Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 22:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://159.223.159.127/
Resource
win10v2004-20241007-en
General
-
Target
http://159.223.159.127/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133732472899620513" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4588 chrome.exe 4588 chrome.exe 868 chrome.exe 868 chrome.exe 868 chrome.exe 868 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4588 chrome.exe 4588 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4588 wrote to memory of 4312 4588 chrome.exe 83 PID 4588 wrote to memory of 4312 4588 chrome.exe 83 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 112 4588 chrome.exe 84 PID 4588 wrote to memory of 232 4588 chrome.exe 85 PID 4588 wrote to memory of 232 4588 chrome.exe 85 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86 PID 4588 wrote to memory of 1892 4588 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://159.223.159.127/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffec309cc40,0x7ffec309cc4c,0x7ffec309cc582⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1972,i,1367384629994328757,15461198829527213641,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1968 /prefetch:22⤵PID:112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2132,i,1367384629994328757,15461198829527213641,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2172 /prefetch:32⤵PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2212,i,1367384629994328757,15461198829527213641,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2336 /prefetch:82⤵PID:1892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3036,i,1367384629994328757,15461198829527213641,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3060 /prefetch:12⤵PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3048,i,1367384629994328757,15461198829527213641,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4572,i,1367384629994328757,15461198829527213641,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4588 /prefetch:82⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=724,i,1367384629994328757,15461198829527213641,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4840 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:868
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3692
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD53388211ac055b350bd5d88a04fe51b46
SHA1019f7ef30870f09bdf24158a62047a3512076910
SHA2569ecf08206648c8087dd6bd96e9a9f0948bb219c03bd39b45a161ad3bf44f82a7
SHA5122348af746377acca13032fa6e95f800ce50dd88f90d3b854b5c8d305f424e4e7b2dff019edaae6959c9f36a0890d45b1b62c7f866473c6ebb9c1a9b803fe6c37
-
Filesize
8KB
MD5b94e86a9508256845273b026dac5530c
SHA197b6d433652c9b05cc41dd288abd2c790949573a
SHA256f30bcc2b4fa3bc94676708dcb77271541997271580d834d6b69a4f7d13ccf3b3
SHA51298a6260c0703b97b73a782bc5a0c01a6f9c1b24ac41edd48f03a7bc720374a95a60b90147710c6483f684c0eeb1c33a7a48b2bf931b67b2e3c4a01c4d7fece15
-
Filesize
9KB
MD5ef75aa92aec3fcfa2441a28c5726677b
SHA144098a765a71b89ae567a4afc1067ed7dde87762
SHA256e5161cc5e29cf96c2f32c9d53a73053fc7a72b018f701462071dc7112644e599
SHA51283f514a64216ee8472669499994e29629ed83e9229f1f6f0346b984af6876a14b0abe5f7ab0d95a49f17bd7507c0e855ad9adefdfcbb62e5f5b916454a983757
-
Filesize
9KB
MD5e702b7fdbc209951acd56ddbcbdb0520
SHA14c8e09c3d74cb79a3ba2a7fd5fad6332c6b42352
SHA2564947cc1ce13a187b702770425aad191aec1eadf8449a1245d2173fce681d16a4
SHA5128bf119c0201513a714eba7f04adaaddf93f998c8d461c0651b314ab21327609968ef482f30f1e5b457ffc4af3dfc8c445dd3c61d14f2b3ed2a9943ba6d29cd6a
-
Filesize
9KB
MD55c0c67c1c016c1b0c14c6a9e6ff360b3
SHA176c18e34f5d44d48c16f4c471311162f0fa3e4ad
SHA2569f44dc389b4ff5ee467099ddb8d55d32f46c027e284961e8126d61eaf39565b7
SHA5124e518423fb7e6a264f2077debf19049eb933dc2ed6571a04ce79a0dec55b468d2f6ec77a54f8185c307b923135ee532202c428652134dc67699ada957e6337f9
-
Filesize
9KB
MD5fb1fc83e292e3509f400cf098ce895c9
SHA1ff719fc6e336dfb7c8cd43a2ea55ff8a1f95f2a2
SHA25697ccf9c149b1d0c5091bbfc9df7c1feacb08cc9fd83eeb5f425c27a2066c6d8e
SHA512cea9addaacfac187da4db1a5bd894bb28fd1f91d048df57c70f3aa3abbff80930b361fcfbf656a189fb5bbfc6c847289a44b92258c8fe4e77cf3a70e263dd10b
-
Filesize
9KB
MD51d4abc616c4268812c3924bf45ae7cdb
SHA1df7c5bc4b58b5c5d05e4bde37d2e7bb5adaa9f0f
SHA256918f26779e842f50efa30051dcf33f0888660f5442a0ece7b5ae3c73551effc1
SHA5123b3902b414ecb5b88a92c39c366df625caaa0698a4595b42be0483fdd558e1cb0caf3ec7b438c9ea2d118bd6065826efeddb52ce93071df73fa1b6994d97a1ee
-
Filesize
9KB
MD57b912d26e05b0d74528dbccedd611d42
SHA17cbbd1a6977cdaebca846a93e3edbc15ea32f754
SHA2567b44c5b22e0ec6e4072a3d4a853d102d036746e4a61607ff314a95b62d673804
SHA512f53b94d8bc3d754b47cde338342d2e6f7aba47e98c7abaaaafe9d651aae4564519b6760eccd974f2fdf2b7f46ef8b3fef5c448b332ef23c0ebdc584f7cf479bf
-
Filesize
9KB
MD5f5fce5dba017945baa66c6bb695738f4
SHA1e43c38a8fea429ef64628b56df40700ff0150b2e
SHA256012449172edefe017a8e48d252dd82c45a3cf92c339b5f44c1f2ac87f88c35b2
SHA51282b631c57f1e2c6200e975252b2c94e52adc99fef1beef43569d1fada8449bc738e6849fe117de6e29e24108d904e117dd112f55d0cbb076ce5ad21aae034166
-
Filesize
116KB
MD5406fcce3892f532e8c28c5e80b0dfba7
SHA1b02e36161c41589f3d1a0b3e95ef2f45e68fe254
SHA256e25e6fd548e925df9b48ffcd9a23dcc9830bf429536cf4abc91bf8060b8edb55
SHA512a7af122375808a423f3383670ea14bec88ddfc9226a6823e83da0971d23f7e000f7e2716eb5916147b20a917d31e0a7496abbddfbd012b8cb604e58f542b38e1
-
Filesize
116KB
MD5915c18883e7098524195c0e95b599aae
SHA1755ae4345209fed3f00aa4ce3b23bbb035367725
SHA256fc4eda5d52461170ab756fd39d7539b7447888a32512ea716b2e9c61bafee9bb
SHA51222cef5687e89d122619596e203418bf01c8bc8d2763343312140088fb601ae416ccf236b6be54c45c8277e941d8fc54effbf6749cfd393c82a3450db2c31c425