Resubmissions
21-09-2024 20:46
240921-zkp6xsshqp 621-09-2024 20:44
240921-zjgs6ashkn 321-09-2024 20:28
240921-y88gqs1hra 921-09-2024 20:27
240921-y8mv2asbnq 1Analysis
-
max time kernel
97s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 20:44
Static task
static1
Behavioral task
behavioral1
Sample
PlatonWebhookSpammer.bat
Resource
win10v2004-20240802-en
General
-
Target
PlatonWebhookSpammer.bat
-
Size
3KB
-
MD5
8bf81aa131998cd469d2c2da49367dcb
-
SHA1
214f0df3b2e5f6728cb3724eec9ce80d0738a70d
-
SHA256
5449706ffb9ececf4c10121f513fe62797fad35274d9b1a84eb4e3ab861af94a
-
SHA512
bac8bad76778d33915b6acdd9771f297117e4e65e0802e483f65e3bac56e5fee48aa63922aa55a361b836a31ba366405c2d16f0b65f87e4c6e2fea5429bc38ad
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133714251573579602" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4504 chrome.exe 4504 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 388 wrote to memory of 3144 388 cmd.exe 83 PID 388 wrote to memory of 3144 388 cmd.exe 83 PID 4504 wrote to memory of 3824 4504 chrome.exe 96 PID 4504 wrote to memory of 3824 4504 chrome.exe 96 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 4900 4504 chrome.exe 97 PID 4504 wrote to memory of 3680 4504 chrome.exe 98 PID 4504 wrote to memory of 3680 4504 chrome.exe 98 PID 4504 wrote to memory of 3716 4504 chrome.exe 99 PID 4504 wrote to memory of 3716 4504 chrome.exe 99 PID 4504 wrote to memory of 3716 4504 chrome.exe 99 PID 4504 wrote to memory of 3716 4504 chrome.exe 99 PID 4504 wrote to memory of 3716 4504 chrome.exe 99 PID 4504 wrote to memory of 3716 4504 chrome.exe 99 PID 4504 wrote to memory of 3716 4504 chrome.exe 99 PID 4504 wrote to memory of 3716 4504 chrome.exe 99 PID 4504 wrote to memory of 3716 4504 chrome.exe 99 PID 4504 wrote to memory of 3716 4504 chrome.exe 99 PID 4504 wrote to memory of 3716 4504 chrome.exe 99 PID 4504 wrote to memory of 3716 4504 chrome.exe 99 PID 4504 wrote to memory of 3716 4504 chrome.exe 99 PID 4504 wrote to memory of 3716 4504 chrome.exe 99 PID 4504 wrote to memory of 3716 4504 chrome.exe 99 PID 4504 wrote to memory of 3716 4504 chrome.exe 99 PID 4504 wrote to memory of 3716 4504 chrome.exe 99 PID 4504 wrote to memory of 3716 4504 chrome.exe 99 PID 4504 wrote to memory of 3716 4504 chrome.exe 99 PID 4504 wrote to memory of 3716 4504 chrome.exe 99 PID 4504 wrote to memory of 3716 4504 chrome.exe 99 PID 4504 wrote to memory of 3716 4504 chrome.exe 99 PID 4504 wrote to memory of 3716 4504 chrome.exe 99 PID 4504 wrote to memory of 3716 4504 chrome.exe 99 PID 4504 wrote to memory of 3716 4504 chrome.exe 99 PID 4504 wrote to memory of 3716 4504 chrome.exe 99 PID 4504 wrote to memory of 3716 4504 chrome.exe 99 PID 4504 wrote to memory of 3716 4504 chrome.exe 99
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PlatonWebhookSpammer.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\system32\chcp.comchcp 650012⤵PID:3144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff99dc7cc40,0x7ff99dc7cc4c,0x7ff99dc7cc582⤵PID:3824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1888,i,468909470821214404,11043077149620962740,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1876 /prefetch:22⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1748,i,468909470821214404,11043077149620962740,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1784 /prefetch:32⤵PID:3680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2272,i,468909470821214404,11043077149620962740,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2148 /prefetch:82⤵PID:3716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3144,i,468909470821214404,11043077149620962740,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3292,i,468909470821214404,11043077149620962740,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:4080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4532,i,468909470821214404,11043077149620962740,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3848 /prefetch:12⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4844,i,468909470821214404,11043077149620962740,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4852 /prefetch:82⤵PID:4228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4884,i,468909470821214404,11043077149620962740,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4852 /prefetch:82⤵PID:1736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5148,i,468909470821214404,11043077149620962740,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:2532
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3008
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5c123e8dacca0e09d493b539c9499112d
SHA1162e2a5e4d3ccfa730176333a0090682bae99c0e
SHA256e4d34662bbeaad50a2e0fee358163b3a58980d5bcc31b45fdd6eceeaaa6a5892
SHA512e3dab0f1f84689cdfe8dd792638ec2b961a20c6f2f60dec75948098eb8d81016740a9e6aeb754785dd5d4c298a8f1511949643f2813d4188ee4b60815b8a1e34
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
Filesize
216B
MD5cdf4db99f7495db2aeebe7240febdfce
SHA18cc868263747218ee263042025e058de948053f2
SHA2561494660ab8a4b8b1479ee22af15a1a4e4f40b11a5d684ddf972fec8e8e2705ef
SHA51205bc43430c82127fb6b9c522e719b9fbeddbd261ab043977cd0d5fcb529b361aa138c5e7233b1d99a260a5de4f35113f8d93a43722ec39dbffabc64583bd9fe6
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD57558d5c97bf6760887f6b8e86b4bcf0a
SHA1464a0a23d2eae7470dc53c16b51f68536723b8a5
SHA2561db0e80e107276719f531d65983db1873304ef4b0d5f34e5efb128d6b0ff2112
SHA51256e5076ddde836d1eb0ad50093c7c746858b2d266375cf62693efac308eb99aa352bc0bd75512f197a67b5d9ace61e3ebf6abe896eb62cb3bc26e26970dfbef5
-
Filesize
9KB
MD502b0c048ac447df062924f80087d5897
SHA12db0833c17cc8a8f1386cad1a62cb2d1f2713746
SHA256a5c13cf93b0f6ed5286694ae9e00bf4301a9c96aea023a4c7c904be22d0236e8
SHA512e9cbd4a06ea11463d3b64c0dbfead3e0cd2abc5cb5ddf75eedce39306e952ffe18916c797da29787fb380c2839ff99568d1a97e383b73789d12b7d94460a5469
-
Filesize
9KB
MD5ca52506910282587680427ee97d854ab
SHA1a3373e39aca370dbd9720bb1992e76150c74bfd8
SHA2564e0a21bc799a8f0a46601feaf875e557350d602783379da920c2954240464616
SHA5128d4af68f0a467b736e6c3d9a02a25b56be871310765a2d40f56b50838ba3dd682959b976b9fa09ea39e16ceb05e05809d2c109fb150108cf78de4508aac16450
-
Filesize
9KB
MD568c9a0f4408b280ce2e69ef1e67e0b53
SHA1ba37e60a6e586906d6110af238ad77e0a9db6555
SHA256b239fdf9f9049b7e642bef8f981e753cb105b707c5244c68920874fc5a032294
SHA5126847d89e77ef862f3cb0ede11c7327e8a84641d5f13cb39284e6381eebf902b5d0c30674d71ef77d8763f0da10540f1a47e3609b67e805f9b9b3cb33b164d8e0
-
Filesize
15KB
MD53c32beab76b632090511833a83b06c64
SHA167af43609bc2c0ea5a3ba4b78d446f5571ff1ba0
SHA25667a3fe6019b037194ec8359fdb879c6ef49374d36245816e111789cac0e10edb
SHA512de9d1bfbcdcb0c8031fa2ac6cfb5797fdb7402239f1eecc0554974a9973d9e1e59cb29ff782d2cd7c6467e08407a738383b02656bc9aa23f9b25353ed23e0f04
-
Filesize
211KB
MD5fd19be24ec283642fd0d346cb456a731
SHA1ce1f5a6d772072e61712f82aed8f75a7f9d69ab0
SHA2562a4b6e3f4d6c53988e4426c5e4f191d7ecc86753b21c0ff697c51c4465025f3c
SHA5129a46a2c29f962deadc9978b1e29e59b149fba69ed06c042d7aea7ad286ad0e1df0ab15bd7022674c55119aa107c01c9ecccecbb319ff33863754db8aeab53d25