Analysis
-
max time kernel
17s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 14:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.soap2dayofficial.club/tgsfe
Resource
win10v2004-20240802-en
General
-
Target
https://www.soap2dayofficial.club/tgsfe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133706236983139941" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1260 chrome.exe 1260 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2036 1260 chrome.exe 85 PID 1260 wrote to memory of 2036 1260 chrome.exe 85 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 2952 1260 chrome.exe 86 PID 1260 wrote to memory of 452 1260 chrome.exe 87 PID 1260 wrote to memory of 452 1260 chrome.exe 87 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88 PID 1260 wrote to memory of 1384 1260 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.soap2dayofficial.club/tgsfe1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbb95ecc40,0x7ffbb95ecc4c,0x7ffbb95ecc582⤵PID:2036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1916,i,5236660719778160107,7974637243491710566,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1832 /prefetch:22⤵PID:2952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2128,i,5236660719778160107,7974637243491710566,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2160 /prefetch:32⤵PID:452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,5236660719778160107,7974637243491710566,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2400 /prefetch:82⤵PID:1384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,5236660719778160107,7974637243491710566,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:2692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,5236660719778160107,7974637243491710566,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4400,i,5236660719778160107,7974637243491710566,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3696 /prefetch:12⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4600,i,5236660719778160107,7974637243491710566,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4596,i,5236660719778160107,7974637243491710566,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3296,i,5236660719778160107,7974637243491710566,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4976 /prefetch:82⤵PID:3756
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2284
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\44413236-1af2-45ef-9be5-15f82e608e86.tmp
Filesize9KB
MD5169148a569cc4dd7fb46c234903efe12
SHA11155de3adb9639fee2067f8abde6943630978fc1
SHA25613ffe2b9fc8dbf021dd4e066dfb47af0ba4657ff3a60fb7910579c99833f0e78
SHA5129f3f7960bf731c67afda92cee4236c4a0be538c306aed2aa5ce6017349a6ef4a470124357698fd52b8b21219940acf5f545994bfdbb2284ba48da53fd0553b18
-
Filesize
649B
MD56c0f873bbff1513a42baadd05a424dc6
SHA1ef92951a093e5a896fe1b901bb310b86462cba14
SHA256d2129e1a1f0804f3232988bc73ea6318992db3bb109b18fc332fa9accb4a5c1f
SHA5123d1377d2dc4a2aa3cd2da759973ff46de152aae5ef81f39c3d04162ae40beafd11fd16e122eecef90afef85278b5966df07e9e5b98d099651e3c28ef19cd0f74
-
Filesize
1KB
MD55d13399797554c48b21afc32d722bf83
SHA1d28cce714e715cf85adec76b226f8c74cae67a44
SHA2560ba1c5ba672c7b96b67ab066e895a5091425fd6d794db9e67b6e8a6775f0cc57
SHA5124d77bb97f64a007bb13f2f1978f9a416f70b4172fc2c3debd81493ed8c49af7867062e1ff1f4aa0ecd74bb8963c2e97c6cfd497b4fcbb9cb672506d9b9d80a78
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD569a619ad25673d051ee39d452fffe9ab
SHA1ba504760f0c248488ebe579766323c9873d2dcfe
SHA2565ee2bd7cd9c10fdf969865a889e2a1ff77c2e44589e7af9351fe35735824b2b2
SHA51255d93b6523e7b8df0ab151604549c4c996eaf3b0f7ea08e030f3eb7c72c9b2580efff5b02172e47504025460c80e6e383803dadb7a00efa1cad58edc26aa021f
-
Filesize
99KB
MD5203623fe6f9520f1222a9c2e04375063
SHA10183a9fe1f257c27e260a23b9780a8c076ac2474
SHA2561a3a7fa3591260ae6f5eeda21bddff15a73b9edb9c8f09e563217b2613137146
SHA512a4d706e13c2ee171eaf80142be4016048c1b06d284413eeac426c8b425bccfb33e6b8e528722a0f35986bebcb98b186aead94758867d7ee26b1a70004ca45062