Analysis
-
max time kernel
44s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2024 14:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://151.101.44.223
Resource
win10v2004-20240802-en
General
-
Target
http://151.101.44.223
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133676024761511985" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5036 chrome.exe 5036 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5036 chrome.exe 5036 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5036 wrote to memory of 3444 5036 chrome.exe 83 PID 5036 wrote to memory of 3444 5036 chrome.exe 83 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 2200 5036 chrome.exe 84 PID 5036 wrote to memory of 3356 5036 chrome.exe 85 PID 5036 wrote to memory of 3356 5036 chrome.exe 85 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86 PID 5036 wrote to memory of 1404 5036 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://151.101.44.2231⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff226dcc40,0x7fff226dcc4c,0x7fff226dcc582⤵PID:3444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1824,i,3415653303310626826,8226508049022111717,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1820 /prefetch:22⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2088,i,3415653303310626826,8226508049022111717,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2156 /prefetch:32⤵PID:3356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2184,i,3415653303310626826,8226508049022111717,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2440 /prefetch:82⤵PID:1404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3020,i,3415653303310626826,8226508049022111717,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3024,i,3415653303310626826,8226508049022111717,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4584,i,3415653303310626826,8226508049022111717,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4600 /prefetch:82⤵PID:1720
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3488
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD5657a39b4e5ac247f013b995bc97daa2b
SHA126c6cf748b3a5ea1f75cad0ed66439601a963434
SHA2564f32fd2a70a1c0b5b08ba3bc105465f5a32f282d0aeaefca626ab2b068640865
SHA512137319de2386f37e0778e15fdcb1d82891433348b39b6c2f3a6a0b55770377d77a0c8b35c6fbd6686839c6358ff4da08aeb11471998398524e7431674e9518b5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD554fb8787f95c3d498af5e3489c2e309d
SHA1502b1374ee5703493b05b8f8bb902c8c631a12d2
SHA256318e47a66679eb33b95299676985a4a93d64fd0eff4d10335fbcbae8719de7a3
SHA512c820838987c79392b507b305c5f4d5150b4b1ccb4cd1dd2e7a053f00a10284e1145a6bd552abfab1ce4dbf26fe9c5595f5019d7e143ab3a4702632de8f8549ed
-
Filesize
8KB
MD5aebb2d8872e1c877f65d3f3888045867
SHA1448b37b0617f354dcf25feb3d581144df42ea5f3
SHA25694e3e6272f05c5af914924776713b72783ef0f392fe6a3ece5806803a43b6d7f
SHA5126336a40fd4645d304b1a2d4855d937dba1c468656c62b7bc7c9e9c7bc23391fe41ed77d5c862e7ad826703d2f398bb30f1b8cccbc1f2f6cfbdc881e17e1f271c
-
Filesize
9KB
MD5dbe23a360012ff644ceaa5af40d735ed
SHA1b5b85b0eeda67aa9d8ea360be84a0d325bf720d5
SHA256971bd3e9fe3358f6b85e66d603016ff2d2c32ff3dbf211f5c75f8002c7783e9e
SHA51232a84e5857f254b725c349370da0efc26cd54daf3e34f1003930a5e0f8a6890151ac5116b688cf9f73332449a501c5d8e68f320fd8b5cbad4966094b55b09b86
-
Filesize
99KB
MD5cb93c1c9ec1e1bde454ff8838a08f5f1
SHA1575e25971f063c83eadf01a6644620d97dcf25d1
SHA256b5cc22cb01e452526bb0c0ce5d7fec28f04b2a398e7636e1535de4677728fa58
SHA512bbd0b2d845f80cac536983c8792aaa32174fb5a85a8120f748db66b325b8841119408f2ea122b86fbc83b0edb046479f0c0db546f973c657506d8f4005dd9875