Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 17:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://snkt.io/66d9c8262bf6e2c467c4abe1
Resource
win10v2004-20240802-en
General
-
Target
https://snkt.io/66d9c8262bf6e2c467c4abe1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133702025477718949" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2168 chrome.exe 2168 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe 2780 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2168 chrome.exe 2168 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2168 wrote to memory of 4692 2168 chrome.exe 83 PID 2168 wrote to memory of 4692 2168 chrome.exe 83 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 3016 2168 chrome.exe 84 PID 2168 wrote to memory of 1592 2168 chrome.exe 85 PID 2168 wrote to memory of 1592 2168 chrome.exe 85 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86 PID 2168 wrote to memory of 1896 2168 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://snkt.io/66d9c8262bf6e2c467c4abe11⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fffe59ccc40,0x7fffe59ccc4c,0x7fffe59ccc582⤵PID:4692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1896,i,7742012971400214788,4349044938698275476,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1892 /prefetch:22⤵PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,7742012971400214788,4349044938698275476,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2168 /prefetch:32⤵PID:1592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2184,i,7742012971400214788,4349044938698275476,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2420 /prefetch:82⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,7742012971400214788,4349044938698275476,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,7742012971400214788,4349044938698275476,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:2776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4696,i,7742012971400214788,4349044938698275476,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4684 /prefetch:82⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5060,i,7742012971400214788,4349044938698275476,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5092 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1620
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5ba53ed26b96d4bdc9842359b3f7715d2
SHA1002176743b08f0fe40651050c0682edb06a782c6
SHA256fbc5f9e64b942ca02714e3bdae81fd462010901463c421dc809e5426cd5a5787
SHA51285d4e0497048b02504f1bb2ef21116961dc34bde76495cb29ba1ebfc06a87d871bcfbd1f642dcb51ad27909f5caf96facb62d93fb89a67766547d9c93f137e7b
-
Filesize
480B
MD5d8dba7639b0ae5df1bf6e2adb1e2de52
SHA188d6563ee306e87f9067785b1e7a610c499f405f
SHA256b0cf60282448556155c3f773b0c80b21518e30ad56cddd1d35e059b58ea9d39c
SHA5123355cdbf750f897e0ce4a5204ac23e8390e0963c0d6520788fb19f7dad8c7739c45ea3506d470e93010360e9cd4086757f50b369926cfee63b7ee547df168db9
-
Filesize
1KB
MD529944803b265a80dd4d4905ffa17e96f
SHA1760dc4288bc126100b730ac32ed62ab6c448ee61
SHA256742dde7e3b693808f971518417390d625ccca3d47cf0db93d1182ab40e34d756
SHA5121ed55cf552453e68d7ff9d593d736ff07850437645646485ae6e45f1a9d4ce8223e61541aab3ec7b0e1b9a08a975571c129f10c1b9bea09688e736dcf9332aad
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
685B
MD507389666fd773a681a4d9177fab36c45
SHA1c37298ae3f12c1ac26ce52e23bf371b038642fd2
SHA25626698f3ff76c3791397a442725c451c4e1e9e92d22e51095562f1b6cbff0ba72
SHA512ebc5994f1cb7d9f96d2513c31974d525e815c01580c7155dcd4b01038e715d4124a78355e6d5235807733f2e14bc47783243ce728a8ae6dc4f2d5c68c04fbae4
-
Filesize
9KB
MD54d05a389466bccfab78cb233e6915957
SHA10e61cfb4b233f046cc14a295c304b8fe80eb5217
SHA2565deca01a90b2b7a5ecde194e5cb914be0c7065e6b6cb8136a84bc31d7c8d85b5
SHA512d030fe7bfb43dfe16b112e0a2c83e3593d9787ad594e6d0d233cb5168077daa4157a156ca955a578958a5e4b04054a33cb5bc6542ef5844f3d92c354678bb077
-
Filesize
9KB
MD5c15d2225878cb2c533be3835ea7ab452
SHA1ac3cb0fa61730512f9d4ee9dd58c1a443fff3fe9
SHA256366f95e89c684673206b373b9bcdfc7a8b484886754d7f33d683bf5aa1e08f3f
SHA5124f0e90270d3ea814c1104c122bda7747e0438cda538f343d5c1dd47e0cb165e615979a9b76708ce015a36f77535e8d7c576e4db77eea0d26b5efbe664ce4d151
-
Filesize
9KB
MD502023fa91638e7495bef5a5ba7b98407
SHA13ef648478540388be9f04b2e6105c1abca87a508
SHA256ef65dc0c48ed8d600a0b59ca018aa4b1c53f4ba4c2767928bcda0c94cd3da33e
SHA512e566fc4f5e6dc88777ca0eb0b1d3c8495349df4d7bba65a4ace89d816921b85d54c0e58edeae5d5229f834527fccb2c0f8ecdcdcb2e8e4a225c8ea5bbf190ffa
-
Filesize
9KB
MD5c4bd938dc94b3a7cb5bd1dad90bc5998
SHA125101c384153825f41cb5bd9ec3494e33f3552a2
SHA2568ddab7d1ec536d55f20ea4385fb5e9e72b96b7ed97a2d66dcb5e70520e754bd6
SHA512c7b321f32c5d3e0a03f44b3e9fab80a893689149df21d351235dc00c0a53a7431e5f717b8fc1d72801d83745ec4e957ee3ff4a9d2de62303f2fd0dddbac9ef7b
-
Filesize
9KB
MD5e8fe0f64257643df46f9de968d67985a
SHA1ee154920fadd0ad98fec9d28c1f4f7d92f245c15
SHA256a68a735e70c4a1cc67396acaba0adb1165f7b54dd926f724261b571071691798
SHA5125d2621161af3fe9b6d4729e02800c310092a5686d8657171cdb44016be294a40a9a7cbbe7df1c5c310de8f442b4fdf4de0e81adc90ad908c7e9078561a250af9
-
Filesize
9KB
MD517b95cb6c68ed177099a4ea806c08cf3
SHA14a36da85a328c8f369201e8d3d603c0a1b9c2256
SHA2569fc59e497f57da79e158ac013c7d53649894e5b20769edf2c4d9b0f790dfbb84
SHA5129ae2a728dc6082a6ee7135b7474ac93396ef94b220c1fa4d27a63fab66d4b8d6f5f127914bbf49efea012f25c5dbfd48db5e2d745d33f2e2569ac25fe2fcbb4a
-
Filesize
99KB
MD521e4e31cff03cc40a1d922ecde5d8501
SHA1486762d6db71368e39fcb543e2a9ee19ad2f6812
SHA25613abad43e15046cd10a486e77dac087979976a933ba11b437d3f9426ad50ccd4
SHA512432eca3e7495775a199f8fcd2a74e47fc36619355214bd5943938898ef7d10e668d7bade7c763d335154781ae7162cdb2cd9fda0d48559c8076edde7cfc7bd5a
-
Filesize
99KB
MD508e4e3b050dd132838b1bf610f8c242e
SHA1f7f47668ef6e2b692eae5d2fd5c5adc8105b3393
SHA256b14b28aaaff5bdafdcdf21b1eeb91518f46890775ce02e07a599a3c0edbc121b
SHA5120935f0dc66aed7d53e704f3e87120ac2251c62497736f760ad1b1294a1f9986a240020c32f9967d54d8ecb8bf4ebcb7f16b98a9926a7c02ba897988aa532ef15