Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-03-2023 13:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://qowfcgwnjl63f81016739d5.segopet.ru/
Resource
win10v2004-20230220-en
General
-
Target
https://qowfcgwnjl63f81016739d5.segopet.ru/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133223266672042297" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4912 chrome.exe 4912 chrome.exe 2452 chrome.exe 2452 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4912 chrome.exe 4912 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4912 wrote to memory of 4628 4912 chrome.exe 85 PID 4912 wrote to memory of 4628 4912 chrome.exe 85 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 4584 4912 chrome.exe 86 PID 4912 wrote to memory of 660 4912 chrome.exe 87 PID 4912 wrote to memory of 660 4912 chrome.exe 87 PID 4912 wrote to memory of 3440 4912 chrome.exe 88 PID 4912 wrote to memory of 3440 4912 chrome.exe 88 PID 4912 wrote to memory of 3440 4912 chrome.exe 88 PID 4912 wrote to memory of 3440 4912 chrome.exe 88 PID 4912 wrote to memory of 3440 4912 chrome.exe 88 PID 4912 wrote to memory of 3440 4912 chrome.exe 88 PID 4912 wrote to memory of 3440 4912 chrome.exe 88 PID 4912 wrote to memory of 3440 4912 chrome.exe 88 PID 4912 wrote to memory of 3440 4912 chrome.exe 88 PID 4912 wrote to memory of 3440 4912 chrome.exe 88 PID 4912 wrote to memory of 3440 4912 chrome.exe 88 PID 4912 wrote to memory of 3440 4912 chrome.exe 88 PID 4912 wrote to memory of 3440 4912 chrome.exe 88 PID 4912 wrote to memory of 3440 4912 chrome.exe 88 PID 4912 wrote to memory of 3440 4912 chrome.exe 88 PID 4912 wrote to memory of 3440 4912 chrome.exe 88 PID 4912 wrote to memory of 3440 4912 chrome.exe 88 PID 4912 wrote to memory of 3440 4912 chrome.exe 88 PID 4912 wrote to memory of 3440 4912 chrome.exe 88 PID 4912 wrote to memory of 3440 4912 chrome.exe 88 PID 4912 wrote to memory of 3440 4912 chrome.exe 88 PID 4912 wrote to memory of 3440 4912 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://qowfcgwnjl63f81016739d5.segopet.ru/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb0c0e9758,0x7ffb0c0e9768,0x7ffb0c0e97782⤵PID:4628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 --field-trial-handle=1832,i,17297318985822131472,7544147119168477027,131072 /prefetch:22⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1832,i,17297318985822131472,7544147119168477027,131072 /prefetch:82⤵PID:660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1832,i,17297318985822131472,7544147119168477027,131072 /prefetch:82⤵PID:3440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3148 --field-trial-handle=1832,i,17297318985822131472,7544147119168477027,131072 /prefetch:12⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3168 --field-trial-handle=1832,i,17297318985822131472,7544147119168477027,131072 /prefetch:12⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5132 --field-trial-handle=1832,i,17297318985822131472,7544147119168477027,131072 /prefetch:82⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 --field-trial-handle=1832,i,17297318985822131472,7544147119168477027,131072 /prefetch:82⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 --field-trial-handle=1832,i,17297318985822131472,7544147119168477027,131072 /prefetch:82⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3724 --field-trial-handle=1832,i,17297318985822131472,7544147119168477027,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2452
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4468
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5431c014fbe15dd48224bc871a6e070a2
SHA1956bca1f22bbd459cc8da70de6f8a7090c9c6101
SHA25658857da4b7a9bf2c3bd4efb6779420cbc069a1abd4c60bfc1323483a8ad72cf1
SHA512194cb3035ab29b70fe147a11f4526172e226bbe27832e7393ed03bbd37bbe16123107154cf62c200b4e5eb2a27ce31df0b7868371c104a08b3b03737762fc9c4
-
Filesize
96B
MD5dd6b4b3072cf79275d6badbc3a868e06
SHA184b1d5d3ec6ad3e5561d75c3ee6110ea5db49693
SHA256c0c6645d573d2ba3a21c60d275ae9cf0a5fac5f870b25f63cce0df7f632ba50f
SHA51210591ba7e6e3193436eb062033b56153cb9bd627dd4fad91f751d64f49816a036f437252aeda33a3398543a4d7fbf1064361a868bf37d76a48d5b128743535d8
-
Filesize
3KB
MD5e2b2f16cbac30634e1f82b7c4b412ae1
SHA18c056871af3346e613eec0a9b11c5b64a53341fa
SHA25614b87d70f74f2e9bfbdc925dbafcffe03d3fe6b63099d919d898d08e15b19094
SHA512eabc54c9124d08d62b0e3eab3e9a9b631beef513e55926fcd06df3a26e1ded2ee10c15e606e00f8c1e01ee4f16ed399086e82e072626c868b934e8128c63a731
-
Filesize
873B
MD575dbd845248c6b8292ba968c919656ae
SHA190db3d39ad65dd6de2b89c58f9513e6bff93d3af
SHA2568e3893606132a734fc50b5f8112b1fac2bd5b8a393b35088c165933320d05846
SHA51216bbab343b98cee913186d3e5394057d2041506c71fbdd5565af56a82afc0a5cb7d6452f3ab63c29d0598d7cfbb114458d6b06070fd517442f61ca57193e0c33
-
Filesize
6KB
MD5507abedc3bbf7d9c1314a02b7aa93c46
SHA185d407c957dbe28253ad7dcef98cf87dbc891ed1
SHA2560c32bfa336ba267ee1939836efcdb5633114b469c7ce0201c64d3d5eab3508e7
SHA51236d3f7328ad07bd6bdc0e54e657cf1a27fe651d12c62b8126639b8ca81edf7c95bce19364545d1d955ffcb57bf740cf91db005bed108b590c70df151e5d57cee
-
Filesize
6KB
MD52dae44d04a2d14e1309d7d0a7ee204d1
SHA1354fe6ed4a8f00230beb194d495d9fc6d862603f
SHA256636de5f3ef45dcf9026ecd05bd8466a912a64a9ef4ed47367d95c6927b59692b
SHA51237d04a7052d711feb38daf3220b9b60cba965f77f57a9be57eceffd041a6c65b498c0448403f13ee45e0b4a5c33868e6c5ca750da8b1bd718fdb84fbb6b1d4f9
-
Filesize
15KB
MD5e3601cb73cefc212b7e8b15a5f4eaded
SHA10316530218cd0a642ddd089196cff300ee06e74a
SHA256f30105bac0cd010c4cf4336b8ad9c3cb07f464c6231b51240fd66b0fbbf5ff77
SHA512571de9bbc80a9750d3b78e700ac293b1a5124d0053d0fd8e43d14b338f225e94ef0c3499578b684183f0aad2b1b92f7b1ddb7cfa55c4cd16cde39b6f5913028e
-
Filesize
142KB
MD5dca8ce713add37af8a58758ff70ea126
SHA13d175eac951dd3ced59ec57df3c2e6a13487e562
SHA2564ed58e25c222ae7445aa73cb15eb3b764fc771a22d0187a94f0db052caae7a75
SHA51281de9cb923b441fb1f5e369936f5755a445cc357f01385b0e2c4a7d0dfffe5fa7c298fec3711d9b1926adb3cf65caed586eee292a2f92ddb8dbd7d9dee70df67
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd