Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 12:32
Static task
static1
Behavioral task
behavioral1
Sample
640965-outlast-trials-internal-cheat-run.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
640965-outlast-trials-internal-cheat-run.html
Resource
win10v2004-20240802-en
General
-
Target
640965-outlast-trials-internal-cheat-run.html
-
Size
16KB
-
MD5
a2866751bb0ee55c480c605a83c2fcdd
-
SHA1
ff075b9c80d64aff5f708eed70f3f2441c8c20d8
-
SHA256
c1c0646c5fcb141e69386184d3b5241a40f9fb16d1fc13c3db3549d36b815262
-
SHA512
737816b57b89bd88c547f0094846eb52436066feb3ec5537dc0fef6a26f16337fb1603decae3265dcf66412a51f9632a2afbecfadb2b65315055483632b56710
-
SSDEEP
384:yShi9boJkNzTPanf80HoRc/1bBpvAsXPwN:QoJkh2k0IRqzvARN
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133689763702133659" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2212 chrome.exe 2212 chrome.exe 3628 chrome.exe 3628 chrome.exe 3628 chrome.exe 3628 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2212 chrome.exe 2212 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2212 wrote to memory of 3608 2212 chrome.exe 84 PID 2212 wrote to memory of 3608 2212 chrome.exe 84 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1264 2212 chrome.exe 85 PID 2212 wrote to memory of 1008 2212 chrome.exe 86 PID 2212 wrote to memory of 1008 2212 chrome.exe 86 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87 PID 2212 wrote to memory of 1096 2212 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\640965-outlast-trials-internal-cheat-run.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbd21acc40,0x7ffbd21acc4c,0x7ffbd21acc582⤵PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1928,i,16814449471822036381,5560316461327620714,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:1264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1892,i,16814449471822036381,5560316461327620714,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2088 /prefetch:32⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,16814449471822036381,5560316461327620714,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2380 /prefetch:82⤵PID:1096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,16814449471822036381,5560316461327620714,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3128,i,16814449471822036381,5560316461327620714,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4604,i,16814449471822036381,5560316461327620714,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4656 /prefetch:82⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=208,i,16814449471822036381,5560316461327620714,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4412 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3628
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1056
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\4c2d8bf3-fc16-4953-b4f1-2f299688ee0a.tmp
Filesize649B
MD51e006af076fcee1501dc6541aa4d7023
SHA14dc267ea35f48a94735ed6a21cd5d9b9b0c1dfeb
SHA256ca2a16b8784c61cd5a66dc18ea2b112ad47d9b6e35cfc3414adff047073a08f7
SHA5128d52d989a864b3ea3ec88feae030e3036e88d5cae77a55cf2183896edbbbdb8745c1b0098b12a4946dafbdccb6aa47df71b980d988bf50df1444525efccd673d
-
Filesize
1KB
MD51adce9162abc4eed32c1b8ab0ae51ce7
SHA19184222da61946d3ac7c15365527e032853baf76
SHA256b06ab0b2034131b24dd0e94fe2bd7bb5fd7440cd6bd59b4d20856b47c3888f00
SHA512beeacd57a904e242e2e1c783f3a39d21924d9be664aa4e3071e54edc7e393360664de94f1180eb0c762d89b757bc5f7e0938abf70a1e47531a40abbc034d4343
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD50e6afba49c3775ae40832f0c8d7f38b3
SHA19f5e17e1bfb969c1ff2100ccabd702bbe58f9985
SHA256b6444f86718be42d26732b07a3933f9e9be48721041d2e2add7353e2b86e4825
SHA5127cce683477d2deb08ed1e804c8aa7c2895b1781551b5167dcd8e05288f54814340bf1b589b00e73a5570e93317e8671252d7b92eb59f4aa6aeebd8be131e0807
-
Filesize
9KB
MD59194f3c9564bd0b5da5a03486ecb277a
SHA1f339db2e17782109e49a726011e3c1cac46d8272
SHA256d117c3c55bea3dc4f84559ccaf53ba7ee3e460cad789eada0a70dd2099842ada
SHA512e16c6c459b522c5065462eacd0bb69895390f1d20635766a95cedd189cc4c32a3548d8b7d72d56a75a0893e5c617f8c8018fe1a1c4ee0a962047ca64eb8ab3b1
-
Filesize
9KB
MD58b0064069aef9f6fcb75b4e59eae3ab8
SHA125b9b94659cb2a3aaaf15cbf65bcd35ead792e52
SHA2561d1dabf9040d79694d12a66073dbcf76f6e0ac0fa2412b61233423dea6a5f04e
SHA512c87b60c56a65730a7284ecbdcd3448508c7ba3a0e3d2033cc62185b769348fd2d3026aff1d53dbe39d7db6821e7a5046e4c1c12744ea772724abf4a06b81ec8e
-
Filesize
9KB
MD5bc45a86a0f2e5803330cce7ea44a3153
SHA1f3d801e944d4cee8fae16a4075d314b672d0842d
SHA256378b60126292aa5692ff5fd70ade38be0e09c9235e1d6ebbc75df58c1fdfe988
SHA5127c8639c8f44c4e0ed9345dff491411d84076b515c107065a85ac680ef3bf165f803226ecd582a87e41b5d1eb63e7f12a03a841f4ffacf1a053e00410ab19e5ec
-
Filesize
8KB
MD5715fcc1afe805ad659094066a80c2c00
SHA192ad891fbb91295d1381babbfdeffa784bd2cc50
SHA2565a63e754f781fe4950a237914768f09b0f4c6c8895404746b25f186e1c21138e
SHA512c36558b7a67c1580a56454150f4bb9af5fab71adacd83a1379558bd613f87d472afd54b009c3e61279e8006bde1836596880897f99bd7e02ee16aaddcdef0fa5
-
Filesize
99KB
MD59d42bf546d3b15c7a4eebb807bc87190
SHA151842726f6a3907fdd4295e412ca6f20fc8a26ec
SHA256f4b961e1c0cc0cb519b3c6102a29019f0d90959362237e9b83d1fef817795a6a
SHA51220cc3eb1a400d2ca2eb24f1e7772c2c750ced279d09897a00fc5c9f6197fe7193c6cf9e7ed01d53919f9a386f97da54dab4a631a6fa8ca7fadfdf46ca92e04ef
-
Filesize
99KB
MD585c578b0520fa63f54a4733c014720f6
SHA1453d60ca13e38bd438d03bdd6a41c8cd24228dc9
SHA2561cb3ba2cd158cfe5c13108f071a454fdf98a233465c47f3a388db85af849b8b0
SHA512f9429c7739cb748e992ea9a596fb3edc1e16bc9a706a7cf4b108cc27ff9ad6837d54b047b85e1396e9e8730f74194500032c5a5fc0cf841092e16076a8c69770