Resubmissions
30-06-2024 20:35
240630-zdbd7avcna 130-06-2024 20:34
240630-zceefsyajm 130-06-2024 20:31
240630-za4lkavbqd 130-06-2024 20:23
240630-y54dlsxfpk 7Analysis
-
max time kernel
5s -
max time network
61s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
30-06-2024 20:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1186715831414030426/1256963554695839775/Aristois-Free.zip?ex=6682ae08&is=66815c88&hm=77f5c9baba2f9ccc16ddff763ac3b30e7a9d971d63713c1db9091d52423942cd&
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
https://cdn.discordapp.com/attachments/1186715831414030426/1256963554695839775/Aristois-Free.zip?ex=6682ae08&is=66815c88&hm=77f5c9baba2f9ccc16ddff763ac3b30e7a9d971d63713c1db9091d52423942cd&
Resource
win10-20240404-en
General
-
Target
https://cdn.discordapp.com/attachments/1186715831414030426/1256963554695839775/Aristois-Free.zip?ex=6682ae08&is=66815c88&hm=77f5c9baba2f9ccc16ddff763ac3b30e7a9d971d63713c1db9091d52423942cd&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133642532698055724" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 4252 chrome.exe 4252 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 4252 chrome.exe 4252 chrome.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
Processes:
chrome.exepid process 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4252 wrote to memory of 3660 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3660 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3936 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 652 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 652 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3452 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3452 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3452 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3452 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3452 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3452 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3452 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3452 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3452 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3452 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3452 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3452 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3452 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3452 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3452 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3452 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3452 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3452 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3452 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3452 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3452 4252 chrome.exe chrome.exe PID 4252 wrote to memory of 3452 4252 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1186715831414030426/1256963554695839775/Aristois-Free.zip?ex=6682ae08&is=66815c88&hm=77f5c9baba2f9ccc16ddff763ac3b30e7a9d971d63713c1db9091d52423942cd&1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff84ea69758,0x7ff84ea69768,0x7ff84ea697782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1504 --field-trial-handle=1736,i,2237682267774802573,4221398526594926405,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1756 --field-trial-handle=1736,i,2237682267774802573,4221398526594926405,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2044 --field-trial-handle=1736,i,2237682267774802573,4221398526594926405,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2992 --field-trial-handle=1736,i,2237682267774802573,4221398526594926405,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3040 --field-trial-handle=1736,i,2237682267774802573,4221398526594926405,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 --field-trial-handle=1736,i,2237682267774802573,4221398526594926405,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 --field-trial-handle=1736,i,2237682267774802573,4221398526594926405,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3720 --field-trial-handle=1736,i,2237682267774802573,4221398526594926405,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
-
C:\Windows\system32\notepad.exe"C:\Windows\system32\notepad.exe"1⤵
-
C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_1.4.101.0_x64__8wekyb3d8bbwe\Microsoft.StickyNotes.exe"C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_1.4.101.0_x64__8wekyb3d8bbwe\Microsoft.StickyNotes.exe" -ServerName:App.AppXqx982emnayc5vbja1mrpk9zh4r774nd8.mca1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5fc5910c1b5acde1762f70920095a4778
SHA1aa184ec26adddad4fb2953b68669f9adffb83091
SHA2565a9beb7d7ee44ef8ba3bb4a8263adf8952eb32cc0e112ceac061df97607eaa8d
SHA512415994cc46aba2ca5aa15fcd3ed00c646995ca8a0f61320ecc2b8af8c0210290c55eac3152d4cb9e69b53f5959375ecafa0ed86b852bc152d964df25ce790df7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD535a2c436e1bab587a9a2dc9c2693b318
SHA12e8c96c5e5aea2769487ddfcbdfecfcfc2c2040b
SHA2567ba43dd8449b2ebf5fc3935551e28e7d539fa6eeb7e63f97c1f30d97d19597b5
SHA5128330b6799b4e9b692fad72e2cdf24af2d475cce0c332209905ebe57a199446fdbe0de4ef746093516855f83f7331e86e0bc4136099acc923319bec2e3e783549
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5d6bf333304cbd7861e8002b144a66671
SHA1089a86608e1df545ce1c36b5718e7fa0f5fadbd9
SHA256ea0c634ef31c0f395ebeab844310cfb5d49985d061db6e368332c4144547c61a
SHA5127a109b66fcef46e5f5f9146a5527fb42469014fe867f762364c7639f8c8e56affee6aed24e1cf3766687524476b276bd130bc78e81319cb18506aeadf939496f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
136KB
MD59dd0726d67afd54c26cae1be8d723f4d
SHA17a12d3316b5c8df779d79f45286a623b7e18c75c
SHA25655802d2362c934b7ea4a06a2e74b4f2b530a74c03bae38868994f37d47c3308a
SHA5120741f9143345296f11ee851cb21a25d60eb1d64c3dc26cfc1452220ac5fe9c48014f05c2a76cc9b9b0c24a590725af4a14326f6dbad945d7a4268224ee333f69
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\Downloads\Aristois-Free.zip.crdownloadFilesize
21.5MB
MD58537b2ac5a6c897da12c9959d322c340
SHA128ab00d626aab3548fede683af79d5a98c0ab81b
SHA2565df9502701b94f552cb3aebfa7dfd357a7992fc4a454751cd39a9f40264cc999
SHA5124d3d5794b4daead32df2b4c3d4d18816a6c9f306103d9cbd996c48f8b9499840e65d6b023bba63f3cd51c2955d241a39de8c99f37e47ff08e11ec1835b6a7072
-
\??\pipe\crashpad_4252_YUMKQAYKXFZEBOAQMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e