Analysis
-
max time kernel
149s -
max time network
135s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23-08-2024 04:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://niren88.com/
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://niren88.com/
Resource
android-x64-20240624-en
General
-
Target
https://niren88.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133688621547286556" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3660 chrome.exe 3660 chrome.exe 4892 chrome.exe 4892 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3660 chrome.exe 3660 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe Token: SeShutdownPrivilege 3660 chrome.exe Token: SeCreatePagefilePrivilege 3660 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe 3660 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3660 wrote to memory of 3412 3660 chrome.exe 74 PID 3660 wrote to memory of 3412 3660 chrome.exe 74 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 1880 3660 chrome.exe 76 PID 3660 wrote to memory of 3888 3660 chrome.exe 77 PID 3660 wrote to memory of 3888 3660 chrome.exe 77 PID 3660 wrote to memory of 4756 3660 chrome.exe 78 PID 3660 wrote to memory of 4756 3660 chrome.exe 78 PID 3660 wrote to memory of 4756 3660 chrome.exe 78 PID 3660 wrote to memory of 4756 3660 chrome.exe 78 PID 3660 wrote to memory of 4756 3660 chrome.exe 78 PID 3660 wrote to memory of 4756 3660 chrome.exe 78 PID 3660 wrote to memory of 4756 3660 chrome.exe 78 PID 3660 wrote to memory of 4756 3660 chrome.exe 78 PID 3660 wrote to memory of 4756 3660 chrome.exe 78 PID 3660 wrote to memory of 4756 3660 chrome.exe 78 PID 3660 wrote to memory of 4756 3660 chrome.exe 78 PID 3660 wrote to memory of 4756 3660 chrome.exe 78 PID 3660 wrote to memory of 4756 3660 chrome.exe 78 PID 3660 wrote to memory of 4756 3660 chrome.exe 78 PID 3660 wrote to memory of 4756 3660 chrome.exe 78 PID 3660 wrote to memory of 4756 3660 chrome.exe 78 PID 3660 wrote to memory of 4756 3660 chrome.exe 78 PID 3660 wrote to memory of 4756 3660 chrome.exe 78 PID 3660 wrote to memory of 4756 3660 chrome.exe 78 PID 3660 wrote to memory of 4756 3660 chrome.exe 78 PID 3660 wrote to memory of 4756 3660 chrome.exe 78 PID 3660 wrote to memory of 4756 3660 chrome.exe 78
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://niren88.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffab5359758,0x7ffab5359768,0x7ffab53597782⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1604 --field-trial-handle=1812,i,4376816820232212660,7236885740285128519,131072 /prefetch:22⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1800 --field-trial-handle=1812,i,4376816820232212660,7236885740285128519,131072 /prefetch:82⤵PID:3888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2060 --field-trial-handle=1812,i,4376816820232212660,7236885740285128519,131072 /prefetch:82⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2792 --field-trial-handle=1812,i,4376816820232212660,7236885740285128519,131072 /prefetch:12⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2800 --field-trial-handle=1812,i,4376816820232212660,7236885740285128519,131072 /prefetch:12⤵PID:912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4292 --field-trial-handle=1812,i,4376816820232212660,7236885740285128519,131072 /prefetch:82⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4300 --field-trial-handle=1812,i,4376816820232212660,7236885740285128519,131072 /prefetch:82⤵PID:1932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4360 --field-trial-handle=1812,i,4376816820232212660,7236885740285128519,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4892
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD52514a365edd116a46c1fee0723dd414a
SHA16cfeee7dee834e6a1c5ded043d24be19a1a773b0
SHA2560f39ce2b33b9d4a61f2990692fae3cefca6485d07c0b9bb8d55be003e9ff982c
SHA51282a19f53e67dcad2b8e1c7a9ea6157b2de3e9c7e1c066fa283c3637c9ef623ec7f2d97af06191edf3199c391a1560804b4bb370a7b6bcccd6fa77c64919460ca
-
Filesize
6KB
MD53f52a5b1481b847bc2a759ee02bd0e39
SHA165e5a54e75d88ca05d86d64cfde093b63ae411aa
SHA2566979f4bc573e0fa50df6e5d180c68dd5fb9a6fc026aef1183fed78d93578bad0
SHA5128f87046b05d51e8a67aed4955eb241426a42b559633f78275d6087ef9b4c848dfdb55aae162fdfea1caebc6edf7e255a69206ab6c5f00000d46a3f5a8b4e1142
-
Filesize
6KB
MD548e47d693333737a12e01db1e9fadbf0
SHA1255829c68bc65880b6d1f56297a74f289d25bdaa
SHA256f9e588546d60086dfefe0def4d30fdf3297f4acc265666da0a71353d5140f6fb
SHA512d549acb8a54933f790fe3e9934a0b0f0074f85364849c6b0547749bcda4528515fd4d545b899b337e0a0c1f1a9486496e6d9f0d8560e7a76ada76ca469de371a
-
Filesize
136KB
MD5a953454fcf684ecd6874d3f2cc176b2f
SHA1ced6168ae6cb12354ef8be6d437be8cd733b9f60
SHA256be892b8f720b573372203a8b61b0b9a1304f6b5966c29b7fb606a7a98527065e
SHA5122fc88d4ca07033fe9ce1f7f9ce3e88fa768f57d4bafc0e0bb9acca2d00249752524b7293fc6fed438832c7f6f76814d182af1c52c7e83e82a80270e04427ca01
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd