Analysis
-
max time kernel
19s -
max time network
21s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://eye.globberry.telcos.world/c?p=wAbNB4zDxBA90NXQlXp0fkbQztCUM9DX0KzQs3V1O8QQRgnQwGUTc0cq0LAxPzfQtwoSXdkjaHR0cHM6Ly9nbG9iYmVycnkuY29tL2FhYS1zb2x1dGlvbi-4NWE1MzY4NDRiODViNTMwZGE4NGQxZTUwuDYyMDI4ZWJjOWZhODk3NWJlNmE4ZTZiNMC2UDhwT3dXellSeU9Cd2huQzJHSnB3d7pleWUuZ2xvYmJlcnJ5LnRlbGNvcy53b3JsZMQU0MjQuCzQkdCHM9Cx0NTQutCO0KNo8zYv0KUI5UVV
Resource
win10v2004-20241007-en
General
-
Target
https://eye.globberry.telcos.world/c?p=wAbNB4zDxBA90NXQlXp0fkbQztCUM9DX0KzQs3V1O8QQRgnQwGUTc0cq0LAxPzfQtwoSXdkjaHR0cHM6Ly9nbG9iYmVycnkuY29tL2FhYS1zb2x1dGlvbi-4NWE1MzY4NDRiODViNTMwZGE4NGQxZTUwuDYyMDI4ZWJjOWZhODk3NWJlNmE4ZTZiNMC2UDhwT3dXellSeU9Cd2huQzJHSnB3d7pleWUuZ2xvYmJlcnJ5LnRlbGNvcy53b3JsZMQU0MjQuCzQkdCHM9Cx0NTQutCO0KNo8zYv0KUI5UVV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133818385033311563" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3296 chrome.exe 3296 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3296 wrote to memory of 428 3296 chrome.exe 82 PID 3296 wrote to memory of 428 3296 chrome.exe 82 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 4288 3296 chrome.exe 83 PID 3296 wrote to memory of 3688 3296 chrome.exe 84 PID 3296 wrote to memory of 3688 3296 chrome.exe 84 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85 PID 3296 wrote to memory of 3888 3296 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://eye.globberry.telcos.world/c?p=wAbNB4zDxBA90NXQlXp0fkbQztCUM9DX0KzQs3V1O8QQRgnQwGUTc0cq0LAxPzfQtwoSXdkjaHR0cHM6Ly9nbG9iYmVycnkuY29tL2FhYS1zb2x1dGlvbi-4NWE1MzY4NDRiODViNTMwZGE4NGQxZTUwuDYyMDI4ZWJjOWZhODk3NWJlNmE4ZTZiNMC2UDhwT3dXellSeU9Cd2huQzJHSnB3d7pleWUuZ2xvYmJlcnJ5LnRlbGNvcy53b3JsZMQU0MjQuCzQkdCHM9Cx0NTQutCO0KNo8zYv0KUI5UVV1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa5c1fcc40,0x7ffa5c1fcc4c,0x7ffa5c1fcc582⤵PID:428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1896,i,12770618516165949048,1642255306181194855,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1892 /prefetch:22⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1876,i,12770618516165949048,1642255306181194855,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1968 /prefetch:32⤵PID:3688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,12770618516165949048,1642255306181194855,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2424 /prefetch:82⤵PID:3888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,12770618516165949048,1642255306181194855,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,12770618516165949048,1642255306181194855,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3688,i,12770618516165949048,1642255306181194855,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3656 /prefetch:12⤵PID:3324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4732,i,12770618516165949048,1642255306181194855,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3356 /prefetch:82⤵PID:3280
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4652
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD503ae9ceb1ec5d730fdc648bda9b6b496
SHA13b069b4436671d6a6ce82ad339187a34c603b01f
SHA2569d4b889fb1fb69d2791ccaefb8691fc1214008c9ef0aec7f3547f9ede0527910
SHA51207c158799c0ad60894f5c34d0fb873f96aa951a081eac61ed70fb37cf7deb448910c941c5038b6c36eff98221ddaee230666beaa1acd29bd08a3726cd5dac28f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
845B
MD5fda0f42dd27390b7313f1d6977d155c0
SHA133a364a1a674fa46ea1aee5e6a48a4b8dbb2f22c
SHA256afd647555799f748ea551fe6e6dc96f50b02dadaf089f6a70314128726245f49
SHA512c41e8dd143459465bafad9f8e5a3ef0091e2a3f470a0aea22bd310c465b261617c4504394809d93060d7acc7935c1d031b6dcbffc27ae3abab1dd6246e317457
-
Filesize
9KB
MD5f5049b7c94193fe54680a9c34ba4ea45
SHA17adf443a3dfb20afdcfcd791e1836ddba004ebbe
SHA2565d4e03e6506a5fefea426b8a8102d64485d063f6bb7b95c567a793be9b9d67d0
SHA512741278f244aeaf2d7c0a06ba7aa6ba1bd30960863e86701a87e43d3edfefddd8e480b7dd64ef942ea365b1e8062471980ef90a1dbab8fb48aff3b89f549cbf20
-
Filesize
116KB
MD532497accc74555d873fc5a98be481cbb
SHA1639e778a42a39c83b5d7f1c9c029cb06937eea72
SHA2563f2db402954100ccfdabe77f23e1e096ea164a3e7225f4b3314f0585f3cb1727
SHA5123783545013fffb85df677190350ebe7d6a7e5c1c01d2d1af02df7ca2257fa1dedf5b2ab6687ceb87cc5d5c9707700d53cb491061df841422727ae63e72b4267c