Analysis
-
max time kernel
11s -
max time network
12s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-09-2024 13:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://lawsofpositivelifestyle.com
Resource
win10v2004-20240802-en
General
-
Target
http://lawsofpositivelifestyle.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133699303932792506" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2012 chrome.exe 2012 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2268 2012 chrome.exe 83 PID 2012 wrote to memory of 2268 2012 chrome.exe 83 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 5088 2012 chrome.exe 84 PID 2012 wrote to memory of 2140 2012 chrome.exe 85 PID 2012 wrote to memory of 2140 2012 chrome.exe 85 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86 PID 2012 wrote to memory of 3476 2012 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://lawsofpositivelifestyle.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff91f36cc40,0x7ff91f36cc4c,0x7ff91f36cc582⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,11443932080155685293,2387815703967685698,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1888 /prefetch:22⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2160,i,11443932080155685293,2387815703967685698,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2172 /prefetch:32⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,11443932080155685293,2387815703967685698,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2428 /prefetch:82⤵PID:3476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3048,i,11443932080155685293,2387815703967685698,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3064 /prefetch:12⤵PID:2344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3052,i,11443932080155685293,2387815703967685698,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3096 /prefetch:12⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4420,i,11443932080155685293,2387815703967685698,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4336 /prefetch:12⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3356,i,11443932080155685293,2387815703967685698,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4516 /prefetch:12⤵PID:2952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4852,i,11443932080155685293,2387815703967685698,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4864 /prefetch:82⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1880
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5abc02230591a3520a3473faa24782c01
SHA1995b6d1e5a842ec8181594254bf8b2c726f3b56a
SHA256e670278df5ecd8c978919c53ecac0b8997af170dcf6852e3182ef678051b6626
SHA5125170f2ee153dd44f6df6348ed91c750a3993f5d6e6f50b68fa83922b04f7a0372c0b21ecfb4f067d71908f789b750496bbc302fd534f8a31ac1153ae737e5d87
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD521acc37452dc902e157d6aaaf7a77769
SHA1e54252e3c502355a54bb89b4fb01584e1508b93b
SHA256dd7a0bb41f6b0eec2510485a2b3435eda6ab137f18c5e2167b493e4d29a4012b
SHA5120584a9c25def752dbed04f78414c9a5ca430848c5deb1155180862391940cdb871ee2f0ddb28ddb2b141e668c2f335d033d5f9ede276288a8ad0eee40d216f16
-
Filesize
99KB
MD5e5edbc3cff7548ec23fba0cef6e60739
SHA1803765024a46ff2f9e831d1b8a6b20938ca6e5b9
SHA256e67f7c04d340425ef4471d8bded86c43992b8e523ae58a3a74a76194eaac8443
SHA5125c09a7bc8f16d819c4d4fbeaf09b30d90406f4136abfa975683a5d8be4aad3378c3ff05cf63ecca8c99b17690be47150d0c6362e680b14362e90023e4de77392