Analysis
-
max time kernel
1800s -
max time network
1685s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 20:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/ThreatLabz/ransomware_notes
Resource
win10v2004-20240704-en
General
-
Target
https://github.com/ThreatLabz/ransomware_notes
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133659823179319218" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4744 chrome.exe 4744 chrome.exe 2464 chrome.exe 2464 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4744 chrome.exe 4744 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe Token: SeShutdownPrivilege 4744 chrome.exe Token: SeCreatePagefilePrivilege 4744 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe 4744 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4744 wrote to memory of 3472 4744 chrome.exe 83 PID 4744 wrote to memory of 3472 4744 chrome.exe 83 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 864 4744 chrome.exe 84 PID 4744 wrote to memory of 2888 4744 chrome.exe 85 PID 4744 wrote to memory of 2888 4744 chrome.exe 85 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86 PID 4744 wrote to memory of 2880 4744 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/ThreatLabz/ransomware_notes1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xd8,0xe4,0x7ffb51b4ab58,0x7ffb51b4ab68,0x7ffb51b4ab782⤵PID:3472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1660 --field-trial-handle=1988,i,15400251084663340398,1300214116451178870,131072 /prefetch:22⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1932 --field-trial-handle=1988,i,15400251084663340398,1300214116451178870,131072 /prefetch:82⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2220 --field-trial-handle=1988,i,15400251084663340398,1300214116451178870,131072 /prefetch:82⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1988,i,15400251084663340398,1300214116451178870,131072 /prefetch:12⤵PID:4628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1988,i,15400251084663340398,1300214116451178870,131072 /prefetch:12⤵PID:1820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4456 --field-trial-handle=1988,i,15400251084663340398,1300214116451178870,131072 /prefetch:82⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4604 --field-trial-handle=1988,i,15400251084663340398,1300214116451178870,131072 /prefetch:82⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1536 --field-trial-handle=1988,i,15400251084663340398,1300214116451178870,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2464
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5ef8c9d19c287747dc4bf06115fc6df9d
SHA1a57354bf05253e6e8f0d6eefaca6f120b49b6732
SHA256c142197fef7067987e6a3b64eb484361e903f66543bbbcbed22415c49a50b4f1
SHA512dcbc837cfaa8ce0a3ad89afe49d4766bd4ef206703cb774d51a3ac2e73912e89c5d19a530fecdacb1448c2cb945152fa75ef53801397d613685c84f0a015973f
-
Filesize
1KB
MD529e041492ac6c2e8b5988d9a968ec101
SHA1abd601042886207ddbdf1787765173af5ccf2c52
SHA2569bba2cfc616f9e42762931c7a13ca8ab3010e8e106aa1628ba0a2666c71bc345
SHA5123ff133d0604245a3078fd1dc2af5ec1b37c25c248bf739b14396fbbe193c97845f7f5a7350e2df83c13877a3545b30012826977c5b135dad7cdb633926a40e3a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5cfa38bc1c37320ef2abed6264f76ea76
SHA10ca336f5d7b368fa1ad3b7190eb3c0d41253a34c
SHA256c7c2b74c350d95464afc696ca87ed50b0660f920315aff4118946d275ec5f6c7
SHA5125cc767fc6d28e700ef574284617d61034ceefb79e2b4560d858daad4221fa4657986191418c91dfd69fd04bed042a6dbae54d4bd05bca93e0cbce9982a0040ce
-
Filesize
7KB
MD59a8d28da64f6be7e20a1dd3c9a7e82e7
SHA151a7cf03050056b24a4287e11f19012b03621084
SHA2567ef99fa1750757cfd3042a9b648810970dec7f1a9b24e7da6e452822e533a10c
SHA51223cf5f343966b5625b22c81305a1626d07dfb4762895afbe542b7f393d8247c465494aa47561791e02b245257c0c580a263af2d6efa43c3617555a3a718ca307
-
Filesize
144KB
MD542a2f5603f28ca8218ef6d563d3494ff
SHA17f6fd77fb625b8db4cd492ac3803acada61cf88f
SHA256d7c06594997a1828cc91e7974cdbbce9f2efeba236672367a77adb36c7ecc837
SHA51267e33995fad5074d4668f252a3a44716f63444281fb508a112da4e2c4f4305eb4af3c3d5667394d9b0d8c5f5498b6820bc20d61083e05404b583567556d7d3c8