Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 12:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://osx.metasploit.com/
Resource
win10v2004-20240802-en
General
-
Target
http://osx.metasploit.com/
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133681137748004905" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 736 chrome.exe 736 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe 3580 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 736 chrome.exe 736 chrome.exe 736 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe -
Suspicious use of FindShellTrayWindow 45 IoCs
pid Process 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 736 wrote to memory of 3404 736 chrome.exe 84 PID 736 wrote to memory of 3404 736 chrome.exe 84 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 2288 736 chrome.exe 85 PID 736 wrote to memory of 3348 736 chrome.exe 86 PID 736 wrote to memory of 3348 736 chrome.exe 86 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87 PID 736 wrote to memory of 4444 736 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://osx.metasploit.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd09e5cc40,0x7ffd09e5cc4c,0x7ffd09e5cc582⤵PID:3404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1904,i,14016979026482107874,5843824708081388067,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1900 /prefetch:22⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,14016979026482107874,5843824708081388067,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2160 /prefetch:32⤵PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2228,i,14016979026482107874,5843824708081388067,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2396 /prefetch:82⤵PID:4444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3052,i,14016979026482107874,5843824708081388067,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3076 /prefetch:12⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3056,i,14016979026482107874,5843824708081388067,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3068 /prefetch:12⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4472,i,14016979026482107874,5843824708081388067,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3660 /prefetch:12⤵PID:1124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4412,i,14016979026482107874,5843824708081388067,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4392 /prefetch:82⤵PID:4360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4816,i,14016979026482107874,5843824708081388067,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4760 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3580
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3968
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD546bb668fcd09a9377509f7a39c131c81
SHA139caf691e9b03288168664a56d78adcbab541072
SHA256b34e388c5b5657549aab7465eefc097042215a5b25fd93256b51b120e7b702e9
SHA5121b5aad7ae1ec90eecd8b0f476929f0c115525dc9cfec85feecd84d59413c781f1aa5273a9ebfb1044db6b25cfaa7e41e87674a9c2e5ad9976531db04b2482590
-
Filesize
1KB
MD5ae1f8869a3f4bea10f7a18631df3034f
SHA19212b5d06b50b4182c71e3d692a8fce235ef1b37
SHA2568c048f2d23556ff89d6e73cd9ed761c15b64935e9f985ce393ca1496bc7f56e7
SHA5120cc5ff95bfa757858a37dda0286948cd7f7148b27d1aecb09347300c17c796bb8789f1568a20ea264d0739a88889dd8984aa39d2be800fa07d9f4ec3f45392a8
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD57ad7a2976cc3e08642c55248621a77bd
SHA1b22f8531422141a964621010f2fdaa98e2d18e26
SHA256888ca57643b1cd70a7698c5e3b335c67f818822bbe263462c2fc5f414741055e
SHA5120fb84dc7be7ffa26abd6540fe3465db2064f9306e46550569b23f54a6335e18645b26d07dfe1646827ec103ccc431d219125dbf77eda531907f709d0d109bfff
-
Filesize
9KB
MD512a2117ea70ffcc7b7bf6ec386384415
SHA197731a1bcf934249b600a1a1c2a056c3741717fa
SHA256ba1cedef2c714aaba5953c35fc2b1b837e9dc66b3d58b1ffe6c61ae5b3e31b6c
SHA512510520e74d8eea0f0b81a326a3258ecac423e0d2088eb494f984fdb109ed0ca0d18c391408f505de9ad9b5e825d0a40f27c61f0a81738543e4e17b477460cd30
-
Filesize
9KB
MD58740292db103a17b544540847770cbb4
SHA19dd1288747ac6681b7fea95cd037e785a0baf025
SHA2563062429f8641d52aabb9f23b1b798d66ceef65e36747f1d0d9e48e70b98c9fcc
SHA51250e1f99d307fcbb52aa053373cb1876e6d6e2300ed77a441591f63d2acf67316ca59cc008136d9f194623fdcc6c86685b3b163d4330e23c1bcb4e58ebf728584
-
Filesize
9KB
MD5e031b8ad5071f596fb92f8fc5b60a18c
SHA19ef88568cb9d9b85534db27a99d4b403a2e9b410
SHA256def2d906fc4433f546710bcce7eb5f69a4c11cad4432fbc24b7c3ff519469301
SHA5129dbc7d4ef7e5541a41ea25244b06ff98d3b47b080363fe9653fd7c5c1b01658c7ab8a62f1e1a6e1e85458d53a7d6328f50387dad609e1b2ab8025517ef9dfc3b
-
Filesize
9KB
MD58ec9171906d0c0930f3d1e078d56d2f8
SHA10055518ca5518a5490097cc71b7247f3ee8110ec
SHA2566bceda055214f2ee1f7a45154fbd2ee0a5c840fa65221d854ab0d07310d66f35
SHA512ddee8f7077342f04e4f3a13751cbff247382fa53b17505434d5d41370a2afa90f9de129fa66b5e9cfbfa74c5f53197a2e379c48aa538bd5bb9e916f54f9b6f5e
-
Filesize
99KB
MD5bc1c5002503aa689fff67638a8e360ec
SHA19a099ec34bc890a4af3b7a681508c8bc8019383c
SHA256ebb71e32ed6519c8a23a21c1a167dfd9aaed034791427fb358accb867d1ce39b
SHA512063d8585fd9b827b874f61311ec62a328874a4d3ca8a53f24134a7150f87521f86b4a7bb39cb82632cc5b2a93b1c15442425fb5e7b6fb9dff8930b13d69eb2ff
-
Filesize
99KB
MD50b6c812f6f9f2a76acd4dd92c4a1b26f
SHA13c65371913c0eb66d7efd8995cb7d9d861f6a904
SHA256804e3c2570c29a66e125060e62924c645e477ec8f1a03092ff83e70a33d27ac1
SHA512df8d50476a4ced104f803bd99f9e379e430a32e4b900715f8b900952d11d7484a1fde32f4c5d95e36ffad30658a96d95d895aa15daa96e221859acc513dd2492