Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-08-2024 00:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://motorstatevin.com
Resource
win10v2004-20240802-en
General
-
Target
http://motorstatevin.com
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133674640641356176" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3784 chrome.exe 3784 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe 5116 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3784 wrote to memory of 1776 3784 chrome.exe 83 PID 3784 wrote to memory of 1776 3784 chrome.exe 83 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 3388 3784 chrome.exe 84 PID 3784 wrote to memory of 1872 3784 chrome.exe 85 PID 3784 wrote to memory of 1872 3784 chrome.exe 85 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86 PID 3784 wrote to memory of 2496 3784 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://motorstatevin.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff83a36cc40,0x7ff83a36cc4c,0x7ff83a36cc582⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1940,i,10830630928955626543,13107730877663133284,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1932 /prefetch:22⤵PID:3388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1896,i,10830630928955626543,13107730877663133284,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1976 /prefetch:32⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,10830630928955626543,13107730877663133284,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1208 /prefetch:82⤵PID:2496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3012,i,10830630928955626543,13107730877663133284,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3052 /prefetch:12⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3024,i,10830630928955626543,13107730877663133284,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3088 /prefetch:12⤵PID:940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4504,i,10830630928955626543,13107730877663133284,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3728 /prefetch:12⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4688,i,10830630928955626543,13107730877663133284,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3300 /prefetch:82⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4888,i,10830630928955626543,13107730877663133284,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4904 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1376
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD52579c9e79675a6b08d974f7f05b0aef6
SHA1d95ceb16c5713ce18ae7f0086895d3c95795d9d1
SHA256594d6c45845f8f03a4e629be8279782ad665d4b18b83dea214afe65deb885ecb
SHA5124a65cc9736ec8925263994cea0ea52487fd7bbd27c11a6ae1923a9568718d8b2b9d50056ab4dd81e0984f4aaaf0a2b3edb852786d6b86803405d19c3685b3359
-
Filesize
1KB
MD57f58dc2edfdc960521873efa2674e7c7
SHA18dbf7368d1f8391a23dcf2398f83c4a783f0522f
SHA256298bfddda19ad020e22ba01b269c828636c64e751bb221efb7baf27ba3bc2538
SHA512632eb80fe2e714b8aec6943013f8117b7134aca589065f089113091917fd6e04c34c99fcb1800b084fbb5bd4a425a14416e5e64947d0b16ef6e08d848504c076
-
Filesize
1KB
MD5f2d4c7d4790fc7c034cac731b3d3f78f
SHA193f245824ba7db14119f9279ddfdef49b55d5c40
SHA256e1874de104335ccd4eb78c67558a128f52bbe631820fcab8bda1084de93eb8e3
SHA5129068e2faf1c9434209528e98c23b9b1d46c934133712b5c75784893e127771a83165fb2f8788fa0ebd4d21f67fddf7377aa1276946ce4ec0194a66dce4809730
-
Filesize
3KB
MD59cd49c0476d52ada940cd2d36ee117db
SHA18a11a0bcea1861e26dde12c581eecd2b567b8911
SHA2566834bc22311bfcec873575a205efd4bcb96b386851518cfc880951c7056c418a
SHA51227ac36338a6d77aab492809f5ea75c6b6df53e6bb1578a576384b092f2b379dc082de5f53fc2d64ce75686879dee82c0011ea9efe7520b66255b8ddffcc9cbe2
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
858B
MD5211efd2f81ddde915b46313c2af00f0d
SHA1e6f5b5b9fef61b8b3ca3724e03ca44a1c1327319
SHA2562fc01299b5a465f9a58fdd141a9aef5aa25edf10ec6dd1952344f99930fe6f92
SHA512c1920c333dc0eec5b31898e5eb1447eda6b8554c6554b71ca7ba9e5e7ac644fbca802ec099786b13b755a8d3b003c06f428ecdf583be9fc9925efb08c83c8f71
-
Filesize
8KB
MD561bfe7bb47b62cef9b9f99410aa702ca
SHA1dab4d5003feb7d2ab5fcbefc3717c308c43d918d
SHA25616fcf7723dafbfb9e5199a64543e805d7e53cb1807f32444333969be2d73be98
SHA5124d96c2785a46bad48ccfb07a7bacbed4be65bda570af9c3ffa87d3df07bcffccbba06eb18fc6ba0af96df3b54894624dc16eda01c1ccd68f85b0635052a9d7b3
-
Filesize
8KB
MD532284054a803a3d20fcb57a6725c22af
SHA117b443b17d3aa55b059f2a05ff831c8f42348b0d
SHA256ccba0f039f596d45c23a2dcdcb987a8f836eacb95a878bbd509cbaa8ee1d3550
SHA512f565484d59ae06a75c78567541e51f4f0d17e5d140b64533f10eafde74b062db49757752cf1e71eb05a5de01c801920cae5ce0f3ba432edd3c09345a349cf285
-
Filesize
9KB
MD56c9cc23d069242830e546ec869c99f04
SHA18ea979f4730134c195d5cac4d135b02f248e1632
SHA2561647d4744a13b03fc27ec974678d5128a80c67072a7fcd143f47e6817960381a
SHA51279bf1f0e3d3dd5983091e477820e3e9899db8acdf4f6ee9739d3b317e0754309bc5c47453cd635d5f32007a473b57a9192fa3f6c2ab8e3d844d92bf359070618
-
Filesize
8KB
MD51e41679f5521d4f95245c3d6e3a2161c
SHA125020b4487b9109a65a2da14f79368d4b3791dbf
SHA256a788cf4cba8643a6cc370f95d33f8222e74394072f707b261b9f3bca9a6b2273
SHA512e6024a8147d4befc6918a31370d8f9eca4d6785792d1ab0e7fd38767c9b10879d66fa5bacfc5420c10b5007f5cba3cca4355dddcb348af410d663e90311863ef
-
Filesize
99KB
MD5733cd8959a272e8e1b082b56a030c60e
SHA1ce96b246337bf29928f4005bd41bd70836cf276f
SHA256b75be1017a1930dbfec1986b4afb31097e7ecec8388ed4c1392b00e43b20adfa
SHA5123619c0cbffb075bd2ff73ee88b195d6605c4e32c38265849ecdb6fcfcbb7bdda10a522919f4bad121dd7b2b98bf26f6ad3977bc26b6a00d8d37c143164b6fb5a
-
Filesize
99KB
MD59ce33b121d988c827a7681e25d98ef14
SHA10edd1f1b5d26ffd635bc4a48a7034661ebb3e101
SHA2569e9620cc0bdecbe006dca141465cb517dfcb1775bd3aa61f0258ebf5d00949c0
SHA512d07f51d8be1b7125ccba8864bdba6681bca83bf8531f416d8747b760c5bf616d7535ce7704112fcc3f2b1a8730cdbd06e63d30729218629e34774a28253d2894