Analysis
-
max time kernel
300s -
max time network
250s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 20:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://godaddy.cloud-protect.net/app/digest.php?payload=4i97df37dfda32a77a0ee9fa3669b886d762da4c773afd8b3b0c701901ab4950a3e558226866d58c56a8c0953ebaa2659712f02d108c5edd676660f363eb7c69d4ae42cc9e3fac5972b6791eb71026ce18539fdedce5cf403bdf59a13b39d5f7dbd7c4f3b1ad692051edef40ba364b857e0b5a972f3ecdcae4b58f4262313037289713c2e6b225a27573ff8e&k=k1&action=block
Resource
win10v2004-20240704-en
General
-
Target
https://godaddy.cloud-protect.net/app/digest.php?payload=4i97df37dfda32a77a0ee9fa3669b886d762da4c773afd8b3b0c701901ab4950a3e558226866d58c56a8c0953ebaa2659712f02d108c5edd676660f363eb7c69d4ae42cc9e3fac5972b6791eb71026ce18539fdedce5cf403bdf59a13b39d5f7dbd7c4f3b1ad692051edef40ba364b857e0b5a972f3ecdcae4b58f4262313037289713c2e6b225a27573ff8e&k=k1&action=block
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133658942750177968" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2400 chrome.exe 2400 chrome.exe 2196 chrome.exe 2196 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2400 chrome.exe 2400 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe Token: SeShutdownPrivilege 2400 chrome.exe Token: SeCreatePagefilePrivilege 2400 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe 2400 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2640 2400 chrome.exe 83 PID 2400 wrote to memory of 2640 2400 chrome.exe 83 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 3608 2400 chrome.exe 84 PID 2400 wrote to memory of 1452 2400 chrome.exe 85 PID 2400 wrote to memory of 1452 2400 chrome.exe 85 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86 PID 2400 wrote to memory of 1168 2400 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://godaddy.cloud-protect.net/app/digest.php?payload=4i97df37dfda32a77a0ee9fa3669b886d762da4c773afd8b3b0c701901ab4950a3e558226866d58c56a8c0953ebaa2659712f02d108c5edd676660f363eb7c69d4ae42cc9e3fac5972b6791eb71026ce18539fdedce5cf403bdf59a13b39d5f7dbd7c4f3b1ad692051edef40ba364b857e0b5a972f3ecdcae4b58f4262313037289713c2e6b225a27573ff8e&k=k1&action=block1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd4d64ab58,0x7ffd4d64ab68,0x7ffd4d64ab782⤵PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1616,i,5169489926089401308,11222584013291046633,131072 /prefetch:22⤵PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1616,i,5169489926089401308,11222584013291046633,131072 /prefetch:82⤵PID:1452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2160 --field-trial-handle=1616,i,5169489926089401308,11222584013291046633,131072 /prefetch:82⤵PID:1168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1616,i,5169489926089401308,11222584013291046633,131072 /prefetch:12⤵PID:1740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1616,i,5169489926089401308,11222584013291046633,131072 /prefetch:12⤵PID:1112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1616,i,5169489926089401308,11222584013291046633,131072 /prefetch:82⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 --field-trial-handle=1616,i,5169489926089401308,11222584013291046633,131072 /prefetch:82⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2288 --field-trial-handle=1616,i,5169489926089401308,11222584013291046633,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408B
MD50918f0b5bd27541af8b26b4ddc0107f6
SHA152a8943fd50711712c2f953ba99e3194e5c4a5af
SHA256bf2d7994b6babc4eff017e44ed2008bf8a0a381dd364784be0b584e08c94f2dc
SHA512942a868f42de3fff377d4f03dd75fd2d885c57885b1a17c6036670087206928260ecd6ba4a7f26f853c7c0c44083016f37ac240287728df4cd2a3e7bd791b2e6
-
Filesize
1KB
MD5f0f7835c04bfe46ccf2ad6dbb87adf7a
SHA1965e15187e2cf31b692f569f4be428b5e73d275d
SHA2566c8c462a83091716a012cc5a01497a664b9a1fbcc3e741e75bba69d298d9d3b5
SHA512b3369a27a8b88c06e85de3a61fb343df3562cb009c124685048744dae7939e31cf0bdda52ba58992a34899a6e64c7ec79ffc57e65c79f87c41a6d9487a5c5ab2
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD513fac4d2cc81d59fac14b075ab703a47
SHA1ade2d124254a17c5928825a802028a6b23abdbc6
SHA25627d0d714677a6bbed1a89f9db24b09fa8e71a011b99f32b4b88c47a7d7acc7cb
SHA5120dc4df4d0fa615734bdb919b22011180b38d10d369151736fd8da77bc814ae29c4f0aa6a916bf9b51c66cc06aea0dfc6348e002f34ae9f8832e37f162d7571d8
-
Filesize
7KB
MD51c0cdb01526923ceabf88c43689822c6
SHA1546747c33a0fc9b37febff6e9db99b9e3895fa61
SHA2561e278c5b17f0fcbbe3a3446cee47db2442588bfb0b452469a3969565037ab272
SHA51267bbc61faef7b981cc047a40764c7e971ec6e2db0d12c29da541566aaa0e98fba6aa78ca7c9f5ab3c31e467a2d4caa582d691533dea3768cacd22b38808609fa
-
Filesize
144KB
MD5ab7f392ae055e038374aebdaaba9bb8c
SHA11fb22a7276f9279ae8d5545e64eab1f45271a3e4
SHA25601ee7470f9b22ae3b149b629b0e4c34bc25448a588bf0bd76082f26a182bcf36
SHA5122eacbcbc415f76b463d218270cf8d09f6751217a33fc6e5ecb04e7d110f7a9b47abd3b5e0a4d1d9fc54bad51c229b58c2c725b0e705ededc60b2fc3aecf485a8