Analysis
-
max time kernel
18s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2024, 13:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://Unduitrecovery.com
Resource
win10v2004-20240802-en
General
-
Target
http://Unduitrecovery.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133675114391343437" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3404 chrome.exe 3404 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3404 wrote to memory of 3112 3404 chrome.exe 83 PID 3404 wrote to memory of 3112 3404 chrome.exe 83 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 4876 3404 chrome.exe 85 PID 3404 wrote to memory of 404 3404 chrome.exe 86 PID 3404 wrote to memory of 404 3404 chrome.exe 86 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87 PID 3404 wrote to memory of 1560 3404 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://Unduitrecovery.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x104,0x108,0x10c,0xd4,0x110,0x7ffa94f4cc40,0x7ffa94f4cc4c,0x7ffa94f4cc582⤵PID:3112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1892,i,9572190618435908310,13133952403403061903,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1888 /prefetch:22⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,9572190618435908310,13133952403403061903,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2184 /prefetch:32⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,9572190618435908310,13133952403403061903,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2412 /prefetch:82⤵PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3044,i,9572190618435908310,13133952403403061903,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3080 /prefetch:12⤵PID:3952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3056,i,9572190618435908310,13133952403403061903,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4480,i,9572190618435908310,13133952403403061903,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4460 /prefetch:12⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4884,i,9572190618435908310,13133952403403061903,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4932 /prefetch:82⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2744
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ab563f8f3966123566b8469d8669d3ec
SHA1a47b4daa7f128189bf35eea98d0a544836f6258f
SHA25677fd678032c9ca48593eaa747e6a19027bd4a7b24f48b6b5000045d07b1ad768
SHA5122ed9d478d88caf8efbeaabe9197a074a095f311431ed23c7ddff711ade6b0969bace75a5285dc7641422b75ef9eac5a658af0d1310dd055b3860e3ca1145c89b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD562e56fa78921dd354d961f5077343f54
SHA1dcc9c747bb5597dfb3d0ba8c532825f017abda5e
SHA256a96e6cc0b80f75f87b5d39a156ee7367a26182381d29d414315b6a724e71c0e1
SHA5122beb57e533a7af67806bf302a3ba25d781f916c3304c26d6da4c64a4e76b081bb221a58089de9d50b59dc7603fc9a76c9f3474dc4cfb6c3e7cbbaa785f579577
-
Filesize
8KB
MD52c26dbcd8d4f5345b2aeeafa9a0e92a9
SHA1de63b9f0eaa0c706e18da7b2c365d93ae54ae49f
SHA256786677a048f95ddbcc9e9919c9f13e751e2bc767dcc3df96b3f2234067acb5e8
SHA512dc63b528f221a6701b79349922109fd70da4f0f06d9f2e83b27b3566b8638ae723a42602e92a37e2bda19e6413b6b6763b5583c17fe4dfaf1cd7cf4e515fa39f
-
Filesize
99KB
MD5c3596c8f7cbb699cc5eea56552ec6889
SHA1c6a6ee3d5b6509754c92c3280f6ec08e53b9e78e
SHA25661d0e9b9354de2a10852794e409185b6366bf347b4c2d383495be26cdfb7b6dc
SHA51266487e8c94b65e34143b3995c425d943be88ce3cc126d49645ab9fea077861cadd8c16abf2b4dbe1785975b8b3e6b7517f524f90e7c3d944d98ce5ede6bf841d