Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2024, 21:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://unmemorable-sieve-4ae3c4b85d95.herokuapp.com/+?y=49ii4eh26or68cb56pj36c1l6ko64d1g60o32chlclj30p12
Resource
win10v2004-20240802-en
General
-
Target
https://unmemorable-sieve-4ae3c4b85d95.herokuapp.com/+?y=49ii4eh26or68cb56pj36c1l6ko64d1g60o32chlclj30p12
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133699578976844871" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4608 chrome.exe 4608 chrome.exe 3140 chrome.exe 3140 chrome.exe 3140 chrome.exe 3140 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4608 wrote to memory of 3476 4608 chrome.exe 83 PID 4608 wrote to memory of 3476 4608 chrome.exe 83 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 2640 4608 chrome.exe 84 PID 4608 wrote to memory of 1984 4608 chrome.exe 85 PID 4608 wrote to memory of 1984 4608 chrome.exe 85 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86 PID 4608 wrote to memory of 2936 4608 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://unmemorable-sieve-4ae3c4b85d95.herokuapp.com/+?y=49ii4eh26or68cb56pj36c1l6ko64d1g60o32chlclj30p121⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe6614cc40,0x7ffe6614cc4c,0x7ffe6614cc582⤵PID:3476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,8969082773403039717,14396064518277798479,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1904 /prefetch:22⤵PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2136,i,8969082773403039717,14396064518277798479,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2188 /prefetch:32⤵PID:1984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2256,i,8969082773403039717,14396064518277798479,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2244 /prefetch:82⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,8969082773403039717,14396064518277798479,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:3080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,8969082773403039717,14396064518277798479,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:4064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4084,i,8969082773403039717,14396064518277798479,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3636 /prefetch:12⤵PID:3228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4780,i,8969082773403039717,14396064518277798479,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4812 /prefetch:82⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4996,i,8969082773403039717,14396064518277798479,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4924 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3140
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4552
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5f4c150c3681e061ca54005bc4dd229fc
SHA14a808ffb5edac32baf8399a16aa28a77dfb2ab2d
SHA256ebd0ec320c03fc48e82de69b8de67647d48a4898935881985955f914236a834d
SHA51232aa4423ec790e8c20276ab0745d2a09e95bbbe668a7541479991e271ced11831b9ade519690b23b87f57580d3a52a700671bd4aae8ce48d170ca9e861605e99
-
Filesize
1KB
MD598d61d1f2ff6c58bf2810430568d2274
SHA1b4363040e3cb39acfb68d7a3df2edbbea60bb602
SHA256d515fecc7daefe5380892479b357d6aae9c4ec770381b501c605c00b06553aa6
SHA5120447d06a5cb2a3455a7dcda2f0bbc088bb99b5604fcd746136e78aedf61f55be1a3eb329cfbcb59d87b6feed25f3198836775f65ae7ff4ae0f4165f443dba6b5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5b0f5232ac14325b369583cf0a120ce6d
SHA163b237329645aa291616f6a12c40806be847846e
SHA256e445812bddd1045cc640d068117d1fdd759ad2c44f2e78c068d5fa76e5a1d0f2
SHA512777600ac09f42f4c8ad8bc2479a9827920976c41a18cefa5448705beca072367c027e1278e75ba2fec5d19a655077143c20975e981da9bbd7ae59f903b89558f
-
Filesize
9KB
MD595a43f3f7a1c7205de260f45ce2c12b5
SHA1d783fc486d5e161308c84c7e2b5ba023cabd67b4
SHA256241faca367c74c1408f693726538e9f35c7dcba17851c55e6a257503bc932238
SHA51254b91f304366c53a8513724d67df0549edef09f9ef48e0e006098b6b4e552b169392748fe2e2f1a9fca163bb423bd220fa80be439c6dae803b2fd1638bec3310
-
Filesize
9KB
MD5db7a8944d086e2030d54837f1d8afd69
SHA1bf91eedd336e78f4d2bd1b84c42f4a46e9eba39d
SHA25655e7973773da985e3768f4528149f0ee899d8801e73c80ab89b63d9dbe93c89c
SHA512537b55a18cd127c3b7691db77e76c36f48ad2188dacbee07a30664492c22d45ef4875f5bb1c835885ec80f36ee9f0741c56994c231a3cae0469e8441b7d6088b
-
Filesize
9KB
MD58a6319a34ce176a5780c5cbd990ffc04
SHA15693c896a6336499ed1fbd8530f75f97724142d7
SHA256e8db28c9d674b26330d6f6dcdd2a8df568f917ff1dc1cf994c2097c47464be58
SHA512364c152790a41770ebc94939407031f673ca5d9eddd5599d25429e164e0c2d9d8d92f8cf18973561821f03c77bc932d2b9186d5afc30804220ad16faf503e2b1
-
Filesize
9KB
MD5f5d6ef16b9c1b7745fd27898e4d2a695
SHA1720c6d7f9e5cd8a83544f145622c37b94f69b629
SHA2568f1a3dba0d57289364c2cdb690c9bd4264996aa4b672f76bc1b9dee894360f2c
SHA51250b371b6e3c2f2b27614123e4c188761a8387b5f221e8ade5d61ddd88d9bd202ab0c6314b03776632716447cade53b3a98c492d4ac62d8085f0d7278e91a49cb
-
Filesize
9KB
MD57289a3536b33c400d0e7b9e4947ab237
SHA1e58464676f78dd2e958c3254d151e81edae8268f
SHA256fca88949b7aa8766633233317758e1e3d3572f635b971ab3e0797d9b5803ca21
SHA512c8c4a1b829dc9b4fa8c21494cbdb0f5678e2323edaebac590749332c851d4576c7e72f33269a42b09eac63e1f12586dd166f396d66ff3478f953d36fc6f1909a
-
Filesize
99KB
MD5e186b195eaaed6a2290c2e1d9659de3a
SHA1c55838def3cf3959dbf1b21a45c74688e1df0823
SHA2564629d8448d4e48f1afb4d492b6d02a7cea36d072bc3c75d8918d81c4fffb8302
SHA5120b2777b19356446b23b78d5ea8f0a0dd8f4ac7b3c196086c726063fe1320bfabfe54307b59fad915f8e2396a03bfd6995da32ae59e6537dc0e8aa378664370a7
-
Filesize
99KB
MD5161e74211024a9e5a516012d5a5437b3
SHA1f816af80ce563286f89bebbbd982c24fca309bab
SHA256a402e2df9a2f4521d6c5668929deaf16598d1124d96992a1b697969460190d2b
SHA5127ddef692647523d4e08dfcaaa81d1ae75e1f40852287703c196d4a920b578fbee3ae092c3765f29deebafa6c1e4b05bd9e3d68ecd934c01a606edcbe2b1a7914