Analysis
-
max time kernel
33s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 16:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://dontddosplease.elowna.org/s/9bfidmeHWoQNrHm/preview
Resource
win10v2004-20240802-en
General
-
Target
https://dontddosplease.elowna.org/s/9bfidmeHWoQNrHm/preview
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133725332412890526" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3472 chrome.exe 3472 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3472 wrote to memory of 5024 3472 chrome.exe 82 PID 3472 wrote to memory of 5024 3472 chrome.exe 82 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 2508 3472 chrome.exe 83 PID 3472 wrote to memory of 3748 3472 chrome.exe 84 PID 3472 wrote to memory of 3748 3472 chrome.exe 84 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85 PID 3472 wrote to memory of 3132 3472 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://dontddosplease.elowna.org/s/9bfidmeHWoQNrHm/preview1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe0743cc40,0x7ffe0743cc4c,0x7ffe0743cc582⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1828,i,9891433392638548921,12601878806080882832,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1848 /prefetch:22⤵PID:2508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2132,i,9891433392638548921,12601878806080882832,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2164 /prefetch:32⤵PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,9891433392638548921,12601878806080882832,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2412 /prefetch:82⤵PID:3132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,9891433392638548921,12601878806080882832,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,9891433392638548921,12601878806080882832,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4628,i,9891433392638548921,12601878806080882832,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4640 /prefetch:82⤵PID:3552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4828,i,9891433392638548921,12601878806080882832,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4392 /prefetch:12⤵PID:2692
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5016
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5dce15047be280d91629808e18224cca8
SHA1e449f984f634fff3775eaf1bc549a252ad438454
SHA256735eed1b4845c41c2a2ede0bdacba9f70cefb7b44e097b12d827d2c502bd92ed
SHA512791246d7a2431c8db4d12dc7cc50e00d370cbffee5c09636c899a33b55b0a07d24e3c8c6f1c821eaa2af85b386001451d62595d9d868f7123e231bd6e8bbb48a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\39549b2f-7c1a-40e6-b1d4-64c97511b50f.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
522B
MD56755cfa3a2dcd5665db47b6675f5371f
SHA173c67e45e4019ad710100b2c96f3b0444898c2c1
SHA256e19f07bace1e2aa75673874fd01ee3215c25c0455691753f2703f1505a4a887b
SHA512e833c02ba9d03ed568d1d9acd72156846b34eba8138b1eabb8b200fc10e166f7d3b44f7f5d14e43ca319336184e9d27cdb956c4def284db5e60826b11ec8d2e0
-
Filesize
9KB
MD509c6cabc677820e5f76d41e8b204efee
SHA1fc8de9ec9cd5e70a0134ee3af00cdbcd849d7dfc
SHA2565ce611d4ba7a85824a6b2bc061d712b476b220be823c431c4b8472817bf916cd
SHA51241e040ceb75f91024a3b709a136c495e5a29080c281ace5d9d1f9107f4ba39c785a7e887e46dc884d1c9e2364ad398124e3a0750abfa2fa4d4044d768cb9fa8c
-
Filesize
9KB
MD58a56e10468d8bfb7a10175ba0f730646
SHA1212d24cb050de36f8f0bbed75aeb8d024e5d54ff
SHA256c3c085924858539c82cd7fb01167c4c7185ce34c8337ef85e2ea2ad7202b29ad
SHA5121d79262a78ecf3770827b5c7085bca12120ba31d2de5d5f2f6f837c06bf1a17115d83447a7ca4653d6da49ce0f5e87736806d6e6d02e46b35096f3305e31c300
-
Filesize
99KB
MD5f3043860fabc1cf18c7b69636ddf433d
SHA1c3ec99f33da5732318480badd67acecbc021e6ed
SHA25678914753c4827517fd280787487982827f8d0895e2fef3f2a71b61d2a9cdf95c
SHA512f13858e45c3d6fe0b93429496b7fc3898f37fa9bde9e458b3917d930f2876c653e3a8ed13149569f113af804d36b1416af2b16d7af4315c6ee82c592058377c4