Analysis
-
max time kernel
11s -
max time network
14s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 18:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://transcend-cdn.com
Resource
win10v2004-20240802-en
General
-
Target
http://transcend-cdn.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133687389293700708" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4316 chrome.exe 4316 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeShutdownPrivilege 4316 chrome.exe Token: SeCreatePagefilePrivilege 4316 chrome.exe Token: SeShutdownPrivilege 4316 chrome.exe Token: SeCreatePagefilePrivilege 4316 chrome.exe Token: SeShutdownPrivilege 4316 chrome.exe Token: SeCreatePagefilePrivilege 4316 chrome.exe Token: SeShutdownPrivilege 4316 chrome.exe Token: SeCreatePagefilePrivilege 4316 chrome.exe Token: SeShutdownPrivilege 4316 chrome.exe Token: SeCreatePagefilePrivilege 4316 chrome.exe Token: SeShutdownPrivilege 4316 chrome.exe Token: SeCreatePagefilePrivilege 4316 chrome.exe Token: SeShutdownPrivilege 4316 chrome.exe Token: SeCreatePagefilePrivilege 4316 chrome.exe Token: SeShutdownPrivilege 4316 chrome.exe Token: SeCreatePagefilePrivilege 4316 chrome.exe Token: SeShutdownPrivilege 4316 chrome.exe Token: SeCreatePagefilePrivilege 4316 chrome.exe Token: SeShutdownPrivilege 4316 chrome.exe Token: SeCreatePagefilePrivilege 4316 chrome.exe Token: SeShutdownPrivilege 4316 chrome.exe Token: SeCreatePagefilePrivilege 4316 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe 4316 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4316 wrote to memory of 5064 4316 chrome.exe 84 PID 4316 wrote to memory of 5064 4316 chrome.exe 84 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 3136 4316 chrome.exe 85 PID 4316 wrote to memory of 4760 4316 chrome.exe 86 PID 4316 wrote to memory of 4760 4316 chrome.exe 86 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87 PID 4316 wrote to memory of 2360 4316 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://transcend-cdn.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xdc,0xe0,0xd4,0xd8,0x104,0x7ffdbe23cc40,0x7ffdbe23cc4c,0x7ffdbe23cc582⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1864,i,1105142643348386326,16654200228661142581,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1856 /prefetch:22⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2136,i,1105142643348386326,16654200228661142581,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2148 /prefetch:32⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2220,i,1105142643348386326,16654200228661142581,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2344 /prefetch:82⤵PID:2360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3044,i,1105142643348386326,16654200228661142581,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3076 /prefetch:12⤵PID:3752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3060,i,1105142643348386326,16654200228661142581,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3108 /prefetch:12⤵PID:2784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4484,i,1105142643348386326,16654200228661142581,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4440 /prefetch:12⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4032,i,1105142643348386326,16654200228661142581,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4632 /prefetch:82⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2132
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5af3b01195fbec58908315a2b41aa511a
SHA1e1baeb43aa53e2a494eca8f9b99dce7c7a4d6dbf
SHA2564a3f4b95a45ec67beff2dac4197ad1d22e29cfb6ac69944661210d211e419db6
SHA512a4fb08b23f5ce4190bd13110754e76478d5acb84191f447fd82d982385286f3e8501331d27f3dee90722c7c7afb1fc6849949a6b8fc18edcd24ab2cfd1a75923
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5e71faf41701971c7cb641bab9e32160c
SHA1156dbb8419a81f04045ebb524cea085acca98b12
SHA25626b8a2dba45b0b35cb201af245a0fec24d7ebdf4688761553e6d69ec3dd4ca8d
SHA5127468c17dd1b58a8ece10f6d549a605cac14add509b6aa4260c1488ad12c1d072a4dfdde2813bedc66055945c15531685e4b1c1852b8840ce9b1a6dd7818e4d4b
-
Filesize
99KB
MD58362fad3594cd9e8c15e7082a636fde7
SHA1f4bb1ffbf6faefa608a1e1eb650318ccec7b4145
SHA2566a39cdd36dd4968937ec9f74433641d56d5190a1c858de5b68e9d0e4c0378020
SHA512e0d7484958063ff5351003d0b52d4fae6ce6fd2fdb77410289e25d168d09a1a975912c273e58eaf3a856905951d0a68cfcaf36e3ea5823c88a818b525f2c9cff