Analysis
-
max time kernel
13s -
max time network
14s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://depressively.net
Resource
win10v2004-20241007-en
General
-
Target
http://depressively.net
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133818386214563274" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4776 chrome.exe 4776 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4776 wrote to memory of 2924 4776 chrome.exe 83 PID 4776 wrote to memory of 2924 4776 chrome.exe 83 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4932 4776 chrome.exe 84 PID 4776 wrote to memory of 4500 4776 chrome.exe 85 PID 4776 wrote to memory of 4500 4776 chrome.exe 85 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86 PID 4776 wrote to memory of 3980 4776 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://depressively.net1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe0a3bcc40,0x7ffe0a3bcc4c,0x7ffe0a3bcc582⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1892,i,18350695636423355964,10599591906265595037,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1888 /prefetch:22⤵PID:4932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2120,i,18350695636423355964,10599591906265595037,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2136 /prefetch:32⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2208,i,18350695636423355964,10599591906265595037,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2380 /prefetch:82⤵PID:3980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3036,i,18350695636423355964,10599591906265595037,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3060 /prefetch:12⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3048,i,18350695636423355964,10599591906265595037,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3884,i,18350695636423355964,10599591906265595037,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4460 /prefetch:12⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3320,i,18350695636423355964,10599591906265595037,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3296 /prefetch:82⤵PID:3000
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:836
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD54272b0a2d1898b5648002241760623aa
SHA1a715593471166091c55c62290ef82fab80599023
SHA256ae3f112c7be5612af2d7ebbd5b8a0390413bac3df2dac495ce221474ef7cdb32
SHA512dbc09f6d04fd9ca38328b964c66c2d5902142f768ebf1b6e5fb92afcefb3e2285b60d07dfa373729b93fd2f06c027fa1c3bfb8e7646dedd8ab34802ac4ac0ca2
-
Filesize
1KB
MD516b777984875eee2232197d4331ce1bf
SHA1e35fe494020070ddecc147c509d1e3011783a9c1
SHA25621bb664a95edb7a6fa0d2b00880ede48a36d031be05f63e7fcea2b49ee16c8fc
SHA512209a01f5c5959b4a638e4b6d0967d0e2243d21b7e6f9420d310277c30164bd5fbb5016c34a1ad92d4e286230dabf05ca0972f64ffed03f8ec8efb805e162851c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD55df4b1fea831b803557e586f42ccb258
SHA1b4f1e16557ac0bbc104628b099e480ed03de2deb
SHA256b1b5f6985280c323c4bb14aee91d12775d58d66312e581d479c0e392e97c5dab
SHA512d96bdb58e817e80cc5d598cee0cb1655e56be1d9485438d2e0eac7a8c8748fe6a0a4ff05c753ffc3e6c86aea896cb8f5db2858c9e06e862cce87340681397b0d
-
Filesize
116KB
MD55e8e55c58045b723656f1c9a22f72316
SHA1b81b54732b064dc6e32e5b5388c59a484411cad0
SHA256e47ca59e048347db7a40dd54b6dba08c9f2a746228665bb6368b4866c8073e3e
SHA5122d32347875ced679249e978ec7ff00bc909686ce8ef52a49e77dadc11fbdd7876cd7803f5c1813421de6d2e3520b3cdaa93ad6e7d4967c46d792198879838cf9
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58