Analysis
-
max time kernel
19s -
max time network
15s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-es -
resource tags
arch:x64arch:x86image:win10v2004-20240802-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
03/09/2024, 19:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://upnewhomes.com?u=bqkpd0x&o=xtc0tv6&m=1&t=119
Resource
win10v2004-20240802-es
General
-
Target
https://upnewhomes.com?u=bqkpd0x&o=xtc0tv6&m=1&t=119
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133698660431945433" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3068 chrome.exe 3068 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3068 wrote to memory of 604 3068 chrome.exe 83 PID 3068 wrote to memory of 604 3068 chrome.exe 83 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 4292 3068 chrome.exe 84 PID 3068 wrote to memory of 3616 3068 chrome.exe 85 PID 3068 wrote to memory of 3616 3068 chrome.exe 85 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86 PID 3068 wrote to memory of 2568 3068 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://upnewhomes.com?u=bqkpd0x&o=xtc0tv6&m=1&t=1191⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa0e56cc40,0x7ffa0e56cc4c,0x7ffa0e56cc582⤵PID:604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1704,i,2667131992272906088,6223722000069277580,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1712 /prefetch:22⤵PID:4292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1952,i,2667131992272906088,6223722000069277580,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2180 /prefetch:32⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,2667131992272906088,6223722000069277580,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2452 /prefetch:82⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3128,i,2667131992272906088,6223722000069277580,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:3976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,2667131992272906088,6223722000069277580,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4492,i,2667131992272906088,6223722000069277580,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4504 /prefetch:12⤵PID:1956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3160,i,2667131992272906088,6223722000069277580,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4748,i,2667131992272906088,6223722000069277580,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4540 /prefetch:82⤵PID:3684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4584,i,2667131992272906088,6223722000069277580,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1548
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD506d6b435d4b4c9e359ce156369794c84
SHA1439a6f1518232776fd33f4ad01c0806c1820349c
SHA256678399424fbceec396704e885b3460a457ddfd0379863ff6c066a0c88ed68c82
SHA5124b8bfb71c5b68795d026147d28f5c79852a5cedd035ff4fd5b64707b51053708d72afd89d7ca63005be60ba885e5e20aabbe38e3b56c3a948c6c5fe2a9d91c8f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5f47ba78956b7d8333178046d6ffd109e
SHA18da4565bd898237e037f95fc8b47651c26930dc4
SHA25604e403506aecbc5b30b09970e3622893ca9429f0ec45413b24ed46d521003151
SHA51252524b7a3c4f45b824050c0db6452629155b67f4159e5015169c817db9477850f569a207c809db805abaa68ee1af24a3cb73bd3f345d99d562eb06939eeefd3a
-
Filesize
99KB
MD56cbe1c6d3457219723263d481d5fa8bc
SHA1e09f07657fad19b2c8e1a04e432acd5fc39dab9f
SHA256ae8304f93dae0f6268ba59e3ca91d5269ba1c51aa577f64a1dbe4694dac36a98
SHA51230f460b5769d02a03b364830723c97d49b319f98361d88fd25dfd29c498631c918b68304ed8b00fb90d0acb5a4477354fb3d790c1d0293976e5fee51696e16cf