Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 16:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://validitytextv1.b-cdn.net
Resource
win10v2004-20241007-en
General
-
Target
http://validitytextv1.b-cdn.net
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133733089381576011" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3900 chrome.exe 3900 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3900 wrote to memory of 1976 3900 chrome.exe 83 PID 3900 wrote to memory of 1976 3900 chrome.exe 83 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 1432 3900 chrome.exe 84 PID 3900 wrote to memory of 4368 3900 chrome.exe 85 PID 3900 wrote to memory of 4368 3900 chrome.exe 85 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86 PID 3900 wrote to memory of 584 3900 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://validitytextv1.b-cdn.net1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa0e0fcc40,0x7ffa0e0fcc4c,0x7ffa0e0fcc582⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2056,i,17554997602271449822,15912211878051763055,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2004 /prefetch:22⤵PID:1432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1920,i,17554997602271449822,15912211878051763055,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2100 /prefetch:32⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,17554997602271449822,15912211878051763055,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2284 /prefetch:82⤵PID:584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2744,i,17554997602271449822,15912211878051763055,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2920 /prefetch:12⤵PID:1072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2852,i,17554997602271449822,15912211878051763055,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3088 /prefetch:12⤵PID:1160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=2812,i,17554997602271449822,15912211878051763055,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4416 /prefetch:12⤵PID:836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4436,i,17554997602271449822,15912211878051763055,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4624 /prefetch:82⤵PID:832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4616,i,17554997602271449822,15912211878051763055,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4852 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4140
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5096
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53e70874e5edbbeace561c80da7765028
SHA18d282a2b9ff184ee6f528a4ff5c30359f843a2b2
SHA25631f5ad98b1bfbb8a37ef072d9d46fe76ab67868e23070742b534d93f17ca33a0
SHA51275532b05510e93dba986bd393562b514c1824a6f5e442231a78b99b8ba4491a2b20996708140b0ad3c2938e47731c04e0e9ef863c9ae91a4969b6efcb5bad708
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD5d9203720ea1a187bcc6e698b53ea348c
SHA1f8e93cd9e926fc1bebc518ac9f1d8eed5327ecd8
SHA25687b2adf5240cd3c7584e2545172ba85fa1cb65a6495d212810883143ec673676
SHA512693d2873618920d2499b4953f11dbd5546c92f9c216f497df66a4eca838e8dd180adb81eb4f52b6c9a43251a001ed4df009443a3721997fd1cf6978794bfe3cd
-
Filesize
8KB
MD54e512b9baf005eb438bb9e91bb85d9d5
SHA12214b8a4554a9b209d83965fcc890964a18a7a84
SHA25619f4f6b9764daaf581a2418a22d6fab5e2dfc1819cc8bca879a7939d3392cb4f
SHA512d4bcfad44b88fde8f4d3c1c416a74516638b1fd98a34314ffbf4960a7d36b864f8eb4b6b5e22267d5b4ade0546104d1ce33a463d467ea6ac7fa038a0289475a8
-
Filesize
8KB
MD5afed1c6bccf972e0aa48c226d5a86fac
SHA17f2bfd9f4817a70dbafb22c6269effd05b6cbbf2
SHA256ef84a4dce98cf219df36e94b42e81c9a4c8ec39f131de9b5d9aa4f0f9fc376fd
SHA512812abcb1e8387f2acee85cc1fd21323d9a05a11dcab839740eccf390de4d6777a7611ff688f5f83f503d25cc986f2ddb8fa5d1e0cd299ab4cae2f0364a6c9fda
-
Filesize
9KB
MD563e60be628e55e135bed5655641973c1
SHA1180c13f460b5a296effb16fed01879d2f2c6e32e
SHA2564a711436c54950ee2566ef83f9900f991bed3cf9b76cbc7e0f9c2ed57dc3aa7e
SHA5126ad1804b3540bb408a3fdd648e0d696a2113d325f9631afa88c9762956d41bd6de38c14d1959e4c6318fe2c241db22afc73770585a1c638f217aaa20c935fdb8
-
Filesize
9KB
MD5f0545100e818afbe7336a028ddd0afec
SHA11f0587a3876bc08c869c00e77482160bba84e911
SHA256aeef19019bf3e522e1097d92f2d53f9bd7b7a53385b9a53e8278fd1857fad5ef
SHA512f3675b4d3bc8a4b36d53675f3ca3f53f1209aaac0a91158721bbc0e31ab8cce2d4b90671b5f8d0969fd9e54351ff68b9bcd75f9b34aa5f2f9dd8f926aba0d29a
-
Filesize
9KB
MD5bf2dd87d6ddace1c467166bab415461f
SHA1faad478a782feed3365e62b06ba1853b18f5c9ed
SHA2562926b45466d5e14a8d25ccfefcbdbb18b73c322ebbe8f8e49e1459fa51ecb898
SHA51245bcd061b320842185fece8d27f22afca71231a663ea39618626ad3b6cdb831c783f5d2fe677dfc61a2eba96691c3184ddb4930cca76a8ec8587a94f3360b249
-
Filesize
9KB
MD52dae856b74efd14abab81c3a95248fdc
SHA130ca0db819ba4e293bcdcd5a8d45d071233160e5
SHA256c4d704856f23345f284f303e7f3bda47ad5aad65d63926d18eb56cabc6646c7d
SHA512394fc1ad7ccba2be512cad8805f50ef52dce73db7799edac739044c908d6407948d579fe011751c9594f5262ef8e3c90e7cf0db34aa55f074f7a6d9c27d0c682
-
Filesize
9KB
MD52c106576ccdc77fb713928afb5a0c429
SHA189fa388a14a1ddba012680a4cab87bf426b33d07
SHA256fd08a7775d379e727ac3638e4c6dc226ff5181eb75246d2c3169eb15bb682a47
SHA512a6e3c758d239bc4382d4e618a69ecf5da9c65b68386f142060b1920ba35a1dff209b38b6844bac186d1ad20ff2585f9eb435f8657f862fa27d29db4d3d0b822f
-
Filesize
116KB
MD5c3796b3a30d4e2b238664b237cc1d90c
SHA1d68709508a52e2c293c5a37b9ba6f3333165e56a
SHA2565567faf8a9ba6b48e97e173ff0d0b07fc4fcc72215f4b0caf408cf49aa13ae1c
SHA5120acdab846cc8e899be3d0a34e5b93c35fd02daa2daa8abfdb3360ac5bf721cf1f7af054323829e1340126e498659ffdbffc37963c15b9f551ff3e181763e2752
-
Filesize
116KB
MD53c018cfeba84bfb6bf1f4e6ec3f795a8
SHA11c831230453e0dfcc964496138178d0191fa39fb
SHA25694eccc2bbe66b76b8eb65b4600bcabe507718651fc557fc23ae2b4150c53d886
SHA512d967cf21a7f32324858846b02d22a0e55f4c432fa419fd2273652d6df42f22e7bff19d56f3300ca9dc4da21b728b884849fc41b416c0c0892269b2bd17bfc438