Analysis
-
max time kernel
21s -
max time network
13s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-09-2024 12:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://andrasko.sk
Resource
win11-20240802-en
General
-
Target
http://andrasko.sk
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133700136572439251" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2864 chrome.exe 2864 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe Token: SeShutdownPrivilege 2864 chrome.exe Token: SeCreatePagefilePrivilege 2864 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe 2864 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2864 wrote to memory of 4856 2864 chrome.exe 79 PID 2864 wrote to memory of 4856 2864 chrome.exe 79 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 1000 2864 chrome.exe 80 PID 2864 wrote to memory of 2420 2864 chrome.exe 81 PID 2864 wrote to memory of 2420 2864 chrome.exe 81 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82 PID 2864 wrote to memory of 580 2864 chrome.exe 82
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://andrasko.sk1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xac,0x108,0x7ff8f356cc40,0x7ff8f356cc4c,0x7ff8f356cc582⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1828,i,500680275100743197,12018236214181983343,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1824 /prefetch:22⤵PID:1000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2096,i,500680275100743197,12018236214181983343,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2108 /prefetch:32⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2172,i,500680275100743197,12018236214181983343,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2392 /prefetch:82⤵PID:580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3052,i,500680275100743197,12018236214181983343,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3060 /prefetch:12⤵PID:1304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3076,i,500680275100743197,12018236214181983343,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3096 /prefetch:12⤵PID:3672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4392,i,500680275100743197,12018236214181983343,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4072 /prefetch:12⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3312,i,500680275100743197,12018236214181983343,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3080 /prefetch:82⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4728,i,500680275100743197,12018236214181983343,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4328 /prefetch:12⤵PID:3096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4880,i,500680275100743197,12018236214181983343,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:3100
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:496
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5fed294c3416808a64305b0a086fe56c4
SHA19ebd71a482a011a375bc83fd2ed91e8d751f464f
SHA256980fbe099e0185a8b499a874469fa3c849b8d39e14d6fb40a8fabe56b0529b8e
SHA512f05f773c677350ccbdc8c9acd8b2aa79e4560f1c73df7e3283ef60a9f01ecb754c9cdbfab5744e10beffe65d24f5eda9ba2ae0ec66e1edd075a9db7f61937688
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5dd938fe52f74cb08b83162d389125dcf
SHA14cfa2ff8c526eb127a07b01ce0965e6155e9ddde
SHA25633c4a944cc9c9686406ef742407336077636ef82a636f0c3bf1fbd60b3972005
SHA5121f68018e326d2c4127332fc1b841d40c328148a2f564002e3c9735761a3c33d62185d4cd1a7d424b36f142db525563d601f4fbff6d14f4f509fbe452e6de9d83
-
Filesize
9KB
MD5e04874ba0cfe53379d7344ecc51fdab6
SHA1047041d0616aed0b63921c615a505804ad54c959
SHA256afdef6f096a0f944499700ac67f3488de09944fd4ac9326a9f2d0ca556708d8e
SHA512fabc4283f2dc08238644912eeb5da16aa1dff2604da658eef449d27a491227a6b6c3a1ca959728771d450f212ff5840999624706ac020086bce9c5efbc8296ac
-
Filesize
195KB
MD5451b5dbe12e21c49c6bee5660a5efecf
SHA1f6620b88ef380ffb766456d1a88cdbaafb75aa18
SHA2565e331a6701f1134cb447a9cc2a9ebf6e8a3f4913fcbe4b2721e377cd8be76b5f
SHA512b6d3c3b6afe1ddfb72dc9ba95888f9914f186f55fb98f33a4d1de6b72ba22ebab421f2318d0004314361fc85779808d45f7b5abcb72dafeee4f63720dc911435