Analysis
-
max time kernel
53s -
max time network
48s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 22:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://getwix.pro
Resource
win10v2004-20241007-en
General
-
Target
http://getwix.pro
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133778259369823540" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5040 chrome.exe 5040 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5040 wrote to memory of 1940 5040 chrome.exe 83 PID 5040 wrote to memory of 1940 5040 chrome.exe 83 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2556 5040 chrome.exe 84 PID 5040 wrote to memory of 2128 5040 chrome.exe 85 PID 5040 wrote to memory of 2128 5040 chrome.exe 85 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86 PID 5040 wrote to memory of 1648 5040 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://getwix.pro1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd8,0x104,0x7ffc0a86cc40,0x7ffc0a86cc4c,0x7ffc0a86cc582⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1832,i,10944404631629336698,3502432504234215884,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1828 /prefetch:22⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2088,i,10944404631629336698,3502432504234215884,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2180 /prefetch:32⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,10944404631629336698,3502432504234215884,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2336 /prefetch:82⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3044,i,10944404631629336698,3502432504234215884,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3084 /prefetch:12⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3052,i,10944404631629336698,3502432504234215884,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3772,i,10944404631629336698,3502432504234215884,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4456 /prefetch:12⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4728,i,10944404631629336698,3502432504234215884,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4616 /prefetch:82⤵PID:2992
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3080
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD57dac08cd8484ab3ba2de38161dd02837
SHA1ea6db95cb508e9b154871923e93094b1456fda3e
SHA25669ed3970497525ddf4332b8aee588d37a257bd4d6e080c931d306d4ea539c784
SHA512531867899cf8c1875c88fd559a64c83b449e85d8e0ad2f288251a9db62e1f0335cccd96f7c2198e7f36324f808be500fd35a3f4f789c62d4cdc206594f804de8
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD54a399baaa4660a29cb79b5af2ac94773
SHA14c10f2a796d2ebc63fc561165028111d1c07b3ca
SHA256750aa1abc5fa0fb866817d6d97b9ec592c80e85594590001057aac60b96a59d7
SHA512ad1872595149c34fdf6931de717302560c41a8d8b40dd2a78a696fd87b43fd31d8ae4a9686ad7ee47f56af6872dd3a115f2404ec15ee9d9ea2cb41bdeed1fac8
-
Filesize
9KB
MD5496754b7ae9c8587c763e1efc4d44c4f
SHA196e529d2478fdd50c706bc4511e2e62af86fd237
SHA2566ee9fb015d69fbedac618d3e460481f58d4b60852623592e3e18e0a722d745da
SHA512be41a93e1468ffe30bf80909d73034046b7600ab92f5e9b317223dc43934e77f1849d3ff81eb242d7ca1bceb80c5cc62157a037f3608566b6006db9426023beb
-
Filesize
9KB
MD596868cdd635acefb1c1c6a8634b732e8
SHA1d143b868ec22d87cb16fbaab728898f66b95e6bb
SHA2563bf60b563ea92ab43782f79425217426a8b84f5f2f51b55a1bde0fc73a7b7676
SHA51289f74e65ff541821a23b9b21657afb8bc6cffc22622b915849ad23e30b19e4200ee9fc46e32a66e43feb234580856d7c742d7dec7aad1a50c3eff26a860c1a20
-
Filesize
116KB
MD5569a21c179330b1ff04015d8625d2886
SHA1731f95b432a50d55ced22e1709e0dff809521702
SHA256af5a5e8b268b4247b01434c711ba0528a254370dafd2311afe843ad385e5ef8d
SHA51298c95032b4772156ba133343404d6de3baa4ddd3bfa6f9e7c5cb6c270d7276df5d0f8ea6ff640486b7f60dbff89e59fdf588c93a7f446e567ae2adf245d0df8d
-
Filesize
116KB
MD5cef4d7ce688a94d8ebab4503dda5e95b
SHA1d322c86becee5592afaf5e76a0d993a73f3b3800
SHA256fae90536cccfd6ada8e98e99b90172c68776c7075b638f3514b4fbbb7f7960dc
SHA5128de9626703a675f9a1e19fe52960ff8e47e9e67de8c2d425f86c2172d23faea0fa7170e1ad0c81212793ab5452087adfb2ae22aed85e721cf5021e91d4380d7b