Analysis
-
max time kernel
83s -
max time network
73s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 14:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://footprintdns.com
Resource
win10v2004-20241007-en
General
-
Target
http://footprintdns.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133792655763776385" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4944 chrome.exe 4944 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe Token: SeShutdownPrivilege 4944 chrome.exe Token: SeCreatePagefilePrivilege 4944 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe 4944 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4944 wrote to memory of 2304 4944 chrome.exe 82 PID 4944 wrote to memory of 2304 4944 chrome.exe 82 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 828 4944 chrome.exe 83 PID 4944 wrote to memory of 4948 4944 chrome.exe 84 PID 4944 wrote to memory of 4948 4944 chrome.exe 84 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85 PID 4944 wrote to memory of 2556 4944 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://footprintdns.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xe0,0xfc,0x100,0xd4,0x104,0x7ffdfe85cc40,0x7ffdfe85cc4c,0x7ffdfe85cc582⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1836,i,6788834792163845999,18273974953098089933,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1692 /prefetch:22⤵PID:828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,6788834792163845999,18273974953098089933,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2188 /prefetch:32⤵PID:4948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2256,i,6788834792163845999,18273974953098089933,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2448 /prefetch:82⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3028,i,6788834792163845999,18273974953098089933,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3052 /prefetch:12⤵PID:4540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3040,i,6788834792163845999,18273974953098089933,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3092 /prefetch:12⤵PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4472,i,6788834792163845999,18273974953098089933,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3864 /prefetch:12⤵PID:3188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3268,i,6788834792163845999,18273974953098089933,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4772,i,6788834792163845999,18273974953098089933,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4784 /prefetch:82⤵PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4360,i,6788834792163845999,18273974953098089933,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4616,i,6788834792163845999,18273974953098089933,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:8
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1828
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5f1eab423ec238b09d6688e37be96acf1
SHA194ffc51bbdcbeaf17dbad0424358a88a00948d3f
SHA25608e835126c415e82e4d145ed2000c27742232b1673c729337e5bbd9526840b26
SHA5121185b52726eed67ba321f75c8dd70208fa1c9010c8b87ddc9b6936e5182977f77fa65dc9a73df963d9920a1aa3e2e6deabe8b8cfa2892f995f15aa1259baad3b
-
Filesize
1KB
MD5b7c8a0a9d7463fad16a56f1cb443e915
SHA1e9d5b5191f49d57b0b65834b8186f21ca26f6b70
SHA256f7e2871276e6e6f0ab2c5ec069dc88c65e77e35b67d8ca340a9a82b78975e7af
SHA51274f43f8cd175deac5da8fe35fc6eb291bf37de971a7ba1527afee685f272a03ce3cade88fca51ebb71204acb1d63276a60b8b6cd3687fd293d61bb3f1d6acf4a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD53c3af4b9b0f4d0fa50ab87ceb8301cd5
SHA1bd9faf55c906ca80eeee249ab16c58862400b63c
SHA256889fd0d7f7c05e5d8cdf61765ad2dd63b946fd49a8effbc63162e5917f114406
SHA512b8725cd6a99a9692eaf37bc9a5c8a29c6efe1f35328ef303d0ced07755943d5fead90750410b2261e69b67a46ed6f2a5be588bbcf30ef51248a3a12ec20797f7
-
Filesize
9KB
MD5eed04ea6ddfbd76bc58446446b017e37
SHA182edac05f816cddf1196786f0c31641e32ed0121
SHA256652caad66933b6babe50c187eb468dcd68f2b2a1130ae972a20db31bc8971bf7
SHA512d3f3b5480319cf8d4c50e5034af55527d9181acfdef202371f9a6f188d1b4f4c472237ca481bd2d9fda46b868da3fddd1574373e206167631d83d691f8d4d6fd
-
Filesize
9KB
MD5ed4dba4d2f7deacea34558dd2d4a25d0
SHA1e96becc581f792f5938d46c04f92979bf32083f5
SHA2569ed5aa1ad17a0bbe141e5e8c54a62bc5ac2fd95cc0ef08e136882915bd5c8e70
SHA5122f76ebed0c2e2d3bc3c4e6601a34a984b148e74f3c3a37100d73625b5e37385fced49ad097bd7b874e5477bd61c04dec6ffb44af4118c3c9830f98c30490780d
-
Filesize
9KB
MD539b4ee944c5477103ac9cb5993956710
SHA11ea412efb947bd0b7e3c844586c57e63e90f1609
SHA2565a965b31c0194517278ac1f89282cb8c512316e21aac79012be777852f79ccbf
SHA5127be9427c16d56c124f7082eb959080c0492e309ef184cd92115bbc35e8f48a5d45ffd1f86eb6b91a54103042ea11a10916b0088f34da621d73f796aabebbe3e6
-
Filesize
116KB
MD536c8c2a8276ea8bb2c6c38886da4edb5
SHA1936c68b112ec3e77e97eb7ca87d18c43af297e56
SHA2564d471022d68484900442a9a7806733731e83a886674b97af41e2c28543239225
SHA512f54b00ecbaeade92235dbe69317c109bb36b948fcb81aea5f25f02f1e6a85ebbc06b0d720a3cead2a4025920d4d7c5d126535a668558dc024c515ac19476499a
-
Filesize
116KB
MD5d77bd65fcddb5599e95d799722922aeb
SHA12917db6a85919d5c22701cf4cca19e81eb52055d
SHA256af441aa7a75addcd01bb42bb444512387c0f8b01602e251415060586393cd8ec
SHA51220c90953dc36c429484db9dba4881821d617e5552a7d941e043638cbc3c5d343d9535e570bf638464b7e7cfadf555dec5993c56e0f03dc90c7d33d9177dedfbf