Analysis
-
max time kernel
26s -
max time network
28s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-it -
resource tags
arch:x64arch:x86image:win10v2004-20230220-itlocale:it-itos:windows10-2004-x64systemwindows -
submitted
06/03/2023, 10:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://r.newsletter.as-98.com/mk/op/3C52WinrKhHwWC9OfMS21nM7qgUIbhuYJ_PbW0RCui9W03a4rA684D_28CM4JBm0W1GEF4myE7vWjjE9VLC0Xwn8EBrrBiVc4cgqcScgtGCTyOopH2Zi971pGfq67dSwUfUDL3U
Resource
win10v2004-20230220-it
General
-
Target
http://r.newsletter.as-98.com/mk/op/3C52WinrKhHwWC9OfMS21nM7qgUIbhuYJ_PbW0RCui9W03a4rA684D_28CM4JBm0W1GEF4myE7vWjjE9VLC0Xwn8EBrrBiVc4cgqcScgtGCTyOopH2Zi971pGfq67dSwUfUDL3U
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133225748992535145" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4948 chrome.exe 4948 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4948 chrome.exe 4948 chrome.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4948 wrote to memory of 624 4948 chrome.exe 85 PID 4948 wrote to memory of 624 4948 chrome.exe 85 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 4492 4948 chrome.exe 86 PID 4948 wrote to memory of 3672 4948 chrome.exe 87 PID 4948 wrote to memory of 3672 4948 chrome.exe 87 PID 4948 wrote to memory of 1976 4948 chrome.exe 88 PID 4948 wrote to memory of 1976 4948 chrome.exe 88 PID 4948 wrote to memory of 1976 4948 chrome.exe 88 PID 4948 wrote to memory of 1976 4948 chrome.exe 88 PID 4948 wrote to memory of 1976 4948 chrome.exe 88 PID 4948 wrote to memory of 1976 4948 chrome.exe 88 PID 4948 wrote to memory of 1976 4948 chrome.exe 88 PID 4948 wrote to memory of 1976 4948 chrome.exe 88 PID 4948 wrote to memory of 1976 4948 chrome.exe 88 PID 4948 wrote to memory of 1976 4948 chrome.exe 88 PID 4948 wrote to memory of 1976 4948 chrome.exe 88 PID 4948 wrote to memory of 1976 4948 chrome.exe 88 PID 4948 wrote to memory of 1976 4948 chrome.exe 88 PID 4948 wrote to memory of 1976 4948 chrome.exe 88 PID 4948 wrote to memory of 1976 4948 chrome.exe 88 PID 4948 wrote to memory of 1976 4948 chrome.exe 88 PID 4948 wrote to memory of 1976 4948 chrome.exe 88 PID 4948 wrote to memory of 1976 4948 chrome.exe 88 PID 4948 wrote to memory of 1976 4948 chrome.exe 88 PID 4948 wrote to memory of 1976 4948 chrome.exe 88 PID 4948 wrote to memory of 1976 4948 chrome.exe 88 PID 4948 wrote to memory of 1976 4948 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://r.newsletter.as-98.com/mk/op/3C52WinrKhHwWC9OfMS21nM7qgUIbhuYJ_PbW0RCui9W03a4rA684D_28CM4JBm0W1GEF4myE7vWjjE9VLC0Xwn8EBrrBiVc4cgqcScgtGCTyOopH2Zi971pGfq67dSwUfUDL3U1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6b0c9758,0x7fff6b0c9768,0x7fff6b0c97782⤵PID:624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1816,i,298851693756325596,9681551300218861933,131072 /prefetch:22⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1816,i,298851693756325596,9681551300218861933,131072 /prefetch:82⤵PID:3672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2164 --field-trial-handle=1816,i,298851693756325596,9681551300218861933,131072 /prefetch:82⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3124 --field-trial-handle=1816,i,298851693756325596,9681551300218861933,131072 /prefetch:12⤵PID:376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3164 --field-trial-handle=1816,i,298851693756325596,9681551300218861933,131072 /prefetch:12⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4772 --field-trial-handle=1816,i,298851693756325596,9681551300218861933,131072 /prefetch:82⤵PID:4660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4916 --field-trial-handle=1816,i,298851693756325596,9681551300218861933,131072 /prefetch:82⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 --field-trial-handle=1816,i,298851693756325596,9681551300218861933,131072 /prefetch:82⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4840
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\6a7fad8d-adc2-4b36-a959-361a9ef48206.tmp
Filesize15KB
MD5cfe40a738f786214ff2a95c8fbb4275b
SHA1eac86874c73a5c153d2287737f9689b5ef9a225e
SHA2565097c8f38d99e602064d5332350a6a1093db6fd4e6127ffaa55c95260834772d
SHA51272da3985ef85d6ded68415c5f0f0b34b472939c6f9529c17a912ed243b51dcd422412cc3ad5a74d9a9d25cc280193c7a95d97185346637cce8f07672b88f8bae
-
Filesize
6KB
MD5a55187b09dc34a775fd649e18d1547f4
SHA1e8a110aaefb1ef4186c374d9eca67bfeceaa2249
SHA2566e115c51cc4ddcb9db663ad945bb3e94d777eca4f18f701ff6f37e5ce801c1cc
SHA5128eb3ff7b9aaabf5d4861fe71e5ed501fcb78794c068bd1d4fa06dd902f3b1a1c6a6e2638b4e8280131fbc15341505446af3a55c4cfd33bffd865784b74514433
-
Filesize
143KB
MD506ae5a48f53b39cab114b551419eebfe
SHA13d64e94f7991f060a26c4588d90b60733ec52e18
SHA256e9b9543b8e10df7b498c8defe4cd40cb18f2f14185d91df3bad86d927b87c94d
SHA512d1cde35d9f7a44ecc825f22d68f51eab9ccc90434390ae7bbcd165bd253e4f73aea14747fd5404b62744c0daf9b2ac14264917bc103f60152264ebb3718d1369
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd