Analysis
-
max time kernel
450s -
max time network
452s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 07:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://kmsofficial.org/
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://kmsofficial.org/
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
https://kmsofficial.org/
Resource
win11-20240508-en
General
-
Target
https://kmsofficial.org/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133637745151855056" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 4884 chrome.exe 4884 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 4884 chrome.exe 4884 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe Token: SeShutdownPrivilege 4884 chrome.exe Token: SeCreatePagefilePrivilege 4884 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
Processes:
chrome.exepid process 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe 4884 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4884 wrote to memory of 2152 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2152 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2708 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 3504 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 3504 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe PID 4884 wrote to memory of 2988 4884 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://kmsofficial.org/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc0b34ab58,0x7ffc0b34ab68,0x7ffc0b34ab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1712,i,687446332722487196,8207677702531883771,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1712,i,687446332722487196,8207677702531883771,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2216 --field-trial-handle=1712,i,687446332722487196,8207677702531883771,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3012 --field-trial-handle=1712,i,687446332722487196,8207677702531883771,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=1712,i,687446332722487196,8207677702531883771,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4428 --field-trial-handle=1712,i,687446332722487196,8207677702531883771,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4584 --field-trial-handle=1712,i,687446332722487196,8207677702531883771,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1532 --field-trial-handle=1712,i,687446332722487196,8207677702531883771,131072 /prefetch:82⤵
- Modifies registry class
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
72B
MD59912a86da40f8bc22969886454be2d8d
SHA13e770f8630afb2dc6cd7cf3e32472e4489ca40cc
SHA2568d74fcd6ff74f86ef583f24229539bb2b996e579b78f0b7789fd0d2300c6b707
SHA5127a3146dae0924be3f2582682e356a66b36509a1ec202d45a7d1573d4971488f6f577e0163bb22a58d252944a5e273b1b58e421b50dabccd0b56881f24414c545
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD5def1ac228da22e3e17fa8a1fc9069ff5
SHA1dbde2d7c6019591f91f6a3c6da04970fb0ab6044
SHA256d66e173fd33b951f574475331706668194441808190cc72ca0f6ce5fcf66388a
SHA5128d97ae1e2fd89a7ba749851abb84d4ced76961308f789a7703f1eb2889d2fc5116d3629ba5494ad62b3b213c724c1c76484f80704e6c56f64ec24d1e380422bf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
858B
MD514e75773fc5f319444251a2770720c95
SHA1760d97ba9ffc6ec96101287a752960ec882fedd0
SHA256ce9bcd62330ee3c82d87fbbc0056f08eb00a050c69cc28bd639bfa82e7becaac
SHA5121427c87d90b5381254f944321fc99c537f332ef880113240522782667b4464558188db9e360220de987997db2c6d0b18a265aeeda4b0c468b4c7a11d9d53f6fc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD52c3167566e404a948ca0fa4582711d27
SHA12ad486bdbd18e14aea6929ba6b65630bcc4ae91a
SHA256cb1ce6024ce6ddd5a5dcb6be495c9a29e9ba1f33ef0a96bf3541a644e578a008
SHA512e7b95cf1d110c5fa41dba881bb7fc0605e4414a24691b73608ba9b7f5eadfc630a894dc85caa0030ed914d0848b307f07bd1b5724bc8ca81f360e9b92befb346
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5d87f3d08b3c97e375d509b58e18ec097
SHA10be35e3430877a79f0f4d49b5c3a94e9bc5159ef
SHA256bfa700497b04a317b33a75713cc82bfd08056dd194d004e1814e0a0ecec66c16
SHA5128928673bcae3e4b34e97d5f0762e883c7c0e71cc0758c380f1ca00685f7de893aa71cfd844536f1cf990fb33ad587e19be6eee1e192b827cbd639b47cfe5d634
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
129KB
MD5287eaa7e15a2e5abe8b81d55918d6eb8
SHA1d8e5f01661e7c4f5f6d333a0ce20b093531cc843
SHA2561c3e3a460c74cc1a45cf87340497ba5388526d4356edd6578ff6abc14bd6bb03
SHA512b92b8207f96ee070c16fa9ab450ce2281bfd2e98619f88603ec3c0abe45f26350699c155b3780c9cb81e9d2efd1b44778b4234982ebd5fd244ca1a7727621567
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
129KB
MD5fe07e9d672e1033a6b38f66284581a3a
SHA1a6161c27d01348e6fcfbfcfa6ff41932f4e2f134
SHA25657087211ac5987df62fdaefa7e3b3ba89d021a58aee8a2cbeaf779fa6c91cc79
SHA51226e3a0bd6851aab9bbc0ea0135245c46a8ec60c15659b0db2d481dc44d0e8bef08dd10539e16d583825c518ff9f30db87e7676e0e0f0fc62f361148e6369b9ea
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1Filesize
264KB
MD50f3c80047b980522a62bcdea9c41f5c4
SHA12e6b4987699b33f767d04f32b0bdf162a17deaa0
SHA2560527821e99d8a3afa08d53b9eb5fcacbe1f3fdb5442243fa9ef9eafa2dbd4072
SHA512b2f01cccf217873c6f7315539b0fabf23c1825696b1f5aefd16ec5c02c82f1ef99b4d16637e0d1556337326199394a6f1e05cfde6a9bf91e4847d2ecff9186db
-
\??\pipe\crashpad_4884_UQJTHNOYRLKFMFHNMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e