Analysis
-
max time kernel
16s -
max time network
22s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 03:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://pentagon.cy
Resource
win10v2004-20250314-en
General
-
Target
http://pentagon.cy
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133877776234795557" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4372 chrome.exe 4372 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe Token: SeShutdownPrivilege 4372 chrome.exe Token: SeCreatePagefilePrivilege 4372 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe 4372 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4372 wrote to memory of 6088 4372 chrome.exe 87 PID 4372 wrote to memory of 6088 4372 chrome.exe 87 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 5236 4372 chrome.exe 88 PID 4372 wrote to memory of 3684 4372 chrome.exe 89 PID 4372 wrote to memory of 3684 4372 chrome.exe 89 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90 PID 4372 wrote to memory of 1032 4372 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://pentagon.cy1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffdbc82dcf8,0x7ffdbc82dd04,0x7ffdbc82dd102⤵PID:6088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1988,i,5966157091347633180,4538494126772575534,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1984 /prefetch:22⤵PID:5236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1548,i,5966157091347633180,4538494126772575534,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2200 /prefetch:32⤵PID:3684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2348,i,5966157091347633180,4538494126772575534,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2504 /prefetch:82⤵PID:1032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3076,i,5966157091347633180,4538494126772575534,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3108 /prefetch:12⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3080,i,5966157091347633180,4538494126772575534,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4280,i,5966157091347633180,4538494126772575534,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4296 /prefetch:22⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4284,i,5966157091347633180,4538494126772575534,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:5832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5196,i,5966157091347633180,4538494126772575534,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5136 /prefetch:82⤵PID:5468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5200,i,5966157091347633180,4538494126772575534,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5588,i,5966157091347633180,4538494126772575534,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4808,i,5966157091347633180,4538494126772575534,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3124 /prefetch:12⤵PID:3416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5244,i,5966157091347633180,4538494126772575534,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:4508
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5299775127e1464d1cedc3afb18da5b32
SHA131ef225b77e659394bf8ffc88640b5cdf6b038fb
SHA25630625f0640257e48099c2e588447c4bb7e7faaaaf50c1e9f1facfdecdc6277cd
SHA5123ebfc2a1de295ea45a6d7495ac8be5e4a1f257e801ec103d8a6add0474d55ac39a28eae52a90958157e2a2f61333b1adc822c0335047b21c5acefcc63b0a27ca
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
10KB
MD592543c57c7638acb0c64039e3cc95067
SHA12b1d032a96fc375c8e7666bdef595a398db0b1e9
SHA256e013439efb801040cbb2aa0ae5b8dee80a6d3d862f7ede5b93973b33f508347f
SHA512be15dcbb6f71a46ea732c10deeed1ddd89d8b4d84a58df33a92aa7580b39a00826bd6311d1c798fa1d48530162c1b158e99b2dc5ea2fa6bd1d47dbc98b47e9ed
-
Filesize
15KB
MD54865523dfbe62a2d17bdbcc426d6deba
SHA1c6e849ffef3035d7e069923652f90c68f686206d
SHA2565d511999212f1e6d398dd54480ab00f7ac2b53006d7925d2c515c429f9fc9c6d
SHA5125fbe07cb1566867356fa796987ce8011e9333c7f1647bb61796672da514eb2084db54f07e47ba08fbd39e72eccfde7fbd60991c79733a5a5c7e724ca6e189499
-
Filesize
80KB
MD5f7d484f91215cc1134bc99e28c8d417d
SHA179cf378239ca82fd779c738acd57e962fbc7b11e
SHA256bdf4a0ca772e2beaf153651371d6ff4ea0464316c05b442b2e6219a92fb0f861
SHA5122c4087c7d3074a53afa2aac6514cd9cc83148829692a11bff75fe506b325aef651d4a7a7101fd39424232ed03a5f9d5db732e5d643cd4d2ac42b5afe7079a2bf
-
Filesize
81KB
MD52823b1adf0eb3171c39b58a49dd61b52
SHA1d2cc7b7a24f5d07f356c8303b23c54954338baea
SHA2569cc9ea5026461ed1943038fb0d8b895114a8b4f95a84cd0c4f2f782c35fe0a9e
SHA512debaf98e04fd3f74ff98c5b8742874f4c046887004fcd269ffb19d20ee6e7b61482e97798c46d23c9a3d7657ca9b22b5949bc44595a2a51fead94e94e79010c1