Analysis
-
max time kernel
47s -
max time network
50s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
11/09/2024, 16:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://analytics.joinr2d2.com/ext/media/pixie/81fa689a-7701-4a75-b173-f52bebb67fc4/users/
Resource
win11-20240802-en
General
-
Target
https://analytics.joinr2d2.com/ext/media/pixie/81fa689a-7701-4a75-b173-f52bebb67fc4/users/
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133705451259830491" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4988 chrome.exe 4988 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4988 wrote to memory of 804 4988 chrome.exe 78 PID 4988 wrote to memory of 804 4988 chrome.exe 78 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 2056 4988 chrome.exe 79 PID 4988 wrote to memory of 1004 4988 chrome.exe 80 PID 4988 wrote to memory of 1004 4988 chrome.exe 80 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81 PID 4988 wrote to memory of 5036 4988 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://analytics.joinr2d2.com/ext/media/pixie/81fa689a-7701-4a75-b173-f52bebb67fc4/users/1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8e8a4cc40,0x7ff8e8a4cc4c,0x7ff8e8a4cc582⤵PID:804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1816,i,18039164942711581539,6073233087552960426,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1764 /prefetch:22⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1384,i,18039164942711581539,6073233087552960426,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2100 /prefetch:32⤵PID:1004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2164,i,18039164942711581539,6073233087552960426,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2144 /prefetch:82⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,18039164942711581539,6073233087552960426,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:1960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3148,i,18039164942711581539,6073233087552960426,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4496,i,18039164942711581539,6073233087552960426,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4508 /prefetch:82⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3660,i,18039164942711581539,6073233087552960426,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4244 /prefetch:82⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4524,i,18039164942711581539,6073233087552960426,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4532 /prefetch:82⤵PID:920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4816,i,18039164942711581539,6073233087552960426,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:3960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4972,i,18039164942711581539,6073233087552960426,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:3452
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3492
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5a2952de76c882c387830b30f17337c55
SHA1b25cc73d512900987d1f41524b3a02330a1ab83a
SHA256eff9d4471cb026ee6b521beaa8b0c31f748fb202145f0ee2dd643001c1fed4af
SHA512283588a35be5dc0eea10e66fd2a66237dc34c6088e5895b3aca1aec5e2ea924391e242bcc279e8f8c596ed121742b7a012f4e475b355ed505b949e1cac9b8e41
-
Filesize
1KB
MD5841f7ff61818ffd914d9724ae97c6db6
SHA197b48683d4750bbd439d92db537eae2904dee1c3
SHA2568826105c318cd0b2cc123020e89eff36ba17bd3ec1e07a69aa3191bfb4cc2536
SHA512a82166ce2c5b7b4860c17fe16b6335a77934bb739ee96cb7a3a609df17db8f3c85d17b4c84626bf67566dd3efdb0bb2b7d2fbc0cb1eac468ed8154588d2fcdd4
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
10KB
MD51d123f45de1ebc0a03a7d83926c944c6
SHA17e6e087bdbd056fdeb2972e1ea17ce85569c5104
SHA25610539b360146f49520ed541c0dda37a6b46520e340ce0d82c8376470ad16f794
SHA51208fe3cbaccddb575626d91be8e4b3a380ab93c8480d726fb5fa41b2ca462be125dc0ce5d4802f9173c04e3be38e2b8f65438fbe858dc3c86dc2d240aa673807a
-
Filesize
9KB
MD5b6f7aa90c89b48a97a738945fcb0ba73
SHA18cd5d3418111becce56ec3af623fdb2c88b5e3d7
SHA25693add867e7d94eb0896a3479531c930b17778224cbcfdaa6eb5d32889ee9ade1
SHA512bbd15feb577f40114f8c0a1f188ffaeaa7e3d3e1c157045a54d2033c55f5ad3e064d5db078e03f5a57d21208dc27cc5949073c32fb126404ce4033159d59cc40
-
Filesize
9KB
MD5c08aa394fa0630c1fa9502fc52befe03
SHA1901a5d582a040ef7e3af046972cb120178344b15
SHA2563c3f69db943859322d0b17245ea0f972c6d13edd62af0b75490124409ef8d738
SHA512a4675ada6cd41b6d45c5f30653c18c7b270b789661135f64fad0ed3cf2ec8436390fe9f1e514c889dbd8b47c058603bf791f7e24952c14379ead3b85f7af4125
-
Filesize
9KB
MD53c19406a0108340b868bb27a91b943a7
SHA17ed6d5bb8503868b5e8cca27f31ea154db8d2807
SHA25605c990a5e3af1b902b7b475802f1712fe45f98f3785a2c35bc0a4fe093354a51
SHA51209431a06c4e5a387a688e31dfb807362aaf53954581a0d7402952795be8500601b39f8bacac0a02f5eb2fb8a72b4bc02f67927b6f31ec49713312270a06127bd
-
Filesize
197KB
MD510cf91a43e12f9ae1446a30f71f86d9f
SHA1480301aa431ae90f267f5aedd4d5a815d4016504
SHA2567a62fe204e15c13e4e40880b0d2dbb8e3e887ca9c46874ca6479caf74a05dc3f
SHA51217d686c18ccc64489bf9ba2e37f0ce55f6f643f4d621f9c71b34267e6ef82831126c4e0f6b20999759b0f7b39ce491d9ee95c780eea52b3da99a62b4d108b694
-
Filesize
196KB
MD54649a6da8ce84e48c2c6edac3993bd0d
SHA1ed189297590731134da8bf41db81206622066ead
SHA25615fcd71922700ec49a62c40446523b93712e70a6c4a05cedbe28fb9799153253
SHA5122b491a76b436714755c6d21e0edfba9374e316e2fea3fa050c4a9f16f136d754c4aef5e700b0ce3ee13ad23320e18d951124f6d652cc3249e0257a002651108b
-
Filesize
197KB
MD556db8ba3e5a9345fa8acfebc4221a686
SHA15116859a2e7f39b87ede3c7721d328512dc44aa3
SHA256bc5ef2ca8337862467bf399755a0bdd5066d3ae4b97f59b50a8252a4ceeb1da8
SHA512e94ee575bfe9a9f31a97e0ad1c72df9f12cb6bd821b0796c2130e14f2275c97027f3a2151db10ed187cbb961abb1846d10f3a4a07c9f153f75c2cd486c293857