Analysis
-
max time kernel
30s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-08-2024 19:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Endermanch/MalwareDatabase/tree/master/ransomwares
Resource
win10v2004-20240802-en
General
-
Target
https://github.com/Endermanch/MalwareDatabase/tree/master/ransomwares
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133675323272942585" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3188 chrome.exe 3188 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3188 chrome.exe 3188 chrome.exe -
Suspicious use of AdjustPrivilegeToken 60 IoCs
description pid Process Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe Token: SeShutdownPrivilege 3188 chrome.exe Token: SeCreatePagefilePrivilege 3188 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe 3188 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3188 wrote to memory of 4196 3188 chrome.exe 83 PID 3188 wrote to memory of 4196 3188 chrome.exe 83 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 2672 3188 chrome.exe 85 PID 3188 wrote to memory of 4340 3188 chrome.exe 86 PID 3188 wrote to memory of 4340 3188 chrome.exe 86 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87 PID 3188 wrote to memory of 3352 3188 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/Endermanch/MalwareDatabase/tree/master/ransomwares1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff83a36cc40,0x7ff83a36cc4c,0x7ff83a36cc582⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1892,i,10963092226619242760,9996706780529852421,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1888 /prefetch:22⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2112,i,10963092226619242760,9996706780529852421,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2160 /prefetch:32⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2216,i,10963092226619242760,9996706780529852421,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2436 /prefetch:82⤵PID:3352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,10963092226619242760,9996706780529852421,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3124 /prefetch:12⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3112,i,10963092226619242760,9996706780529852421,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4692,i,10963092226619242760,9996706780529852421,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3652 /prefetch:82⤵PID:1812
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2008
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5282c3e35fd188b8c0fa9c46dbfc6929b
SHA1c1b5b8746792e26b4e9a89fa4f813139a55422a0
SHA256f0523f06c104a2cf0ab7bf0e7142db00888ea6f3e829d13089253316031b4f28
SHA5124221b9e73649f715797ef129d3e63197c43f7e22d193d0f4d565f4513b234e404d430eb9a189fb9ebbde021527f89bff368ee98f8f91783d84b1a017eafb1b19
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD521bf95f72252603bf9fe59aaea32b92f
SHA1488e1f7b278f5baff0759a2d2d877603236d24fe
SHA256684bddd08b2e3efe6e7c0431017e3e04b07df3b79e23776dd545e5ca51a0b85f
SHA512d4035777444b8e29d10d1f621f3dbde99c4b427b01f3a5a3e6dfe59e4f02e2c63b4e199f26637620149c71c5f89c84e610b54127f07ecbd78ee52a7b5cbf00a6
-
Filesize
9KB
MD5c8644d12bc6298d2dc4a3c64f79578d9
SHA1cea7a5170e76f2a3be54c722e84d1e31e6527cd1
SHA25652e8e339044898dc845776189ce73a20a8303dbe00b8ca2ac48b0dc6ef0376ca
SHA512737904d71167c366f68bb2c7dc5acf0735617bb5e6b645cb35e8b83b012e0df3c03def3eb83be9f909cf954d034e8938aaa6f2f703bb8805fe7c7fc9917eee4e
-
Filesize
9KB
MD54ca86b57a23a36b75eea06952868ef1b
SHA10d538b73ce8d8e7daace34935307fd722861d4b8
SHA256e9301c7fee0864d536398aa9cf1619a4c3c4d6fc16193f96f0114eb27f02f582
SHA512e3b2d4ec83345bb4294bb20d38be20473b41695506624f87c28d9a164e50461bbc1fbe7ac2dbee0f9cc53db4a9623ba91cecb335029988851ef988806cbeaf8c
-
Filesize
99KB
MD5fb69a92c935f9fb4ea4fe1cbed293356
SHA1fac18bb153530de2defc5444345fbe89321e2915
SHA256c4e4a30a3152528319b35e81a48bd4be44c434ea28c07e157c05fc51e6396508
SHA512c622257887691098eb6022bba199a9071e6791833ff9bdc5a63756004cdb2b9d4ceae473421103b80dcadb3425de094b72242f1662cf3b85c034b4d8dcf398b0