Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-03-2023 09:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://handless-fascia.herokuapp.com/m?mid=63b49aae5fc6a80001375db6
Resource
win10v2004-20230220-en
General
-
Target
https://handless-fascia.herokuapp.com/m?mid=63b49aae5fc6a80001375db6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133221400584869500" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2700 chrome.exe 2700 chrome.exe 3392 chrome.exe 3392 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe Token: SeShutdownPrivilege 2700 chrome.exe Token: SeCreatePagefilePrivilege 2700 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe 2700 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2700 wrote to memory of 3720 2700 chrome.exe 87 PID 2700 wrote to memory of 3720 2700 chrome.exe 87 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 220 2700 chrome.exe 88 PID 2700 wrote to memory of 4324 2700 chrome.exe 89 PID 2700 wrote to memory of 4324 2700 chrome.exe 89 PID 2700 wrote to memory of 2780 2700 chrome.exe 90 PID 2700 wrote to memory of 2780 2700 chrome.exe 90 PID 2700 wrote to memory of 2780 2700 chrome.exe 90 PID 2700 wrote to memory of 2780 2700 chrome.exe 90 PID 2700 wrote to memory of 2780 2700 chrome.exe 90 PID 2700 wrote to memory of 2780 2700 chrome.exe 90 PID 2700 wrote to memory of 2780 2700 chrome.exe 90 PID 2700 wrote to memory of 2780 2700 chrome.exe 90 PID 2700 wrote to memory of 2780 2700 chrome.exe 90 PID 2700 wrote to memory of 2780 2700 chrome.exe 90 PID 2700 wrote to memory of 2780 2700 chrome.exe 90 PID 2700 wrote to memory of 2780 2700 chrome.exe 90 PID 2700 wrote to memory of 2780 2700 chrome.exe 90 PID 2700 wrote to memory of 2780 2700 chrome.exe 90 PID 2700 wrote to memory of 2780 2700 chrome.exe 90 PID 2700 wrote to memory of 2780 2700 chrome.exe 90 PID 2700 wrote to memory of 2780 2700 chrome.exe 90 PID 2700 wrote to memory of 2780 2700 chrome.exe 90 PID 2700 wrote to memory of 2780 2700 chrome.exe 90 PID 2700 wrote to memory of 2780 2700 chrome.exe 90 PID 2700 wrote to memory of 2780 2700 chrome.exe 90 PID 2700 wrote to memory of 2780 2700 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://handless-fascia.herokuapp.com/m?mid=63b49aae5fc6a80001375db61⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xc0,0x108,0x7ffc6b0f9758,0x7ffc6b0f9768,0x7ffc6b0f97782⤵PID:3720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1780,i,13351927744140403614,14216483777261650015,131072 /prefetch:22⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1780,i,13351927744140403614,14216483777261650015,131072 /prefetch:82⤵PID:4324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1780,i,13351927744140403614,14216483777261650015,131072 /prefetch:82⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3200 --field-trial-handle=1780,i,13351927744140403614,14216483777261650015,131072 /prefetch:12⤵PID:3280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3212 --field-trial-handle=1780,i,13351927744140403614,14216483777261650015,131072 /prefetch:12⤵PID:4648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4580 --field-trial-handle=1780,i,13351927744140403614,14216483777261650015,131072 /prefetch:12⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4992 --field-trial-handle=1780,i,13351927744140403614,14216483777261650015,131072 /prefetch:82⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 --field-trial-handle=1780,i,13351927744140403614,14216483777261650015,131072 /prefetch:82⤵PID:3696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 --field-trial-handle=1780,i,13351927744140403614,14216483777261650015,131072 /prefetch:82⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2704 --field-trial-handle=1780,i,13351927744140403614,14216483777261650015,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1796
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f6ae32cd028c82af90af40af1bc98a2c
SHA1b8c38a0d6cbc20995ec59d4a80a05749e5e46f94
SHA256efec6f69a20f850897072c07ee74bc8533727c88c495ee66fbd272ed69cfe388
SHA512f1142515d22e9093691dcef620c1d6fe62976533a7f2a3c4358f9be8e36b024fbb745c63d3875a0fbf0c23fd68369b601b825e8299d36f3fdadf79befba2d384
-
Filesize
537B
MD539dec009c1054fa672dd1e68adb69b87
SHA1868c8d9b05465a2b88242919d09068649fae2266
SHA256b384d5c56e432acf9e2e5ba4e95f81b6581ea4e32d01c82c517cf73aa24ae88d
SHA512ebc7f5aa9671b9ec6eaaddb65da5d20bce71797487c973de875d878b9d0bfcc9a96bd28db71d4d95145b523f4e6584b6f59bb8785af9adc9b2c4d8f647114f0b
-
Filesize
6KB
MD5c5e4bc15a75b5ea41201404b68713503
SHA1662e6db6eb39b11ac53a97eb7194c15d60b18804
SHA256bdb4b7b5023189fbb9ffd9bc603a7e74e34052f1e8cdfcd320cc1971bb9b8d79
SHA51296a4e1b65bfba12c2071eb4b4d0d57d4eee2fc5d7f3b6fcfbeb110b3e221ba9c56dab6f410d31f24fc8e368954f69726a37dc3e282bb2dae7710e5a73b3c5978
-
Filesize
15KB
MD5b8826ce4773afa13e6a5c52456ca0b2c
SHA1ac5b6dea4168c39b5fec9d96148be7f1ad865eab
SHA25615fbb9eabb29f4c0bd6532d54e99d8b14ee5fc27f1d748162cda20cd50092f1d
SHA512bd647e17480779dc926e1efb18ef0fef40011168989a76d069d108c5f0dffc3da8a6b3e4506038a2761fe899b5a068d7980bcbfab1ed03de1d3cf39ce20d5bab
-
Filesize
141KB
MD5b80f3aa7a54e2bd39184446b1b640520
SHA1acfb589fbfc2d540e20ce559ac2eb075da0587ed
SHA256b76e9c103d26965f6b281717b9a88839aa969644a2726269d8c0f8e1b9386f61
SHA5120560484c35b691389623061d9863e3cc58b4478c7a4b19de904a0b804826f20ab40c9d7904a49c1fb5f92744789dae0b89efd1565226ca2044e68dbbd99fd83b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd