Analysis
-
max time kernel
31s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 20:26
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://monitor.ppcprotect.com/v1.0/template?accid=5bc6001f9abf1115557d7162&url=https://askgenii.com/nu/nu/4373565192/[email protected]
Resource
win10v2004-20240802-en
General
-
Target
https://monitor.ppcprotect.com/v1.0/template?accid=5bc6001f9abf1115557d7162&url=https://askgenii.com/nu/nu/4373565192/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133688320364683965" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4780 chrome.exe 4780 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe -
Suspicious use of AdjustPrivilegeToken 60 IoCs
description pid Process Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4780 wrote to memory of 2052 4780 chrome.exe 84 PID 4780 wrote to memory of 2052 4780 chrome.exe 84 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 1756 4780 chrome.exe 85 PID 4780 wrote to memory of 2096 4780 chrome.exe 86 PID 4780 wrote to memory of 2096 4780 chrome.exe 86 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87 PID 4780 wrote to memory of 2664 4780 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://monitor.ppcprotect.com/v1.0/template?accid=5bc6001f9abf1115557d7162&url=https://askgenii.com/nu/nu/4373565192/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff86503cc40,0x7ff86503cc4c,0x7ff86503cc582⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1900,i,8012710894240013257,2078641000916285082,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1892 /prefetch:22⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2176,i,8012710894240013257,2078641000916285082,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2192 /prefetch:32⤵PID:2096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,8012710894240013257,2078641000916285082,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2452 /prefetch:82⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,8012710894240013257,2078641000916285082,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:3928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,8012710894240013257,2078641000916285082,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4332,i,8012710894240013257,2078641000916285082,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3692 /prefetch:12⤵PID:3796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4744,i,8012710894240013257,2078641000916285082,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3480 /prefetch:82⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:796
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5efb40f8449fd3d16b71c1bd9f9b1beaf
SHA14e1bd4617c96722a9008696b41aa9c8432ba4cbd
SHA2560925bb6575b4bed5564e02070bf31d110f8be078b91453f882d3970398f1ae13
SHA5126b39616d05a09c0610fa8d9871fd94b611fc260850ada37fd1a9640e7cf9874436305b3e9666071aba791cfa40a3202f88f2c646628494804787b9625888904d
-
Filesize
360B
MD54b8f5181795055b0779ed0d7a6a3d45d
SHA103d00719becb417055bc79de4b7c4adbf1aff3e4
SHA2563366e13663b49d463975955f0311c16cc7c85637478e5452aa2ae05f01dd26e4
SHA512f2306a72bd8ea411644d10c26891638b689d34b883f4d1cd9d8ec346c44513e029d2d185ac93df71c1921e810dbbef601b96c53253c37382b7272a8808c9b8df
-
Filesize
1KB
MD58297959d324f577cc7bc33d075a92d35
SHA1a1707b18450d41c6a547f381a08f9d3717d5f212
SHA256f19e4e5572c818efad8e6ad8b78217e95729b32c3b918058a8edc70a1f1e1386
SHA5128619d775a55aa32eb31b2bd82d19739d9f87ed2abe383c6ea2c1cb5578c7b58c766ed1535c99e1825ef1ae3a2ea66f539b244b83731eb4f23be755f0f5927957
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD531c20eb1082c59dfdda2d680b09a4b26
SHA1c782752141efd4f5c53a1dca9be1b541b73ce540
SHA256bcfc9c0e2b69532f006bc9f9e0f1f6f3fd8d0990f6589d862c6c6ad211bd1211
SHA51299ca2f93699f6b304049e36d62e3897ab9c8ffadd31543d750a59d782d32d9d42ee666b7bbaed033b321ffb04d7e65049cffbc851d18ee45df35f12ec5dd6bd8
-
Filesize
9KB
MD5eaab82ba1685a181aec4075d271c9707
SHA15ca7351b3e82fbac938720dba47a078143ea04d7
SHA256003ff9a62d7750054e86a804f07f11c201bfd1a2bdeadbe27ea6e4476dfe9e4a
SHA512e4ebee64b9958d269d94a44453b9b7019808e294cf715266fca4a612e207d74328e60e09d8afc0592e7ad416be3d391fb5dcdbfa65b26f347f92ca67e69477c2
-
Filesize
9KB
MD59e6eac419a99ea051a8dde8d341fb782
SHA1d0e06e999303071f9add955b0761359176e16bb2
SHA2563a186c7f2923c9adfd21cfea56687aaa702267fe12257f3772b645b673a50e1b
SHA512f340c64041a3fdf8f45055a66d8a93a1b64beeb16ecc91f160fe46b000bb144eb84fba5e5dca8d04ae0a2dcfb7f23feb71e11ee96fc0cf1540f70b94deea2566
-
Filesize
99KB
MD5c4d257dc114995532b6c77606a139a6c
SHA15130d464064b48d3deab71ce30aed0476bed07f9
SHA256bde888c532c4f7135ceee387e266907086d9ac3ea1b62a4768363d566c352bfc
SHA512f2dc170702b116edfbcf82a8c7ea6c806444abf27973526ba5b1750436833a1006d31777bb87c20fa7300098ca283f31198431e264766f4b34a0de951826abad