Analysis
-
max time kernel
35s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 15:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://youareanidiot.cc
Resource
win10v2004-20240802-en
General
-
Target
http://youareanidiot.cc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133705409382182745" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4608 chrome.exe 4608 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: 33 4484 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4484 AUDIODG.EXE Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: 33 740 chrome.exe Token: SeIncBasePriorityPrivilege 740 chrome.exe Token: 33 740 chrome.exe Token: SeIncBasePriorityPrivilege 740 chrome.exe Token: 33 740 chrome.exe Token: SeIncBasePriorityPrivilege 740 chrome.exe Token: 33 740 chrome.exe Token: SeIncBasePriorityPrivilege 740 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe -
Suspicious use of FindShellTrayWindow 62 IoCs
pid Process 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4608 wrote to memory of 1956 4608 chrome.exe 83 PID 4608 wrote to memory of 1956 4608 chrome.exe 83 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4480 4608 chrome.exe 84 PID 4608 wrote to memory of 4852 4608 chrome.exe 85 PID 4608 wrote to memory of 4852 4608 chrome.exe 85 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86 PID 4608 wrote to memory of 1180 4608 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://youareanidiot.cc1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff82e99cc40,0x7ff82e99cc4c,0x7ff82e99cc582⤵PID:1956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1928,i,7245923405899163280,5548392489133110390,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1916 /prefetch:22⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2072,i,7245923405899163280,5548392489133110390,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2088 /prefetch:32⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2280,i,7245923405899163280,5548392489133110390,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2464 /prefetch:82⤵PID:1180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3060,i,7245923405899163280,5548392489133110390,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3096 /prefetch:12⤵PID:372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3076,i,7245923405899163280,5548392489133110390,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3884,i,7245923405899163280,5548392489133110390,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4480 /prefetch:12⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4020,i,7245923405899163280,5548392489133110390,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4152 /prefetch:82⤵PID:3728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=3512,i,7245923405899163280,5548392489133110390,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3876 /prefetch:82⤵
- Suspicious use of AdjustPrivilegeToken
PID:740
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:740
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:780
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x468 0x4f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:4484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD534d5f753bb13744c8dbc6fef1a6518f9
SHA1c7c5d802e1ba258d9dbff7d1c526fbb4de903fcc
SHA2568932393213556e7c6a68060d76c2b9ceb0cd10dd8b1c5846f15e0d5ccaeca10f
SHA512ffdec2ef3bc47ad5c889af3d178e8478aafb7a08746e5bc3925ee1553535afe49f2ccc074b5724449f9cae71c5e86fe4dc2310602e20c486dc90fff038cc6e7b
-
Filesize
649B
MD56bd0dfecdd61db1c3b0838ca922756b8
SHA13493802b83368d5bba8ea9d16f665158eed37bb4
SHA25672981afd7ba47b07f266cc673b268abd547ebd5c2cccdc3406a297b3ff168baf
SHA512f22c806347819ea1a93e8443967ea7511f0e08555252743d78481867bbc19e59a5a851e73f69f5c7c7d2fe86cd53ff82b2418fb241797413df01ea4c6b56efba
-
Filesize
202KB
MD59901c48297a339c554e405b4fefe7407
SHA15182e80bd6d4bb6bb1b7f0752849fe09e4aa330e
SHA2569a5974509d9692162d491cf45136f072c54ddc650b201336818c76a9f257d4d2
SHA512b68ef68c4dcc31716ce25d486617f6ef929ddbb8f7030dd4838320e2803dd6dd1c83966b3484d2986b19f3bd866484c5a432f4f6533bb3e72f5c7457a9bb9742
-
Filesize
168B
MD5f3ca39307445e64a29ee16c7e953fad7
SHA1128e899348e9ea0e890eb3253fe480920b05c2b9
SHA2561e2e688f4f5e785024d372afdfaf2f9211707e80123c69557197339701cfac1b
SHA512c398ec2d35609ac361a1e6568fa961cd0b4e79294238170efb8baf344cc99cb8ee824db8c90293f9728370a5b5679867d51b2b20dd839797044e2718dd8fc468
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD56966759b3700c04a48f4d25439c7b87d
SHA12bb4e84eb79476e9964a0cf0792935b151079b29
SHA256e10e40a689901631a1f7fe5fa84ed7b6f7accfe946597c1fedac5e250f34c859
SHA5126b92a7d1d7ff541073fc5375bba6b9577d222c1f91ab1e23fec552e81bdd21efb4a868ddb2d73d84462fa97e91e6487c4837e39ec6326d75f51ec0e7b2d0efe2
-
Filesize
10KB
MD58276568acf725ef53ebf9c3516439cf0
SHA1ef55a3084faa685f88ac2224dc20b2949e7e166a
SHA256cd517b7379d7acc0f460d384d785a9cd5688e9ddb2af8e16fae6bec233a58bf2
SHA51288fec3bc75bfc5d6d4de57d99a2a9c5417364dc814a8b59fec42c410efcbe1ddcd6999b90f2cb0565417246ac66143da4ecf0f52a2c78519fc2c30762a04fc79
-
Filesize
99KB
MD5b82a237ba826adf208bb62b8b4ac48a1
SHA12510be9be3bab7e9a57f8b5c993a35326fe04242
SHA256c269142896d6572de86fc2afb162876979bad9c9cbe0ff1094480f6a1c3db522
SHA5129c20caae7ba58f6e81d6c28a1df0d83e8af0f1a09632c874cd5e1c6995deb0fc50b5bd935021b1a069642cdece257ad4fca3aa47c0860e5f566571b9b8f834ff
-
Filesize
99KB
MD53d643496ee3abeb0a532f0ad02797cec
SHA19f269bcd59e09cd2f92fe08f54e4ca538f2ab5c7
SHA2564a27876b0020fad7ad5503174887bd3c31a2b6e1e1e1a3c9391100fa03edc3e2
SHA5125cf6664e63ece435270b329d1edd997bbec3a9d54d582188b04bf22a11632269cdc569a5ed5d5712e0a412b490c3dd6ab4ebc3c6bafec0a71a1203a11817312d