Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://live.uncody.site
Resource
win10v2004-20241007-en
General
-
Target
http://live.uncody.site
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133818379516378859" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 780 chrome.exe 780 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe 2264 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 780 chrome.exe 780 chrome.exe 780 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe Token: SeShutdownPrivilege 780 chrome.exe Token: SeCreatePagefilePrivilege 780 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe 780 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 780 wrote to memory of 4856 780 chrome.exe 85 PID 780 wrote to memory of 4856 780 chrome.exe 85 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 228 780 chrome.exe 86 PID 780 wrote to memory of 1088 780 chrome.exe 87 PID 780 wrote to memory of 1088 780 chrome.exe 87 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88 PID 780 wrote to memory of 2684 780 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://live.uncody.site1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc1efacc40,0x7ffc1efacc4c,0x7ffc1efacc582⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2008,i,5803576040066582016,12834090898275091139,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2004 /prefetch:22⤵PID:228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1752,i,5803576040066582016,12834090898275091139,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2256 /prefetch:32⤵PID:1088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2276,i,5803576040066582016,12834090898275091139,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2336 /prefetch:82⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3032,i,5803576040066582016,12834090898275091139,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3068 /prefetch:12⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3036,i,5803576040066582016,12834090898275091139,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:1072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4520,i,5803576040066582016,12834090898275091139,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3764 /prefetch:12⤵PID:3928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3332,i,5803576040066582016,12834090898275091139,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4392 /prefetch:82⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4660,i,5803576040066582016,12834090898275091139,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4828 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2264
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1200
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5f1cf0225e06486efbb8be073dbf0c023
SHA1b5f4f4c8f5823147ccfbe3decbf6d8c0b27da19b
SHA2564a62ff331ea72baabddd562baf0cbff6922e09225ed5ecca98142b1fa1d62161
SHA512273046eb36ff4e6554b7c34222876e267da8b7b4f4d0a8d4116b23cc700a78e79e2f527f9c68951839eb982c063ee2c5b578402fbf1c4f94703b6ed36a8c523f
-
Filesize
120B
MD51f2e5e0f10eb2caa9a1e4736dbcb3f26
SHA16f8de1969b3efe95df740eab6bec3156ae2b0964
SHA256b857be2e0f31637656f089bd007b4a9da4e1fbd0a91d6905bfa9bcbd1b1f64e3
SHA512e66a7f51d68d7a043f8bb5f59571f5316c3bebaaabc9362cc7215585003c9bb0c1bd73ddf450528c7e506f5a94c55713f615ea2de16acacad9c705417844ff99
-
Filesize
2KB
MD58f01b67474cbed5b85039f47c380945c
SHA1146318436f77185833fdc5c988e27d1a7b5730e0
SHA25604b7870fa0b175d3228b213e55efe9c5da2edda94107bf1330edf08609be530f
SHA51277423108ac3b6cac0dca06776fae373f5328f143ae4430befd039d01c79e8898f3aacec0d451857a8055d931272169291e0605f6aa0a65769b27e0a15101372a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD58497edad479ddf357126bcf8882af983
SHA15a0f82e896d09e3e80bd7f84242ddf0349cc538d
SHA256e55fbd0e016287b14ed63e59c979152a433af634747340f0b394371bf621d1f6
SHA5122098af67dd131bb6541a707f74d2d68624c7ecca72a4a3008534d41478d333c91a6d995840fbcd4cc81312845ff8bfd4caf50fb58576b5b0afe0066a76833853
-
Filesize
9KB
MD5e4d4a1d5839a325b85fc5624df1e6a81
SHA1480e1611e294e5cb456a7b7a7ed019dadfc6f6e4
SHA25685c7f107f1f9e378595471dcbacbc88d342fd89aaea54aff1c9ce2c4d6991da2
SHA512ade83d5fa518707da9168c24daa985da833f6c500f83540046d6353942bda341d97cd54373c62648b54520d496ae377779fe8e2bc09a734083d44be1fb739031
-
Filesize
9KB
MD5bbc57b60dd741bea16558a155b9f5b7e
SHA1f1a56af9f9a96674ed2bc79ad1d9469a81b2f113
SHA25662493926ad5e3bb2cddfbff0b9649bf054c15bded74705b4ee7ba12ae92fa4c1
SHA5129b96bf99d2cebc047e6889cd5936c1c8402813c6b264359c04c071e7e3d09d5abc21c1e9eb3e41fc4d73513cd155cd247b8014d2e0cb32d3610318bd76c0b741
-
Filesize
9KB
MD5330daec6c0678ba872c215db531212bb
SHA150d25da6e94787e4a366db58db339d0e462a8db1
SHA256a3667145bdb3533bc987dd5c57f0f05899110ab4dbeef75df27c8b4403433201
SHA512fd01fd6590ee0e10cac9000112debfc5cda5d9d9271e03fcff066a6156fc04533b75895e4ef3786e29f1451e5ff5eb9f59be91970b743469e0159b976b6cc84a
-
Filesize
9KB
MD562419bd18623980688fe8cf12dc09940
SHA1eb944dfcd2ac92fbf514da81925e36fb27eb343b
SHA2566ca9ead31998641fb65dc1b3e530a415cdcf175e8ec5633e2acab4664f87fb7b
SHA512128a9572a18e4ab960db7040289ddcefba58ed9b8a5cc136d97947c7ea47b1a1c5a11dd47ebf25cd9eec5c77dd0a02bd0cd3384b604ae405b46163ff60ff9c6e
-
Filesize
9KB
MD585e169c1921afd61928ed7aad029a8dd
SHA158d40e1eb776097cd985627942cd7e6779e7045e
SHA256f05e9201f4a7e8fce8ccc18530b4057b1180cc3011cb22a8ecb1e69f7f75edd0
SHA5125247f126d3a04925e7f6c60452af743e054f77ed0115aa3cc075ee0505e4b193ba14ab9a1a14fe86e9651e1944cf37524529f1ae4535520c5ae50e7349d43b7f
-
Filesize
116KB
MD56216294c0e708a7f9d2c9ed3c47dc162
SHA187be8a34c4c1299421d7338571626ea84c034d18
SHA25618a9b393904daf0cb9ffbe7a1c1db5db41264a54a911830cc95b154c7f5d8486
SHA5120c03ee5283db44a3df7cc45521ad93dd433e6ca40df0ce4f0d96c99cae4adb69e8ac3bed81b631993de6572be1dc6b88fb28a80f4682dd7875ce02adca68e5f1
-
Filesize
116KB
MD5cebabcafab1ccafc530c544fea06f887
SHA1326aebbe91cc3244875cf8fcb6454766c44bd8af
SHA2562666d8cb9f0a74d5f4ea497b6336afd8f69305a2d1a191d8ab027ad2ebe8d108
SHA512abaa7818db4eb0c45098cadbe9a29bd8496e3bcdc7ccb929969c43d2488fbb4aaf30346afe58f1975773aac27ee7b5754b1108fc2c17753474563dd19508dfa4