Analysis
-
max time kernel
44s -
max time network
42s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
11/09/2024, 20:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://188.93.95.16
Resource
win10-20240404-en
General
-
Target
http://188.93.95.16
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133705615729506186" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1992 chrome.exe 1992 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe Token: SeShutdownPrivilege 1992 chrome.exe Token: SeCreatePagefilePrivilege 1992 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe 1992 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2384 1992 chrome.exe 72 PID 1992 wrote to memory of 2384 1992 chrome.exe 72 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 3168 1992 chrome.exe 74 PID 1992 wrote to memory of 1016 1992 chrome.exe 75 PID 1992 wrote to memory of 1016 1992 chrome.exe 75 PID 1992 wrote to memory of 1344 1992 chrome.exe 76 PID 1992 wrote to memory of 1344 1992 chrome.exe 76 PID 1992 wrote to memory of 1344 1992 chrome.exe 76 PID 1992 wrote to memory of 1344 1992 chrome.exe 76 PID 1992 wrote to memory of 1344 1992 chrome.exe 76 PID 1992 wrote to memory of 1344 1992 chrome.exe 76 PID 1992 wrote to memory of 1344 1992 chrome.exe 76 PID 1992 wrote to memory of 1344 1992 chrome.exe 76 PID 1992 wrote to memory of 1344 1992 chrome.exe 76 PID 1992 wrote to memory of 1344 1992 chrome.exe 76 PID 1992 wrote to memory of 1344 1992 chrome.exe 76 PID 1992 wrote to memory of 1344 1992 chrome.exe 76 PID 1992 wrote to memory of 1344 1992 chrome.exe 76 PID 1992 wrote to memory of 1344 1992 chrome.exe 76 PID 1992 wrote to memory of 1344 1992 chrome.exe 76 PID 1992 wrote to memory of 1344 1992 chrome.exe 76 PID 1992 wrote to memory of 1344 1992 chrome.exe 76 PID 1992 wrote to memory of 1344 1992 chrome.exe 76 PID 1992 wrote to memory of 1344 1992 chrome.exe 76 PID 1992 wrote to memory of 1344 1992 chrome.exe 76 PID 1992 wrote to memory of 1344 1992 chrome.exe 76 PID 1992 wrote to memory of 1344 1992 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://188.93.95.161⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffbe2c19758,0x7ffbe2c19768,0x7ffbe2c197782⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1524 --field-trial-handle=1832,i,6592660063086131161,10690588912115476681,131072 /prefetch:22⤵PID:3168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1772 --field-trial-handle=1832,i,6592660063086131161,10690588912115476681,131072 /prefetch:82⤵PID:1016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2064 --field-trial-handle=1832,i,6592660063086131161,10690588912115476681,131072 /prefetch:82⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2688 --field-trial-handle=1832,i,6592660063086131161,10690588912115476681,131072 /prefetch:12⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2696 --field-trial-handle=1832,i,6592660063086131161,10690588912115476681,131072 /prefetch:12⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4492 --field-trial-handle=1832,i,6592660063086131161,10690588912115476681,131072 /prefetch:12⤵PID:828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4952 --field-trial-handle=1832,i,6592660063086131161,10690588912115476681,131072 /prefetch:12⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 --field-trial-handle=1832,i,6592660063086131161,10690588912115476681,131072 /prefetch:82⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4356 --field-trial-handle=1832,i,6592660063086131161,10690588912115476681,131072 /prefetch:82⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
504B
MD5ba90e84ef1793baaa8af1e30b7642769
SHA149729c22d4b67b5847402281b4ccf6716bb83f5e
SHA256b885ab2a09b9dec35146b3599e5e6ce4cd20e7895546b53a3f529c4e71fd8841
SHA5122a6254509da4547cfa7a646783ffe6001200b3b975787c232826630f5b0a6547596bc965115c856b5cc854fce30dc00786f021be001ba5f7ed6a2afa8ad9dc47
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\faa8a87f-327f-419d-ae55-04f9bff42373.tmp
Filesize705B
MD5bd1ebd58a6d2e1d9ea62b6e5038ade8a
SHA113d2572d7e8f714a8a2ff8485515eb12200c369d
SHA256e312e6623a97597dcfc51e79c8e31c1fd44fc6a5fdd6ad6c01abcc3636c9703e
SHA5126b92b6f038ac508d8aa2ae433cf1c0343e2af6504fa1ddcaadf785969e3d7be4c4405ad8c642d1656abc88e8d6a295c89e27afbbbe47c1ca8e95a271556a9b88
-
Filesize
5KB
MD5b7dd752760f12c686e327a30eca7c05e
SHA1762012d235aa9cf3a5e1632253f9991c13c00926
SHA2564f0ccd81901144c6ec2e2c98c81f2568e149619a14cde0eb9ae2d513a286a380
SHA5129886deabf0c686b7eec5d3b307b3a23c4c78c12650cba28d2b258e6cb2ff9a3ed7bb382ffd00aacf8def460b5ced842c19e0d0db60d17bf3e61b4c484b4f25e6
-
Filesize
6KB
MD5985f663b17e045696580822d3a6b5df4
SHA1241428b1bc67988095512b226f73dfcff2bdb415
SHA256dc0d3d5551b4422d0b440ca03f594b79a475034bc29e1eedb15c3185d5c00c80
SHA512067c5e1804cde38cbbe9d48c4c8a87a995ff8dfd378d54c7f1bedf54e46acd2f288508b5b282e2e3616792d7cba58d15d242c22a1b933a5c7133c830cdffdffb
-
Filesize
5KB
MD537dd833c724342babe9377f1db39886d
SHA11d50720ff258ecd1dca3ac7d04161c813c57c4a2
SHA25663ef88c9cda4f5b4fedf0fa6df7f22a2051a5f3cd6b4b42e65a7a1ad1a0be3cb
SHA5129cc606660315ba135ea934b30b8da89d2cfeb6cd0960293e03aefcab690bdd7e13dff597e80fb7f27d5680d57b08dc000a9a24f7ec50b80708063ef17df5d31b
-
Filesize
136KB
MD504f4662ca29f20601f19935dde52db9e
SHA18c416f6e791bf0ec738615b98a12e357400fb58f
SHA25646c636c5a7b9f206f2251c45660f8c60b03b05117532d7c70b321c8a0ab7312a
SHA512e67a367edb17c5adf479f6c530a11f171dc8b89fe633e9331c54f4a663a4e5e3ce4850fdbfe8d640c8402426088d79da594777e7cab24acf7484b0b504a07cf3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd