Analysis
-
max time kernel
44s -
max time network
52s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
20-08-2024 19:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/EmK530/BloxDump/releases/tag/v4.4.4
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
https://github.com/EmK530/BloxDump/releases/tag/v4.4.4
Resource
win11-20240802-en
General
-
Target
https://github.com/EmK530/BloxDump/releases/tag/v4.4.4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133686556354592826" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2368 chrome.exe 2368 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2368 chrome.exe 2368 chrome.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeShutdownPrivilege 2368 chrome.exe Token: SeCreatePagefilePrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeCreatePagefilePrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeCreatePagefilePrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeCreatePagefilePrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeCreatePagefilePrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeCreatePagefilePrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeCreatePagefilePrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeCreatePagefilePrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeCreatePagefilePrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeCreatePagefilePrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeCreatePagefilePrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeCreatePagefilePrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeCreatePagefilePrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeCreatePagefilePrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeCreatePagefilePrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeCreatePagefilePrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeCreatePagefilePrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeCreatePagefilePrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeCreatePagefilePrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeCreatePagefilePrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeCreatePagefilePrivilege 2368 chrome.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
pid Process 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2368 wrote to memory of 4488 2368 chrome.exe 71 PID 2368 wrote to memory of 4488 2368 chrome.exe 71 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 5084 2368 chrome.exe 73 PID 2368 wrote to memory of 4092 2368 chrome.exe 74 PID 2368 wrote to memory of 4092 2368 chrome.exe 74 PID 2368 wrote to memory of 1224 2368 chrome.exe 75 PID 2368 wrote to memory of 1224 2368 chrome.exe 75 PID 2368 wrote to memory of 1224 2368 chrome.exe 75 PID 2368 wrote to memory of 1224 2368 chrome.exe 75 PID 2368 wrote to memory of 1224 2368 chrome.exe 75 PID 2368 wrote to memory of 1224 2368 chrome.exe 75 PID 2368 wrote to memory of 1224 2368 chrome.exe 75 PID 2368 wrote to memory of 1224 2368 chrome.exe 75 PID 2368 wrote to memory of 1224 2368 chrome.exe 75 PID 2368 wrote to memory of 1224 2368 chrome.exe 75 PID 2368 wrote to memory of 1224 2368 chrome.exe 75 PID 2368 wrote to memory of 1224 2368 chrome.exe 75 PID 2368 wrote to memory of 1224 2368 chrome.exe 75 PID 2368 wrote to memory of 1224 2368 chrome.exe 75 PID 2368 wrote to memory of 1224 2368 chrome.exe 75 PID 2368 wrote to memory of 1224 2368 chrome.exe 75 PID 2368 wrote to memory of 1224 2368 chrome.exe 75 PID 2368 wrote to memory of 1224 2368 chrome.exe 75 PID 2368 wrote to memory of 1224 2368 chrome.exe 75 PID 2368 wrote to memory of 1224 2368 chrome.exe 75 PID 2368 wrote to memory of 1224 2368 chrome.exe 75 PID 2368 wrote to memory of 1224 2368 chrome.exe 75
