Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 14:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://apps.timopartl.com/6nc46des8zk3e/workinghours.appinstaller
Resource
win10v2004-20240802-en
General
-
Target
http://apps.timopartl.com/6nc46des8zk3e/workinghours.appinstaller
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133696748435672350" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 664 chrome.exe 664 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe 220 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 664 chrome.exe 664 chrome.exe 664 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe Token: SeShutdownPrivilege 664 chrome.exe Token: SeCreatePagefilePrivilege 664 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe 664 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 664 wrote to memory of 3252 664 chrome.exe 84 PID 664 wrote to memory of 3252 664 chrome.exe 84 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 4888 664 chrome.exe 85 PID 664 wrote to memory of 1912 664 chrome.exe 86 PID 664 wrote to memory of 1912 664 chrome.exe 86 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87 PID 664 wrote to memory of 3616 664 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://apps.timopartl.com/6nc46des8zk3e/workinghours.appinstaller1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9dba7cc40,0x7ff9dba7cc4c,0x7ff9dba7cc582⤵PID:3252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1952,i,1104378660893680884,6497320620241236463,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1948 /prefetch:22⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1864,i,1104378660893680884,6497320620241236463,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2004 /prefetch:32⤵PID:1912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2164,i,1104378660893680884,6497320620241236463,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2196 /prefetch:82⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3044,i,1104378660893680884,6497320620241236463,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3076 /prefetch:12⤵PID:2572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3056,i,1104378660893680884,6497320620241236463,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3100 /prefetch:12⤵PID:2120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4524,i,1104378660893680884,6497320620241236463,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3856 /prefetch:12⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3472,i,1104378660893680884,6497320620241236463,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4680 /prefetch:82⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4768,i,1104378660893680884,6497320620241236463,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4824 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:220
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:972
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5962e6918cf39b7911106adc87d5c24d5
SHA11c6502d0dd73871fd7da872b420f005438ccf13f
SHA2564b7e32439a4a70e7442a91df117872ef72f39e9051a4c32f9b646081285d285f
SHA5120a83eb3ccb7ee5ced42b52c75390a47c185fe7a037049b68fa37332b74f9058647c0c915b72d54dd4eaedf3df42ab3e24485f461c22b3c14d50bea9f3147603f
-
Filesize
1KB
MD52bdb69f5072039f4daa7bcbfe977de78
SHA13375732dc15e044f4e6b6d70143ca7e5f9b0b598
SHA256531b3f0d7bd3b861d0da6403b2bfcf745809442e596688260ee4befeaa18fcc1
SHA512312e6ca7221b7dd959efa408b56eb32c1521866c92f45da2f746e952c1e13fa3aeddbe2994d4ed57d1a543666a7eabb3a2d7348f372adbf9cf47d51e6ed2c59d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD595850b39f0e5543a47882f3b0b8c39f8
SHA109a6babf83e6cb36f3a04f0f75d31df8598b15fa
SHA25640a9530ac6aa45ef09fcf29309f5a0ff14102ccf87b11b77965cb1e3c9a4aa62
SHA512362fb75d8ff5f68abdfcf536243e2d1de00cc59390ca8487885c9feb80075b35f92471248d870b71f14ff75bc47dd592686ee54a1dd4d9f98890d991b82ff861
-
Filesize
9KB
MD575cae7ebe1f428bf7bdbe3004d77b8f4
SHA1d1fb74ba9b3ac682abf78e9d806aabba8fb22681
SHA25667cb21d152e341fc04eee0feeee752c9d864811d03faa4e1892392fcf400f1d6
SHA51219f8e305f73aca3c645821dcf52f1082a77d0a9e265e225273b8744cd9cd431da6793777c90b5ec6fd567368f9f07f3f3bef96929702e6fc0dda63f19db4a236
-
Filesize
9KB
MD520f32c960fc57ff31ca242bd505b481e
SHA15b444a7ab5fa65df87a5a326aae8b34c75de54a5
SHA2568153b44324fc8699ef1b47e91e78b8ad7e3296158fde24060d7fb30651294741
SHA5121a0f82fe258710e6c104e0fb6af20e095370958913630cf8641d21be3252d4f1b54491510fcc38df390037766ec4c1e80a0afe5b34e9760f10c79a84f9afea88
-
Filesize
9KB
MD5380ae47e40f2c2ce749972cf8b9edeb0
SHA1a604f460a669555b6f73f4464ef9bb60bb9ace0b
SHA256b5297d0a90ae24ebc9c656f2ad86c1763d75ffa81500ddd52aac5d72642b4f5a
SHA5129931779dad6fb2348d70fe4ae3ed038aa5d6d8c8ad4df610e903f791c55dc8df2415c93d394bc7223c1e4f4ad08f94fafe56c49001ca26a54ede6fde9280dc4c
-
Filesize
9KB
MD58395a841d9b96d0a4ae87b7f582ef263
SHA1a3a3b656860eed051ef9be270c70ac55823e7e27
SHA2566449f64682abf36d072db21e2a821e8bcecc8a72056c853e3fe72b7fe3388330
SHA5128fd74f6e889a72b4f6f53d5688d1e02d1fd4b8a4006fdc4fd711743000d889a3983862b98fab5564682099c332d0087ea29a636ded3567ebf6d727715eb05ff1
-
Filesize
9KB
MD52fd45c387b189c4d3f68eba283e3de71
SHA14fc13128a27fd8d2e0b46c2317d7935e7d3daf7e
SHA25610d3f35733b5e47e5503906c9ccf6aaa3d8ea18ab5d5a13a8df04bfca6ea840a
SHA51246eb62ccee28bb3c4bdf66f9482fa64eb0a72e9084bfbd51e62797e7d52d12d7b17dec00393703f90a7cf0075a0ed093b19e58c1cd2d091d4e92c971615fefd6
-
Filesize
99KB
MD56da33639f98b0e35e81331629eced2d7
SHA1e9eba944c027d6333957e5f5b6be3840301bb5e3
SHA25623abbb44f93f16db6061c63dcf2d321ab54bba6ace643ba769b5600f94b89949
SHA51208aa00d882303c463735016d097d0e4cfac0f153a61f0726a290acdefbc4a15c8fc8388a1de00fd4bd0b1da3b42e53d0750aa6dce760fe272caced41ace09b03
-
Filesize
99KB
MD56e181ef07074c02a71056a534759c23a
SHA1541b5c0b9edfdb7e5e2b9fd8ece821303891d4e2
SHA2564c072fd82b59930bc0e3161cccfa33145569e9396d92d9b88f1ac6052330313c
SHA512f8ec536be0198d15795b9e04530318d3a7175d652f5dcb9785367e46339fd7ec783bdb63367f18c8bc04b1bca4b812afe16fc6c470183b924a9757c90c5bcd53