Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
06/03/2023, 22:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://mobily.fleetilla.com
Resource
win10-20230220-en
General
-
Target
http://mobily.fleetilla.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133226195511742981" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4116 chrome.exe 4116 chrome.exe 2324 chrome.exe 2324 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe Token: SeShutdownPrivilege 4116 chrome.exe Token: SeCreatePagefilePrivilege 4116 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe 4116 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4116 wrote to memory of 3572 4116 chrome.exe 66 PID 4116 wrote to memory of 3572 4116 chrome.exe 66 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 2076 4116 chrome.exe 68 PID 4116 wrote to memory of 4336 4116 chrome.exe 69 PID 4116 wrote to memory of 4336 4116 chrome.exe 69 PID 4116 wrote to memory of 4604 4116 chrome.exe 70 PID 4116 wrote to memory of 4604 4116 chrome.exe 70 PID 4116 wrote to memory of 4604 4116 chrome.exe 70 PID 4116 wrote to memory of 4604 4116 chrome.exe 70 PID 4116 wrote to memory of 4604 4116 chrome.exe 70 PID 4116 wrote to memory of 4604 4116 chrome.exe 70 PID 4116 wrote to memory of 4604 4116 chrome.exe 70 PID 4116 wrote to memory of 4604 4116 chrome.exe 70 PID 4116 wrote to memory of 4604 4116 chrome.exe 70 PID 4116 wrote to memory of 4604 4116 chrome.exe 70 PID 4116 wrote to memory of 4604 4116 chrome.exe 70 PID 4116 wrote to memory of 4604 4116 chrome.exe 70 PID 4116 wrote to memory of 4604 4116 chrome.exe 70 PID 4116 wrote to memory of 4604 4116 chrome.exe 70 PID 4116 wrote to memory of 4604 4116 chrome.exe 70 PID 4116 wrote to memory of 4604 4116 chrome.exe 70 PID 4116 wrote to memory of 4604 4116 chrome.exe 70 PID 4116 wrote to memory of 4604 4116 chrome.exe 70 PID 4116 wrote to memory of 4604 4116 chrome.exe 70 PID 4116 wrote to memory of 4604 4116 chrome.exe 70 PID 4116 wrote to memory of 4604 4116 chrome.exe 70 PID 4116 wrote to memory of 4604 4116 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://mobily.fleetilla.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffc448d9758,0x7ffc448d9768,0x7ffc448d97782⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 --field-trial-handle=1728,i,16466419339404788282,5777428324782986729,131072 /prefetch:22⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1848 --field-trial-handle=1728,i,16466419339404788282,5777428324782986729,131072 /prefetch:82⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2084 --field-trial-handle=1728,i,16466419339404788282,5777428324782986729,131072 /prefetch:82⤵PID:4604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2664 --field-trial-handle=1728,i,16466419339404788282,5777428324782986729,131072 /prefetch:12⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2668 --field-trial-handle=1728,i,16466419339404788282,5777428324782986729,131072 /prefetch:12⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4304 --field-trial-handle=1728,i,16466419339404788282,5777428324782986729,131072 /prefetch:12⤵PID:1444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4760 --field-trial-handle=1728,i,16466419339404788282,5777428324782986729,131072 /prefetch:82⤵PID:3404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 --field-trial-handle=1728,i,16466419339404788282,5777428324782986729,131072 /prefetch:82⤵PID:4324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=1728,i,16466419339404788282,5777428324782986729,131072 /prefetch:82⤵PID:516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 --field-trial-handle=1728,i,16466419339404788282,5777428324782986729,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1284
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD508190bc58d765c24f0beaeeee2a4e5ca
SHA16e654465ca22e175ddf5d1e62fd4a88ab88b5d26
SHA2565f747eb26847e385ba4249ebafbfed4bd847180cef08ddc03b2486ffe76d113d
SHA5128704d0fc9535a22f14313e7125f9c5dcbce9a29f80e3a309b413b0c9009e77747613081816e48bbb604ef878c72fcf854476b2b56f14dbafe57c1623444fa872
-
Filesize
1KB
MD5384e22c62ee902ed2f87d4b07889398b
SHA1191868899bc8c96a84a50c5c31c1a2bb1441ffa7
SHA25606703948b09f4d1bf1aaa919457b8d7e4ae8f1e6dabb45d39722750d32d5792c
SHA5127d3411431b28fc25123cc3bdd9f8e13ff9ad4d9b3b2119ae6a691b42c75cef752242377910b3f1deb26567a0a47c3d11e504083e28f4b4a36a21e000f282988a
-
Filesize
1KB
MD5194a789a2e5e0d4a60772ba3fdfe27e0
SHA12e25ee9a264cd1dd00ee58b61b2e2dd0dd117280
SHA256fc95bf4224ee281c01ab0de1223b6cc43d8e02483d84466ffb386248bdc39897
SHA5126bf7cea1c9e38a8b2530d68214eebd596f7b1378c15e485cd0a5fd10499ea1b79f6a8601ce9f37196a31feeaaf4a8f4350f0dc168a64085c4cd3b7e0934b1320
-
Filesize
5KB
MD521b53e809e06bf12b51c410af51c941d
SHA1125ce59530ecd9ff966ba56c7ded247d3ccdd2e2
SHA2568d6825007bb7f168dcf41f1308225d9c9bead24dd9c392e467e628bd70ce8f23
SHA512027ea029b340af260668291bb165fd2e04639d519386e86163960107046409674987704d6dbd3cca21219d2633e4529ef6799fa9ea2a23905a243e9a830931b8
-
Filesize
5KB
MD560612ed020c0bacc3300831c39fb5a2e
SHA1373ffb4ca9139b9e53daa52201c7fe20a47ded3c
SHA256068f560793b6dfddd6aaae794ef6159d29506fdd167a6da9017b4c1a75da097f
SHA5124b73f9d179098c952a6600216ea510ce0fdbe6f9dfc4f9377f5efd110769b42e852c378b087dc4659934069fbd6127c178bea049da99f58d52633ea5f98ececc
-
Filesize
5KB
MD54b9cef28652b64fafdf141a26c7ce6f5
SHA1fa35385b7dd560e1d8e8023b224881d65d1560d4
SHA2563d62dd20023edaf3ac2e7ba009f839c4b9fde31d046c5205e57d64ae719671a0
SHA512659dd6a838bf65f12280a25ec44b74ead03ad94c9f0db6c661f972fc2f2c766cde191870bc93f048fbff68fc12c712c33457b842049f718f8f2380a190c6cd38
-
Filesize
12KB
MD5545762950d7e10014fde92f7a8d3b47a
SHA1fc56137f46e7b96f02432a7cea67594db1c14826
SHA256923f09bc7afac64c9734e1bdd83f8892080b278877409ac02cc4d56e94e4f31c
SHA512385493aebab277510e8cc63483cb7da0bd7d0276e5a1133cc754e7cccadb3d973c17fcd2ff39dfd2f2af5a7b79a8603125edf2f4bcf7f5f8e0bb4ce1befe23f3
-
Filesize
143KB
MD558b8c8c5e74b7008b3212ac312eeb84b
SHA1b5a25d699348f3565fe92676dc36dc10b956837d
SHA256927dc4e3e4974805a8e6ba9c39185a97f420a16129b5ed17a6d036796d33e3da
SHA5126f31d7bc5b481b664ffba1602faffebc5a779fd35585ac0c224f068d6f3dac10950cc3f74f3476924e2511d0becefdfc63fefb342943c965dae72cac57adb9c6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd