Analysis
-
max time kernel
1200s -
max time network
1085s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
04-10-2024 20:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mediafire.com/file/vasuw4cartsiu90/Payload.zip/file
Resource
win10-20240404-en
General
-
Target
https://www.mediafire.com/file/vasuw4cartsiu90/Payload.zip/file
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133725468525990533" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5068 chrome.exe 5068 chrome.exe 484 chrome.exe 484 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5068 chrome.exe 5068 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5068 wrote to memory of 4952 5068 chrome.exe 74 PID 5068 wrote to memory of 4952 5068 chrome.exe 74 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 2588 5068 chrome.exe 76 PID 5068 wrote to memory of 640 5068 chrome.exe 77 PID 5068 wrote to memory of 640 5068 chrome.exe 77 PID 5068 wrote to memory of 3388 5068 chrome.exe 78 PID 5068 wrote to memory of 3388 5068 chrome.exe 78 PID 5068 wrote to memory of 3388 5068 chrome.exe 78 PID 5068 wrote to memory of 3388 5068 chrome.exe 78 PID 5068 wrote to memory of 3388 5068 chrome.exe 78 PID 5068 wrote to memory of 3388 5068 chrome.exe 78 PID 5068 wrote to memory of 3388 5068 chrome.exe 78 PID 5068 wrote to memory of 3388 5068 chrome.exe 78 PID 5068 wrote to memory of 3388 5068 chrome.exe 78 PID 5068 wrote to memory of 3388 5068 chrome.exe 78 PID 5068 wrote to memory of 3388 5068 chrome.exe 78 PID 5068 wrote to memory of 3388 5068 chrome.exe 78 PID 5068 wrote to memory of 3388 5068 chrome.exe 78 PID 5068 wrote to memory of 3388 5068 chrome.exe 78 PID 5068 wrote to memory of 3388 5068 chrome.exe 78 PID 5068 wrote to memory of 3388 5068 chrome.exe 78 PID 5068 wrote to memory of 3388 5068 chrome.exe 78 PID 5068 wrote to memory of 3388 5068 chrome.exe 78 PID 5068 wrote to memory of 3388 5068 chrome.exe 78 PID 5068 wrote to memory of 3388 5068 chrome.exe 78 PID 5068 wrote to memory of 3388 5068 chrome.exe 78 PID 5068 wrote to memory of 3388 5068 chrome.exe 78
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.mediafire.com/file/vasuw4cartsiu90/Payload.zip/file1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fff9dbf9758,0x7fff9dbf9768,0x7fff9dbf97782⤵PID:4952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1908,i,4538955543999330407,10647568538212891190,131072 /prefetch:22⤵PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1784 --field-trial-handle=1908,i,4538955543999330407,10647568538212891190,131072 /prefetch:82⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2068 --field-trial-handle=1908,i,4538955543999330407,10647568538212891190,131072 /prefetch:82⤵PID:3388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2860 --field-trial-handle=1908,i,4538955543999330407,10647568538212891190,131072 /prefetch:12⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2868 --field-trial-handle=1908,i,4538955543999330407,10647568538212891190,131072 /prefetch:12⤵PID:3804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 --field-trial-handle=1908,i,4538955543999330407,10647568538212891190,131072 /prefetch:82⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 --field-trial-handle=1908,i,4538955543999330407,10647568538212891190,131072 /prefetch:82⤵PID:4704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4536 --field-trial-handle=1908,i,4538955543999330407,10647568538212891190,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:484
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b8f24055c41fe1e1d892606460a7dc24
SHA12c268e4064e8d4572a2e0098b9bd9ba6fcad9800
SHA2566f3590deda620e7f582ff82cd2a6e09f883599fde5e9cda4cb2842bd05de1fd9
SHA51276eba800383612e33b6b55538703696e838f3abcc7ff1d8920d0ddd8120c28c720ae89608dc5e344ff3a916adddc2b358a779a527fdd85dace1b5b48bf4f8319
-
Filesize
4KB
MD5a85f479f76e1a0a6983887b993b0dc5a
SHA178c66433b2d3d0ec4ea4aff1d6375ddd53fa4667
SHA256508af788c87b4ca0812d442e5357af83bb923d009c0f191730b071ac923a1db2
SHA51247cef82b05ffb9df2414625d74d7faffb3c8330a751dcdda62d4d0ff9422a0ec592bf7b46626d861f4d7dd98f3db34d9f3a7b53cc9d95c4c9b665ecf74bb9c76
-
Filesize
873B
MD5d2e013744c544c5661fffd630f3dc5a0
SHA102448ceedbcb6307a2eafb86ad46b3d0c7c5b5b7
SHA25613793e75ddbaa5277c6f50c7bf6f32553096c47cf20d5495c8513f5402c406da
SHA5120e219ae12181ed13cf7142f87043126e12bcb5cb9da1cc81ed0e49fc392cd00228e8b4629d633bc1ebc26cf9af9e06b8035f015faf83426bb374ff0fb58a0b20
-
Filesize
6KB
MD5986926f9b59a41d56e939832257a393f
SHA1c79464c372c1906b7ed1c26b602bcf70d349cf5c
SHA256c1ef619bedf92c19fc8bd10bac6c8a878ddf7279766901197e485726277bc053
SHA512c348d3a23dcb1aa9b1afe93070b52fd1d0ce4ae6ecf5f541c015c9d465c985bf21f64cb1f88be232cb7599eeced45adbfec2a968fe502ff395c038ea3566098b
-
Filesize
6KB
MD5655ad20f79a5bba1e6acceab977889bb
SHA10318855c9a784b154b3997882e0451db59e466df
SHA256e40fa2ec65ec59b724ce7889f9267f584d705d58e7b1fa754b960fbe57b50524
SHA512082251c10cf7c48f6364db3e9316eedaf89e67862fe49674c63c875efb0c4782634bb3b3c97bb023afc984bc7b9b62d5d5610e0934e0c8451d560ba7ae7ed5c4
-
Filesize
6KB
MD5f1d3c3595fee20d157b7b057e27bfdab
SHA1b18104186cbc1697207bf523f7482fb86b19d0db
SHA2565613dcee4b1a43a15fea9930bb642195bcd7104e7aa35f1d1e199fc205b4bfc6
SHA5123cc88dc74a37d9791dfd1d0bc2fd7f24c723aa1d4e44f296e8aa2c019a7d665d544904e1e43abfe7bdc0e1b255cda02434114194380259973c32b4d8dab67d2b
-
Filesize
136KB
MD5bb20a5ee84a4610e2b9275819b8a23d6
SHA1bd49bdfe9e0863b34601d9acb905cd75b9e5af53
SHA256b3d4d8a547e39ed97f495b9ed1d70f1934400b46bdb2434538de63cc6ba17da0
SHA51222088ab2776dee191f7f11f11ab3aecf6e110bfcb35905fbd3f2e5db606e655ef02986d353d2541d9f3105ac1d4409948a1466584fb7340ab94ce70bbcbd9517
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd