Analysis
-
max time kernel
19s -
max time network
12s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 19:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://172.186.202.64.host.secureserver.net/92NxN5FNFlFHBE7aVeZGiBcw
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
https://172.186.202.64.host.secureserver.net/92NxN5FNFlFHBE7aVeZGiBcw
Resource
win10ltsc2021-20250314-en
General
-
Target
https://172.186.202.64.host.secureserver.net/92NxN5FNFlFHBE7aVeZGiBcw
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876631060411656" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4300 chrome.exe 4300 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4300 wrote to memory of 5612 4300 chrome.exe 85 PID 4300 wrote to memory of 5612 4300 chrome.exe 85 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 6132 4300 chrome.exe 86 PID 4300 wrote to memory of 1432 4300 chrome.exe 87 PID 4300 wrote to memory of 1432 4300 chrome.exe 87 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89 PID 4300 wrote to memory of 6052 4300 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://172.186.202.64.host.secureserver.net/92NxN5FNFlFHBE7aVeZGiBcw1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe544fdcf8,0x7ffe544fdd04,0x7ffe544fdd102⤵PID:5612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1972,i,14870036840601902870,6684497777406260769,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=1968 /prefetch:22⤵PID:6132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2208,i,14870036840601902870,6684497777406260769,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2216 /prefetch:32⤵PID:1432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2352,i,14870036840601902870,6684497777406260769,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:6052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2948,i,14870036840601902870,6684497777406260769,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2796 /prefetch:12⤵PID:3928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2956,i,14870036840601902870,6684497777406260769,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2984 /prefetch:12⤵PID:5532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4216,i,14870036840601902870,6684497777406260769,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4260 /prefetch:22⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5160,i,14870036840601902870,6684497777406260769,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5172 /prefetch:82⤵PID:4324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=5264,i,14870036840601902870,6684497777406260769,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:5192
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:2832
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5ff057fdee631536c7c0c86a207c1d4ed
SHA1b328816faf17205c856a1959e057f47a7db4896c
SHA256e540565e6b88e91399c8e16eb738987ba49426898634c0a6c4f4bb79b01af8c7
SHA5124a6f2b818bb0cbbef1f3618f7a42706c6f47ca6b7afb66772b5b0abb05b790c3fae016386e4d1fb1e4f2a8473fd421e140dc3b21f922d9c480b570215848d8db
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
11KB
MD5c6d565772f5c7757e8869e1d9c57f568
SHA14f53e55aadc1cec668df8c2b83352f8945d3e733
SHA256e698ba3ed73ab5cbea8036c114948ba4c31030399bad4097e93127b81ff61144
SHA5121852aebf7835c4d2d013e8fca40e5e52d49d4c416a83723980be7bd273ef6fd5cc72a94a74b306aef29e29b3ea81739a40db8ddc0ac5ee89c70930756b7222a1
-
Filesize
15KB
MD5f4c31e1267c5c5c4c3ac135387315911
SHA1a9e58e5140742e0b25395e4eff2019e491c7e21e
SHA256003fbe143f47ac9c60f6ec1c2c693e91b29ee65bc084f63f1b15c2e6b2067a92
SHA512a7cb51df6648f818fefb01b9a845a09d8c630c56448eca38673f1fb135f69c5f7e19d1b92ee433ae098d4e0832e067c811e92d9dbabad15657113fe1ad96ebcc
-
Filesize
79KB
MD5f4b606aff72fffbff08f93ab6ba99dca
SHA1019cc80c08f8b791d6fe42354f20be783d1c79c2
SHA256208679128d7848b4e0673a6863439562a3f4026c22a7a3427453e08f03add0ba
SHA512ddb3f9c4f960d917a069340554a809f9622adf76c1ce18f97e68b02bf01653863708571ab855958d5f4d7cc3794347c5d92ee9b0a06ce4ca77622ed7ec7bb4dc
-
Filesize
81KB
MD55ae6b646cd2c464e39b158dcd525ed44
SHA18d1f8a0bbd44a484dbb881ae0533487c828a10b2
SHA25666d5512f203ee88d7d08a69bcd83cb502b078fe678645fcd53174e8186c9ac88
SHA512932ecec42a1224310ffd1ac2b0e6a15f314351cd0a6dc06267625dd2a49223ea443f448f5f98aceb9659a01efa0b28bb78c6c5ca599f0851d65fbe0a7b7b30ee