Analysis
-
max time kernel
48s -
max time network
51s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/10/2024, 14:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://bestiptv.us
Resource
win11-20241007-en
General
-
Target
http://bestiptv.us
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133736497425715999" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2476 chrome.exe 2476 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe Token: SeShutdownPrivilege 2476 chrome.exe Token: SeCreatePagefilePrivilege 2476 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe 2476 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2528 2476 chrome.exe 78 PID 2476 wrote to memory of 2528 2476 chrome.exe 78 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 4860 2476 chrome.exe 79 PID 2476 wrote to memory of 1948 2476 chrome.exe 80 PID 2476 wrote to memory of 1948 2476 chrome.exe 80 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81 PID 2476 wrote to memory of 3108 2476 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://bestiptv.us1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe1934cc40,0x7ffe1934cc4c,0x7ffe1934cc582⤵PID:2528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1812,i,17561941635333135963,5305687229278307936,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1808 /prefetch:22⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2080,i,17561941635333135963,5305687229278307936,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2104 /prefetch:32⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2180,i,17561941635333135963,5305687229278307936,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2372 /prefetch:82⤵PID:3108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3004,i,17561941635333135963,5305687229278307936,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3020 /prefetch:12⤵PID:1040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3008,i,17561941635333135963,5305687229278307936,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3048 /prefetch:12⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4320,i,17561941635333135963,5305687229278307936,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4256 /prefetch:12⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4640,i,17561941635333135963,5305687229278307936,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4652 /prefetch:82⤵PID:3116
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1372
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5e0e2154d3a5b23136c2c03d916af2fd9
SHA1489bfcba77467c80122b0264d9f4f030c4e0e2bd
SHA256aa1756c111d59139b1c3dc77a69d6a99dd9a649035e2244c773f1520032c3285
SHA51292c4c059b9493493769cc822fde33367d5d36475c00618c2438626ea6d16de048bff08c9b430ad18b54962c751ade6627b21bae35e22e6776f3ea08f60bf56d3
-
Filesize
936B
MD52fe79373f5335feba249b72c9f8493c4
SHA123616e8abafa4913c6b746b5247beead15916e90
SHA2565f4f962a1a206aa20bd0e5fcd7f9b7f585dd5853248f5f01f55eac39d7a0151a
SHA512fe74504c1dd366caa4cd8c8079f0470466b6f05aa88611cfdf50decf6de93aa0493866cc8241066354bb1d46ce97559ce1c936272ea42c352dd5eb74e25cfb87
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
691B
MD5bd14fc950360363c21172e993fc70c82
SHA1f0c198630aa427a9462a2d01704dc92506aad8d3
SHA2569481cd5fd5f32681ac4d4be779e2842f40ba2ae71e3247db1d68489a2a8abba9
SHA5123ec654b26484e76e71f61290b29f4d1b1ac968e5770e49bb4ce9588060bec9155bbad79a09bef16a0f7218f42e5cb3cc55da9e23692ad6e25f958bd69281d5ea
-
Filesize
9KB
MD5c896c78c102910801c47949eacc8a031
SHA11ea9367ecb7b917504e0c90be1f438c87fa8cbd1
SHA2561176c22177e37671644dc373d8a2d3a42a83181f41052afa029ad2577524c764
SHA5122c50c339153f30a42a3838fff28a62e7555b2f8ec8fd17ad188446bee3439996b90466a405ebbf536752a04e38620330f6d5d9f757572347b37db106d60044cb
-
Filesize
9KB
MD5588073d3e5d7284223447241810040b3
SHA1c465eaa12999506125dde593ad86e459f4bf335a
SHA2566632e382f809161d0731433ff36917a93a3744a58954ad0123d1cfce5811409f
SHA512da71dff2e8f0689366a9180cd2be9f2cd645933484ddd21856ba86fdf260518e189bd49a05f6e78f61d9eba52d9fbde186995a509d8f6812349dc8396129ed5a
-
Filesize
9KB
MD5e5ed4b5d12a6d148be0dfd41312f406b
SHA177a9e07743cc8668bc8f543afedc7841956a6bb9
SHA256be37c99ab2d802356e94b2059c2ce843f53590a4c104d1a08ab8d3e9abdfdb0c
SHA5127257863833abc1ed4603b5e82db862d4f6ee7dac480b785f17712404e82ff589132465e4d85660fb5391de07c0047071260ff8412bbe30d5018d945a8eea6ea7
-
Filesize
228KB
MD54c61797e085e597ecf1442653b75d3d2
SHA15d1225e62e5403b4e64a91299a1278c66f0f5cd6
SHA256ec9183529382de15ab8bcb79484af0c97db50bc8f99578fc18e4191848d1dd02
SHA512a682175e546014767d6314697be3b8ea5c4bcc8cf52f1f74e46e861f909de02e8f88cd00668174a51da0c1ff68952b7b14b9cd0100481cdbf7248ac1e0c9707e
-
Filesize
228KB
MD513f5f7708b3a9c00c0769e7f1adc5892
SHA1b15196ad71213179aa70c14c30ac986cc78c0eef
SHA256a81f2508b4e6af8a43534db68387112083d25f92391af6011cd94cd69582e8cd
SHA5123492c2a75b30973c2be1b3f0416e474ffff1a3af8b5d41fb55f09a7e128ae2e0a2fc6aa78e607d3ac99596f72c8e0e951986a43aec0867b6c211c224c07265dc