Analysis
-
max time kernel
35s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 17:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cvp.beb.mybluehost.me/web/
Resource
win10v2004-20240802-en
General
-
Target
https://cvp.beb.mybluehost.me/web/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133706372647679831" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2216 chrome.exe 2216 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2216 chrome.exe 2216 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2216 wrote to memory of 3076 2216 chrome.exe 83 PID 2216 wrote to memory of 3076 2216 chrome.exe 83 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 3620 2216 chrome.exe 84 PID 2216 wrote to memory of 2560 2216 chrome.exe 85 PID 2216 wrote to memory of 2560 2216 chrome.exe 85 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86 PID 2216 wrote to memory of 3596 2216 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cvp.beb.mybluehost.me/web/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb966cc40,0x7ffcb966cc4c,0x7ffcb966cc582⤵PID:3076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1892,i,2396518831205140083,6418742928773958097,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1888 /prefetch:22⤵PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2032,i,2396518831205140083,6418742928773958097,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2028 /prefetch:32⤵PID:2560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2220,i,2396518831205140083,6418742928773958097,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2360 /prefetch:82⤵PID:3596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,2396518831205140083,6418742928773958097,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:1424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,2396518831205140083,6418742928773958097,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:4244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4608,i,2396518831205140083,6418742928773958097,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3672 /prefetch:82⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1240
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5fc0807b5ac1125e33ac32199fcbb5af5
SHA1c8ec545bd03938d2874c6d80d3921c668ff0491f
SHA256cab9a7ac8150f2e8a8b10bec297dc8a2a4dc8d061b7ef7ff290b9a737aa3d45f
SHA51262f5f5a352b5b93f106466635a1ce26b5e8e98bcfc8ef65f26eec600dc41cb75d0e6a29c69ded582e3b6a64e04a25045a3cbdb15e06bd092979d852c53b5b8cd
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
522B
MD5b0e4538625f7bb612760db05f8e983bb
SHA13510cffbb346141cc43cf52e0d49b99e4a6780d5
SHA2569183f47aab31ea0b5e3ad9f34cc1d55430b520ac8c3caa46349e572f2bc3b06f
SHA512fde46810e0ca15608ed86b494e202cca1618bac5f8f4a3c96b4a2a5b59fd4708157cc3f32fb018862351c0a63ebbe4c3a54e7b1f7dbdb65690fd6e6590d5a43d
-
Filesize
9KB
MD51626c2773b470fb491c7582804541fa4
SHA1c4368725d0007bdaac3287531037188ee485f465
SHA2566b02934e413eb8d67345eb3ea7140fd02c2b78ac6dc5b0201df1d6df799cb2b3
SHA512f0edbacdc419a3ae8a48748409d30e2138dd9232939d26b610c86ebae3dd4a435b8efeee2036bbd1a06f74ed0ee85153047ded86f5eb6c9af42be1ec38093137
-
Filesize
9KB
MD5ddce0ce02ed9daf788ae8ded2ee6bbdd
SHA1ca98d341031a9bdadfedb293dda518f460a9856b
SHA256ed9a5e815d8d2c4c699ff2a74d9f4ce8a5532964b7d4adda8ed166fd6b67a035
SHA512d9b18194b5d498dfbec2d4aec6b1b7d90a3ea0e0d932b869df3a352aa962247646babd5367ceb450dfddd726141d22d8a3453b16498f0a76da02561c112078c1
-
Filesize
99KB
MD5bbb45acf49d1faab7c5fce58a8b74bf8
SHA198a469fc4e3d4757bb4143f318566823e8b4981a
SHA256e1cbca9d7288fb249cb1513bc0f0ec39fbe67739cecc3544dac16c28ae89f7c4
SHA512cbaf1ab6e1d26fd7ef257827f01da24eea5ca04d6f7fc0173df9559d954f64ea758b226e2f0982a19ea02a44f84be267f94694aae649b8beca7e3bd8272e2287