Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 18:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://news.ycombinator.com/item?id=25979584
Resource
win10v2004-20240802-en
General
-
Target
https://news.ycombinator.com/item?id=25979584
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133717611775798719" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 212 chrome.exe 212 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 212 chrome.exe 212 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 212 wrote to memory of 1332 212 chrome.exe 83 PID 212 wrote to memory of 1332 212 chrome.exe 83 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 5052 212 chrome.exe 84 PID 212 wrote to memory of 4624 212 chrome.exe 85 PID 212 wrote to memory of 4624 212 chrome.exe 85 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86 PID 212 wrote to memory of 2880 212 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://news.ycombinator.com/item?id=259795841⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff636bcc40,0x7fff636bcc4c,0x7fff636bcc582⤵PID:1332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1828,i,5268795489976307388,16260782665207506498,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1824 /prefetch:22⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,5268795489976307388,16260782665207506498,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2160 /prefetch:32⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2228,i,5268795489976307388,16260782665207506498,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2440 /prefetch:82⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3112,i,5268795489976307388,16260782665207506498,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3120 /prefetch:12⤵PID:2712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,5268795489976307388,16260782665207506498,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4588,i,5268795489976307388,16260782665207506498,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4028 /prefetch:82⤵PID:1936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4724,i,5268795489976307388,16260782665207506498,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4808 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1732
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3380
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD558f9434774efa739f834f357019c2e7b
SHA1bf0c2e36f05086d7e3280e046f4a2fc240560c48
SHA256001a46380b5ef0b0241b14b7825331936a1cdcc8fd3bf9f64f86b04c14524c3d
SHA51243c5dcf2c39bd4387dac807d4ed5dd04e14e8d9b186caab05a36736a5dfc2ca3659b7373ec606a75d683209e6574cfa1e36f38cf83204cf56c5716fb2bd86dd9
-
Filesize
120B
MD5ad2d5868923cdc62e2dc73c02bee9b19
SHA1a71117f2e4fc90e95f7abfcb4fee61fd127e31a3
SHA2567e2951bc2cef2806cbdf0df379068ae9882f1f41c3e2aaaf8f629dd087f7c13f
SHA51233dd65eb114c5713af8540496b533cdf121b60010a23d2dd56fe8a4b7c804af9c9f181088802b34f1311de1024c2a32bbf6cc8a175c680497bb2d1008d1f5cf7
-
Filesize
1KB
MD5f91d7a47c71bd94739e88f3db6f87a12
SHA17894e6752453a232f9a0bdca9fe15bd977d63a91
SHA2564e53e85b9af5a160ed783f72a51e6952b54c0e9a42712238b9bf45f96451bf56
SHA512b1d2fbef759083bc3c15852eff40d1a2d3a651d11fcf450a6952c9235cacf13ccb897bb498402ffb9324531a598824ef874f6c62823c6914a35b705ec3be0697
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
522B
MD551f742aa4bc74368d266c1893d940ec4
SHA14ccef72386d10060bddfbbc78a36fc60f6cd29c0
SHA25613e0e8bbf51dede3f65a6434886c01158f958c80623d04e4d792bf7ffdbe5973
SHA512093ef880a55020d100e14c4ad84260a6a6de45c01f2b64edd5f67b37dd0a55fd5159768a0ea34e55186be5526ef01dfb72e405cfabcd15e07676208efac4f311
-
Filesize
9KB
MD5165f4c44b9dbd0aaac2f9168dfd392c8
SHA1b902fa649699279e0d9cbcf6c9872160f6dc6814
SHA256e740e3fe88af767f9621767a3b270ce901b1aed12047a69aa62a6bddd509989f
SHA51277e511227fb5e7837295f1552c009fa01aac92a825fca69f6a927859c5eef42d79047c5128326a98609f154f27bac897dbdae9eb4f7802925d2b213c7ba0ae11
-
Filesize
9KB
MD5c7f8d8e688f42d56c60a57111b5677f6
SHA12de2eba696e787193b71278e74fa4534f7c68ca6
SHA256fb43dda95a0084565bf3925d51c0a3164543bd17f7215bf98991be2e13407cbc
SHA512fce7dde1ea2ba156e7a1f3f589cdbce1d4723b0d30f6ff24d2a9178e2c90afce8033005ac378155bf88d4f8d2abd3ab284b359167979e6c6205b862ec9eaac62
-
Filesize
9KB
MD5e8d20ce9776804665653ff188004aad2
SHA17bf3dd33ad1e3e28b04507b863369a2fee12cbc8
SHA2564524d85f4ceb79eea324f98b00831854b25fee783eea6cc9270aad02e0225f96
SHA5125d8e6b3a6c61cdec5b9c40277890927e0ce680d20c8409d28adb49fdd5ab7870fa91dcf722391ff0648de41bb54bc5ca6aa69184f0452f8690933fd351f04778
-
Filesize
9KB
MD5432e77c1d2f08f7e5cadc386164694a0
SHA18caa730b989a4d23047341e99b3d984cae0d167f
SHA25651025fbeec0345310d7338e58cb4c714563ecc00a807180590a5660851fa0bbf
SHA512038ef280e3267a8b84c2ad627dcfffd038df1f7b43000f0bc19efd1557ae71b7ab494b136735e0a31c2558e2d703eb967bce78a027efae335331433ff47ad3cd
-
Filesize
9KB
MD5c1bb1c307bd8ef24a55b15ed7f5bf87e
SHA1a59c6166f4dce2137e21a04983bc1f9edaf49c5d
SHA256853a82fa9ccad7b7a2805b67c300933b71584e5f7076b43e6f52036f4c00fe0b
SHA5123df5e51f883ca737970c9870a87c829c3ed6ab2c9772f24be6768fef6deae92362b4060db2cdee25db20b048ad6dc5537373282d0e6386e4d56b0e4ba4a33cc4
-
Filesize
9KB
MD575c74c94fceb4f844ffe56e6d14583d9
SHA16a639b0231c8a994e39196bf6af6153eb10b6c3f
SHA25637535b75e09051edca3c5f7195de72412f49ef3ce50dea68144225135c3e65bb
SHA512d775c15d89575879a5d932d88ac7df893c6945cc573ff83d4cc162d4036cf4f466c895b93a41fe5e4c8bbea0f2e623f36ddff4ad2bdd25fd58328d633915997c
-
Filesize
99KB
MD57d51df3595ac6ff0423b542b534d067b
SHA1be9b2108bade932a0c3d984a09aac726d300e874
SHA256873309098dc0b795223453f89d9822316759197f5c829356d48e55a2345dcf6e
SHA512287c5eda96fe984d0b0f32bce2162c9df4a490b2d2a41e35362f08538410d3255b0532c77d868087b2d7bd74ac6ef8b03a17ff2be9506431c63288f11305977a
-
Filesize
99KB
MD5d3f1d6768409d512d968c764857d931a
SHA140745b4fc888c441350982fddaf4d0b931030371
SHA25679336e2e78aa29ed59151b08631067534b3a6165a2365ac39404446ce22e91f9
SHA5129769226264cd09a188a61602a7da51dc94c6c3addc83e3329a904c4d41e4759daebf1f4058453ef5c85c3b676e132d4818df695b9f8759863730f1bb3725f4b2