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/EmK530/BloxDump/releases/tag/v4.4.41⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff9298f9758,0x7ff9298f9768,0x7ff9298f97782⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1528 --field-trial-handle=1844,i,14288477870516672813,12558102261902022902,131072 /prefetch:22⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1784 --field-trial-handle=1844,i,14288477870516672813,12558102261902022902,131072 /prefetch:82⤵PID:4092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 --field-trial-handle=1844,i,14288477870516672813,12558102261902022902,131072 /prefetch:82⤵PID:1224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2864 --field-trial-handle=1844,i,14288477870516672813,12558102261902022902,131072 /prefetch:12⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=1844,i,14288477870516672813,12558102261902022902,131072 /prefetch:12⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 --field-trial-handle=1844,i,14288477870516672813,12558102261902022902,131072 /prefetch:82⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 --field-trial-handle=1844,i,14288477870516672813,12558102261902022902,131072 /prefetch:82⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 --field-trial-handle=1844,i,14288477870516672813,12558102261902022902,131072 /prefetch:82⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3492
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
1KB
MD5498763fb15037df0b6da7c9a9535ee04
SHA10417f24c22f00e661260fb7f30d47461f353d1df
SHA25607eb0f0a52c67f453b19ea2b28770a91cffcd7208b7fbf1daf8bb9766909e6ab
SHA51299d73716da5591c82ff3ddd1455486eccc68ebe86b5e283cedbce71a03235440f7fe53830159d2991ce8f8e32fce51b92675f51c849e5fa6d169fcff521b4b78
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
848B
MD5db0ade596a8285ae4075f32fb56c82b9
SHA1282a3b4d881012be33ff6e080ac81241ff4c9074
SHA25642debdff40a4dee5c9fe8ee510022776b09b9319ec9c4828302e2c08db7490c7
SHA512e1773deedcce320919b350b9007547e2317f5bb67544919260e87d9d90054d2561e9054648cdff25b421b9590ff997cf94c95b45c75ea8c5b863e99584fc68f1
-
Filesize
1022B
MD56cb40f5337ae47768602c76312cab126
SHA194216b50f0c4481755cf57fd2a228af78add0adf
SHA2567496ac50288dea5b36912575c260606749880a1bf79eea63fd015adc16f53555
SHA51204f19f532c7befe4b5eac873073abe58ff4e2ab6889bc5ce379b9eaa31bd8677844954bccee34411bf4a7a028a1c8679e88f859b04dba38d380ef1c3e771fde0
-
Filesize
1022B
MD55da2fcb0ca1b7bf7d19ec922326f5415
SHA1b03dbbd6b5360164085d7103196a87cdf66f80ec
SHA2562a7b1ca8e90e8cb0ef96d9925e459f638f80eff668dc37baea69095cfe0c8bcf
SHA5123097e486d6a86a9b1ce6f390dac4db8019c6e73beca144d56048afab1f66bb9de3148ab5a24c927d8585c93cc0194fbef2e8731bf1878de1b4daa85757e8fb4e
-
Filesize
6KB
MD5e9c4678ebf5021a482e843f0a5da88d0
SHA15375de08778182e64396bb1dae0783a8ffdf32bc
SHA256af9aa272884b67170a98303ca3a41c8bf90fa67a46e2d5d8502a0baea061f98b
SHA512f051c6f220e2218089e45b90d6a79eadce182dbd527006c74c3f7a1cb6ce9851d94ef00160e7497a403c331524a3f66c82ae58d94896e273b63b4dfdd9e3bbb4
-
Filesize
5KB
MD55cdf0f590b6260a9d55ae919cc419c5f
SHA1a4a2103855cd663a773775b1692ab0df2274a366
SHA256afda31f54ed6b1f2c808f3e6ba386ce136bb9e7bb4e4dfc0eb728fe2ac9f1d7b
SHA5122ed131a8282c8cf7ed70a5a54f899c7367822d41ace7032d56722419a2aa06b77f508a547c3d521ac236042c8b70fba6b1257f3e13910eb64b5317a5654b7111
-
Filesize
150KB
MD5cc4d854b76a50f6b9cea4999b9e9269d
SHA1086f050f1c3e52deffa0c627d035e285ce46c3f9
SHA256d167400d38233b4bf276818468e3d2e46c2a0260ddb4d89e245769ae09d7b33b
SHA512f50e2cd63b82b26da68ffc65fed4a5ded76f76ad3027749e9019e7c8db0ed65efee829de07f93641e4a727939332ccb6c43fe827ebfafaf03656d5d9f2287764
-
Filesize
150KB
MD509cd1252ba11567bd4aa57bf7ae83d1c
SHA1d5e2a1050cbb99fd73a25758509438177bc1f87a
SHA2563586535160a611fa69b68e7759272b6eaa0d52f5ec85251281ba6da6512a5783
SHA512437bc328d9932162052bdc83c1a4d6025befe8f99f81d4ed2c35ae04c9c04cc855c94c4e47af1df98cbb192c3c36bd70fe801d0fdbdc29b694e09fa3bf942973
-
Filesize
150KB
MD54c37695fb6022048577e061645883789
SHA13cd893d69f406f54f33f2d3964562954ce6e4e86
SHA25639b5f4339e5f6959c20393799ae5257aba0c136ff913f0e24bda52febd50b77a
SHA5125c6d12127baa29e10b98df702f8d41260e5821bb0e00a378e3c5964837dab1b06de3017a3f6a0f85db5846117df7d7ea6620659b211f7f97c6b153b122c6e976
-
Filesize
10.0MB
MD5d0b33d3fd14cfcf7aa0b6708a2e773c8
SHA1212921f0edb2fdb9cc3946f9b9395d162bf0d834
SHA25601470bb0306280d4447f2ce596870a0353b804cba833010e5325e042484e3c4a
SHA512c3fceaebef1710bf2e98df47b89743871388bf753b3219b25dc0d54707f673fbec1e1914568b5cda521bdf2fd4ccb497b1e59f213cff2f2b123280ec2b9fe285