Analysis
-
max time kernel
86s -
max time network
80s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-uk -
resource tags
arch:x64arch:x86image:win10v2004-20241007-uklocale:uk-uaos:windows10-2004-x64systemwindows -
submitted
27-12-2024 20:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://steamcommunmutty.com/gift/activation=Dor5Fhnm11w
Resource
win10v2004-20241007-uk
Behavioral task
behavioral2
Sample
http://steamcommunmutty.com/gift/activation=Dor5Fhnm11w
Resource
win10ltsc2021-20241211-uk
Behavioral task
behavioral3
Sample
http://steamcommunmutty.com/gift/activation=Dor5Fhnm11w
Resource
ubuntu2404-amd64-20240729-uk
General
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133798041851637320" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2128 chrome.exe 2128 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2128 wrote to memory of 4188 2128 chrome.exe 83 PID 2128 wrote to memory of 4188 2128 chrome.exe 83 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 2292 2128 chrome.exe 84 PID 2128 wrote to memory of 3096 2128 chrome.exe 85 PID 2128 wrote to memory of 3096 2128 chrome.exe 85 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86 PID 2128 wrote to memory of 1868 2128 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://steamcommunmutty.com/gift/activation=Dor5Fhnm11w1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffba5fccc40,0x7ffba5fccc4c,0x7ffba5fccc582⤵PID:4188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1848,i,5167881076683725184,5897595207759256404,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1832 /prefetch:22⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2148,i,5167881076683725184,5897595207759256404,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2192 /prefetch:32⤵PID:3096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,5167881076683725184,5897595207759256404,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2440 /prefetch:82⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3048,i,5167881076683725184,5897595207759256404,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3064 /prefetch:12⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3060,i,5167881076683725184,5897595207759256404,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3104 /prefetch:12⤵PID:1620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3672,i,5167881076683725184,5897595207759256404,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3656 /prefetch:12⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4784,i,5167881076683725184,5897595207759256404,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3308 /prefetch:82⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4712
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD536cc3457f14599d615bd72934a97440d
SHA11af988ceffbc5671b2ab8545c33ed1a9feb61f8c
SHA256635e71d0c73a684bcc34014da34e1745033a5812407dfddbc4bacae36e494a0c
SHA512654fcaad7d02d5228506996b0d6f70f03f2109fc08fa09d875b6af7fdf5d47bdc50defe39bd35bd9837f93a468ca5d2e8f926be9ca9192baf1d7329e51811bd6
-
Filesize
2KB
MD50e746bfc859fb999471e9d1b70edcb29
SHA1acc13d987df81b1af0d6b262fbd81b34677952a1
SHA256add7bb5e2125c0788c08ded3b1b45908e997b37eea8c8ecb47d9703248d7a67f
SHA51284c6afabe223cf18f461b922c8a6c585f77374ec9ce941347782361c963d2b58748b796c891f87e28531ef935c94a28c0d7680462b55358ab57e424617703f9c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5cae93dfb098a607055246e3a5b3834f7
SHA17117cb3333b60954cc730ded04ea154b0bf52b31
SHA256b1f7077a4fdeba743d0918438c20e7e8027341ba74f1d56f2056466d48e28e4e
SHA512bfede53cc14b8b966d3576be9a926a658d85ead78daa95e7c051e66cb88e5bd81004ea3744185b67fa0337d07c7289605ac73bb0f8134198a5016638eddd4ee3
-
Filesize
690B
MD5d2636979e2f1097af8ee01abb5da3195
SHA1bd967ae562f988d63b10beafd0d60bec8ab0f938
SHA256e7e2bed33514c16f7f0b14499bb4b4847f83e9a40d10841de57a619af1540c61
SHA512d81cac09fda4616dbc328bed5e25168f81a08fa0616214614f1ff0bbada19f90beb70922f45acde5abf6094a3584282490d20b78d0985c4e4d9bdb628b1c13d6
-
Filesize
9KB
MD52ea0941c51cc2b16f4da316185cadfc2
SHA1abd8f1e5421f069467c747b1e549e1d08054dedd
SHA2561957d4da52adef6c6d45db0d81238e396655a0f5b180edc7b06065770b070107
SHA5123f08f2a3b0ebd0f9653d0bf444c541e4abdac88c9f56d24a7679c37cd1e0c014fb3d267fce99f0b7c112caad19129582b6fdb5eba2531b2c61d49db29fe860c6
-
Filesize
9KB
MD5cb28fcfc31b0df1c87d32f4ee8143b30
SHA1cd4ecabda0a289cdbb7614723407ba0a64ea9ab3
SHA256e6ba8e816ce4eac741e38859781dda6ac3dd02e90116d8281c7433f17a37d7dd
SHA512466cebb5ea668ffe9598983ad6cd2b167a4439fa5b3f42ab74fa1c03f70453b93cc8e137e33861be12cca19ad33f234b4c39d72a01afa97ed4a84595b4bbb193
-
Filesize
9KB
MD54211aa1f966476982e0d7601e98b97b6
SHA180a7a989169ce89293d2b3b1ea328ff2019ff923
SHA2560c9f17cd33b18d101b7ba75e93f1d2854e0dedd2221e91ca2a1a1e682c71be1e
SHA512487b4b35263c751da5f0341c9324f1751441ff24322710810254cff6521cf1400751572a1547072841bafc112da0d5bf5f01908d056c46541a05aebbfdc3f8a7
-
Filesize
9KB
MD58a02ccea9995034edcf1e24ea5297a7d
SHA164fc9d9a20aa355f3840a5a943cfc2760bfd7712
SHA256a17aeb0eaab2b452ff087e9d83c4ab26473a8e9188c3a3bb84985c94af88b0a5
SHA5121ec64965c8377280ed3f4ee67d071adcb094ee5b5d81b74aada0712c2aa2c58ca06d523224bffec8609ae103c70644748e7412cc9843fbd933e870b9bc9952cb
-
Filesize
116KB
MD5c7964fd45c1df3447e86714d509084c6
SHA1adce0979cc3a1ad0b717bc43cf636d8cc2dd5de6
SHA25614428058e53a3cfa6c469fff8cf48dbd8d19de84f42621c9c8bf7e1ad9406291
SHA5123bf236bd888061b5074560cb15c43e0ac9f3b000112f3f1c6aec46850340fd1a5b59c26aeb51ccea596106bdca4ef7dab3aafdad5f2f8b5856939ac31cb443bb
-
Filesize
116KB
MD5ded585ad8e5465cbfffe9d47edba5849
SHA1b2dc62433f3ca045e08d6bf16c4f9fecfce0558f
SHA25652980b12aa5418107dd639da3ef1e02ae143efaa345613dda14a583d1d7608c0
SHA51287e733098487a09ad2cc2716db998c73f094acd472b10a10fcf586b9fd3a97d278b393a526344ac813905a464ef65c2fb6c564466604b7451015c876326fdb74