Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-uk -
resource tags
arch:x64arch:x86image:win10v2004-20240802-uklocale:uk-uaos:windows10-2004-x64systemwindows -
submitted
26-09-2024 17:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://itorrents-igruha.org/2902-bad-north.html
Resource
win10-20240404-uk
Behavioral task
behavioral2
Sample
https://itorrents-igruha.org/2902-bad-north.html
Resource
win10v2004-20240802-uk
General
-
Target
https://itorrents-igruha.org/2902-bad-north.html
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\INF\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133718471933193251" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4504 chrome.exe 4504 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4504 chrome.exe 4504 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe Token: SeShutdownPrivilege 4504 chrome.exe Token: SeCreatePagefilePrivilege 4504 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe 4504 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4504 wrote to memory of 2280 4504 chrome.exe 82 PID 4504 wrote to memory of 2280 4504 chrome.exe 82 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4560 4504 chrome.exe 83 PID 4504 wrote to memory of 4836 4504 chrome.exe 84 PID 4504 wrote to memory of 4836 4504 chrome.exe 84 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85 PID 4504 wrote to memory of 4852 4504 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://itorrents-igruha.org/2902-bad-north.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffdd771cc40,0x7ffdd771cc4c,0x7ffdd771cc582⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1928,i,8024351552248650055,14588616989263745218,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2136,i,8024351552248650055,14588616989263745218,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2176 /prefetch:32⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,8024351552248650055,14588616989263745218,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2436 /prefetch:82⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3112,i,8024351552248650055,14588616989263745218,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3120,i,8024351552248650055,14588616989263745218,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3688,i,8024351552248650055,14588616989263745218,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4716 /prefetch:82⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4952,i,8024351552248650055,14588616989263745218,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4776 /prefetch:82⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2544
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:224
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\363655f2-68ff-4148-ab66-fc85ecaab643.tmp
Filesize9KB
MD50817eff2e9db13d5f8ca080007c626dd
SHA15d7c0a667b8449a0ff84db1fb092ded7cb54407a
SHA256e931c193b158890f759dd41ad48e7c0c877437e7e9bc9611e220ba1660fb857a
SHA512cf48d0c0700896ad6ab05eb23fd6c43a4fde40a87287967cf397e526e2aeb5b6896be246fe0d3f1f114c7a4edd627bc8f92a1ad6af164209fd63f5bd8dfb6fdb
-
Filesize
649B
MD58321931c21ebb2746848a9cf00dd58de
SHA15749a2b7854bd8638a5c35ecf432d31fabd383f0
SHA2569bf5ffa1ab528d89d394ff1f31164a0a339808cd6ba275c616c0d473d436b748
SHA512289a1d9c9629d838671879248aab8cd1134ff224223e3f2e891af8bdee9a91ea5b80cdb9e5bb1b2cd6e452ab37606bdc6e9ad1056287b5da8b5a83c98e600468
-
Filesize
240B
MD5226c81af708ac6a29659e19bd9318a6e
SHA1a4c357e57b98b3da4f56342c93f9666f27b6c51d
SHA256ae2edcab8829921b5f9e04829326e05fc85413fba840f8f813eaf513ba84f929
SHA5120c7076f887ee25002ef76a7e4580d2fe57b09bedea1677de4cd2f3035f0960df8196674c069d7648e3211a0d51f55a36dc160ced68ea2784aec184b521d5ae5a
-
Filesize
1KB
MD5df9ef4988741d7476f1e8467b399f55e
SHA1ccfc3b8a9e18ae26be76c7f1f8888ca38be1adb2
SHA256b44d2e972cf65cf4fdf9aebf5aaaf5577b195b8becbccc8958786b8d6b1143e1
SHA512b7f8debf012c91b19b015c16bf5fd650806f6b4a56c8d18bbce36deaff970f0acecbc3f20b0f302059c84e213f0ccd753db7cf5d82f8db4fe962014991f1ee57
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD558f5db2efe348d8aa40f84c47d7dbfd5
SHA18371e1ebd720e2c27149d0da2c58df7b174b897f
SHA256d76d46f176e4854c307f8c5176797da86a538ce385fef7db61f5af87dea15e2d
SHA51288265ef8901f593df8280c0407cdb5a4cb976a8ef97fbdcbec4ca1a6b0e2a4aff02a4cfdf61b8e6f616a9a8e569b9c658d5092a5ad63ef2d274650af271dc831
-
Filesize
9KB
MD5cf7b93d597a34dbe8d104bbc76c636a6
SHA1c0178a7a52e1010669195372d893de5eb9531afe
SHA256def6bdc104abc76df3f2d7dcd9ca9a6def2ef25cbfee111fc254fab09c4e67a4
SHA51299d162f95a5339b6dadb1d9bf915810e04e218a9e24d5215c18f1714072f149fee30c6480e14e5366b389ed4c266ba455a9433ca6c459682477a29ede133c900
-
Filesize
9KB
MD5132f388836f59b1b24c6e8fd18257b17
SHA1218b621a2892fed46b23b632604f520094199865
SHA256d333e6001d3c8158afd8a8515eccd6334357074c3918ff3b1237b7c01520cd30
SHA512f1459bf27332ea16ff33fe2b1d63e57a08963eddb4cb6cbaeec6a7e1999676e6ee2ab538cd244c09d5f2c08b26f45bbd40d95e54b5fa595ad6a8aa2c12846c5e
-
Filesize
9KB
MD5572da9c6fd70f96035aba8cca9b7f87b
SHA1f5de0e7426100e61794d583cfde3d99e3aafc197
SHA25664614770611427848d0dd7256529b9e7d9959a5e448a49c29c15adea70c1c4eb
SHA512c842d2dce7fb4883132962321abb61a8f0dd3790b94d9630281e7a18253ac3d495a73da7c50f89fcb2ae7ca41542fc4b92fd33e7ea278e3b82c0f604279522ba
-
Filesize
195KB
MD53cfee2583f20d05de5f2bcd01175be9e
SHA1669c84cdce07f7e09650a7032a0dec1187504ed1
SHA256d82f1284760e0d1d8a2f9d1287487febeecb08ef221ecdd6cf7bffb632ce68fc
SHA51257417e6dfffacedf58ad2f4e65b796f2314d98c026cd9227c10ebb47e92d665381bf86075eb1e44a509f08af35f988317a2a92ff7b8051e9a2015f89a9aaa920
-
Filesize
195KB
MD5e7d0cae264c936d5f0a574f35b6197be
SHA121353b02b825f178458124bac4e346c5aa477e16
SHA256026ff01636c9d5bbf5add70c201755500f1c7638607a67bc90d123a35d7ad0b1
SHA51283fe18f7de3aa5ff6bfb12bdb233ec597c1c7a67124fc93ee33646e9b0e3bf3bd07e66513a6a8686a89c0d563c3a974a46c0daf4c441acbef77e59847134aeb4