Analysis
-
max time kernel
17s -
max time network
14s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2024 16:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://member-services.info/render-template/?csu=zgPatPEa&status_id=n
Resource
win10v2004-20241007-en
General
-
Target
https://member-services.info/render-template/?csu=zgPatPEa&status_id=n
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133730513479459176" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4812 chrome.exe 4812 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe Token: SeShutdownPrivilege 4812 chrome.exe Token: SeCreatePagefilePrivilege 4812 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe 4812 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4812 wrote to memory of 3500 4812 chrome.exe 83 PID 4812 wrote to memory of 3500 4812 chrome.exe 83 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4992 4812 chrome.exe 84 PID 4812 wrote to memory of 4336 4812 chrome.exe 85 PID 4812 wrote to memory of 4336 4812 chrome.exe 85 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86 PID 4812 wrote to memory of 2812 4812 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://member-services.info/render-template/?csu=zgPatPEa&status_id=n1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xe4,0x104,0x7ff86405cc40,0x7ff86405cc4c,0x7ff86405cc582⤵PID:3500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1932,i,6711448978104856362,5845015750820491760,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2044,i,6711448978104856362,5845015750820491760,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2080 /prefetch:32⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2268,i,6711448978104856362,5845015750820491760,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2484 /prefetch:82⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3132,i,6711448978104856362,5845015750820491760,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3140,i,6711448978104856362,5845015750820491760,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4560,i,6711448978104856362,5845015750820491760,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4580 /prefetch:82⤵PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4480,i,6711448978104856362,5845015750820491760,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4816,i,6711448978104856362,5845015750820491760,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:2104
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2768
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
691B
MD5e74ec21acd7bfe35d75c8a585adde5a6
SHA13c8d1d058c61ec106e8b66af32b69b00a0a1ed21
SHA256769990fb7d1388ed545e798a967a06261d4a77508c0b951ec3d9e0d851b5be70
SHA5128d705e1e7cdb2c249339dc33511f37b4fcd539042cba94f3d32a9bbbb85294d46e529aab5504a0e561262fb8c6a800ca83eaafa9ca4bdedc946280b9c5d93e21
-
Filesize
9KB
MD50e66352d1e1b72a1ec3fede2ec3914a1
SHA15d91f4efbb1c59145cb5246d147c13914d869d37
SHA25639cc780a7d92440bd4d822ea5685a3a87f40a87895dfac41a865b71ea11b5f24
SHA512bb5e319f84841442ac6442c0312c9301d302cd3139f7edf6d1ab0c05922878673a0eced11e394f67a097605df18da1794675af08257fdca5e63abe9282f8f21e
-
Filesize
116KB
MD5c6351f473521351d4d07c9e87ba76a9d
SHA182ffc2faac04b7da2cf49c13b721f51d92577035
SHA2567da5f9b6fa6b5faa1fabd3bdbb63cf2930a301bf49804214c3b1f8d0292c5607
SHA5124cfe7de92f0cd6facec3e7f6c7c80c19c917cb4a1037c576411aba0521fe5c7bdb278748f69676fafc756b20f67b8d51923ba2bcf80457de3103b1dc87e2cbd7