Analysis
-
max time kernel
127s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 06:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://104.26.2.69
Resource
win10v2004-20241007-en
General
-
Target
http://104.26.2.69
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133810516001220695" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3828 chrome.exe 3828 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3828 chrome.exe 3828 chrome.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 3828 chrome.exe Token: SeCreatePagefilePrivilege 3828 chrome.exe Token: SeShutdownPrivilege 3828 chrome.exe Token: SeCreatePagefilePrivilege 3828 chrome.exe Token: SeShutdownPrivilege 3828 chrome.exe Token: SeCreatePagefilePrivilege 3828 chrome.exe Token: SeShutdownPrivilege 3828 chrome.exe Token: SeCreatePagefilePrivilege 3828 chrome.exe Token: SeShutdownPrivilege 3828 chrome.exe Token: SeCreatePagefilePrivilege 3828 chrome.exe Token: SeShutdownPrivilege 3828 chrome.exe Token: SeCreatePagefilePrivilege 3828 chrome.exe Token: SeShutdownPrivilege 3828 chrome.exe Token: SeCreatePagefilePrivilege 3828 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3828 wrote to memory of 1088 3828 chrome.exe 84 PID 3828 wrote to memory of 1088 3828 chrome.exe 84 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1988 3828 chrome.exe 85 PID 3828 wrote to memory of 1280 3828 chrome.exe 86 PID 3828 wrote to memory of 1280 3828 chrome.exe 86 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87 PID 3828 wrote to memory of 2464 3828 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://104.26.2.691⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb4301cc40,0x7ffb4301cc4c,0x7ffb4301cc582⤵PID:1088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2072,i,9952455024596271093,10348977617013944557,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:1988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1840,i,9952455024596271093,10348977617013944557,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2112 /prefetch:32⤵PID:1280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2052,i,9952455024596271093,10348977617013944557,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2224 /prefetch:82⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3044,i,9952455024596271093,10348977617013944557,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3064 /prefetch:12⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3048,i,9952455024596271093,10348977617013944557,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4632,i,9952455024596271093,10348977617013944557,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4644 /prefetch:82⤵PID:2492
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4572
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5ef627a332729fd6d88c233d39f5d1631
SHA1b548015de3da73c3e1a53b43cc8461f1dc75783a
SHA256e1fcc3dcb07f5a4a7c038c7f2e4b76a021c25205da3e57434bcec6969c179c21
SHA512f6e5680bbb54bcd36f439b3dd63ecbf985b8d7656206125739ccff1105bee806a91038e9c715912231177a8b04e8445a3afda957387f391372f97d9dfa684f2e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\137cb0e4-90e0-42b4-b212-8c7160334a8a.tmp
Filesize1KB
MD51cda4d7d6a84a671b47bd251f9c7cf17
SHA180b68e32c54ccbe79313e675f2df45513f620104
SHA2564686ec7817013ff64048cee5f90e715529e1d1b523229aad9ceb2872264fc8f3
SHA51296b95e4c45c9f0b50f1741bc1ea11bc8a9b9eb8e299f915e779a1f910715bb8e0f46439f4331777ee9603c2ac42fcb06624906fe632ba108a14d012c29119bc4
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD5fb15de0940258a956045f9397bd54c49
SHA18999d40e773e2299ac755d7aa0e242943026826c
SHA2565e38c72d368f8fb1c453b3fc3698b9cdfa386e75f7aef73745f99966cab33f77
SHA5122f57ea47b747f764b6a08761c9d14ed2ea85cc616668d6b4cd25506afa490b842c5659ea8e56324ca6abc9ed18b5b9ddd3588e0a37977491904b96851819d711
-
Filesize
9KB
MD529ba530091f1fb29cadfc31c39b17c1b
SHA150bf2702b478e23f2afb4d8e112d259a93a594af
SHA2566e953b21e0e36c792b82f6710e63e0a08d0ffb11258066fedb600a0833fccb8e
SHA512bdbad833bf78b7bdec43e92c43ee0ac66adab8223ff4d28d57c78c66be53ed0da4cd4ed9c011cd316e00274b961c781414c8e94f2686ed153413ab44b17b025b
-
Filesize
116KB
MD56f6a67fa314a5f3991c0ca86dadc430a
SHA188e31f902a997b108c9859042fe62e0e7acbc251
SHA25617c1145837ebbf15db162017ebf816adf7c68a2a4736df4f12c7493c34c46440
SHA512b53102a3228beff8a6918c1f954771b62fba6517d8aa1f13fa72a4a58419560565b30143dd583a73a581db2fadad483140f6a9ae6fdca36e7e9a31310bb51f14
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58