b2efebe6a3c22fb621dd6b9
-
Filesize
92KB
MD5764c3fe7417ab96614bce7004b914be8
SHA156a64e1fcd0238bddf749442583348018fc2f200
SHA256abaa263bd9abad5692c10ba80ab4700f6c78a7f05ce861ab32e9fc667956bae4
SHA512a06aa199c4f051dc9b620f65e193a6307055cf5cd7caafc1113bbbccad8fad8759a0b5f3a7e4853183375e234a2c7571f14faef3ca41ab78ee3dfc02e5fdd69e
-
Filesize
4.4MB
MD52be4adb593ab13447cc51594c4cfbe30
SHA14b796927e18829c315ecd94d2d77a16557578e09
SHA2568d951b5b36cf424b25ef12323ecae2d31f8e04ee414421e321876e7be4a63941
SHA512d59c3566f6fc07ac250c8c523edb93809f12f966eb4a05e8ff561171f899a5c328d3c61356b9cc2656149e6067dbed834e9f253b7d807c9322d0f26c50af6f45