Analysis
-
max time kernel
299s -
max time network
264s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2023, 00:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://maps.crisis24.com/2023/03-Mar/cd3e51b5f39d0e708ddd629b44f22ce5f86ca49a.h tml
Resource
win10v2004-20230220-en
General
-
Target
https://maps.crisis24.com/2023/03-Mar/cd3e51b5f39d0e708ddd629b44f22ce5f86ca49a.h tml
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133226254795494804" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3152 chrome.exe 3152 chrome.exe 3228 chrome.exe 3228 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3152 chrome.exe 3152 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3152 wrote to memory of 2624 3152 chrome.exe 85 PID 3152 wrote to memory of 2624 3152 chrome.exe 85 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2900 3152 chrome.exe 87 PID 3152 wrote to memory of 2548 3152 chrome.exe 88 PID 3152 wrote to memory of 2548 3152 chrome.exe 88 PID 3152 wrote to memory of 3288 3152 chrome.exe 89 PID 3152 wrote to memory of 3288 3152 chrome.exe 89 PID 3152 wrote to memory of 3288 3152 chrome.exe 89 PID 3152 wrote to memory of 3288 3152 chrome.exe 89 PID 3152 wrote to memory of 3288 3152 chrome.exe 89 PID 3152 wrote to memory of 3288 3152 chrome.exe 89 PID 3152 wrote to memory of 3288 3152 chrome.exe 89 PID 3152 wrote to memory of 3288 3152 chrome.exe 89 PID 3152 wrote to memory of 3288 3152 chrome.exe 89 PID 3152 wrote to memory of 3288 3152 chrome.exe 89 PID 3152 wrote to memory of 3288 3152 chrome.exe 89 PID 3152 wrote to memory of 3288 3152 chrome.exe 89 PID 3152 wrote to memory of 3288 3152 chrome.exe 89 PID 3152 wrote to memory of 3288 3152 chrome.exe 89 PID 3152 wrote to memory of 3288 3152 chrome.exe 89 PID 3152 wrote to memory of 3288 3152 chrome.exe 89 PID 3152 wrote to memory of 3288 3152 chrome.exe 89 PID 3152 wrote to memory of 3288 3152 chrome.exe 89 PID 3152 wrote to memory of 3288 3152 chrome.exe 89 PID 3152 wrote to memory of 3288 3152 chrome.exe 89 PID 3152 wrote to memory of 3288 3152 chrome.exe 89 PID 3152 wrote to memory of 3288 3152 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" "https://maps.crisis24.com/2023/03-Mar/cd3e51b5f39d0e708ddd629b44f22ce5f86ca49a.h tml"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa90389758,0x7ffa90389768,0x7ffa903897782⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1812,i,10364639545172561735,6000444637257592897,131072 /prefetch:22⤵PID:2900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,10364639545172561735,6000444637257592897,131072 /prefetch:82⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1812,i,10364639545172561735,6000444637257592897,131072 /prefetch:82⤵PID:3288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3176 --field-trial-handle=1812,i,10364639545172561735,6000444637257592897,131072 /prefetch:12⤵PID:1068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3188 --field-trial-handle=1812,i,10364639545172561735,6000444637257592897,131072 /prefetch:12⤵PID:3660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4840 --field-trial-handle=1812,i,10364639545172561735,6000444637257592897,131072 /prefetch:82⤵PID:4688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 --field-trial-handle=1812,i,10364639545172561735,6000444637257592897,131072 /prefetch:82⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2832 --field-trial-handle=1812,i,10364639545172561735,6000444637257592897,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3228
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1132
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b41293672d7e1889fda740f3172dde3e
SHA1f7e6b1d68a8e90b8751124ebbd91024ad1da1fbe
SHA2561e076cea01ce02ffdba3f97ef9592a6ccd075585ef205c4d051f977438b4c77e
SHA5126c077cf329a00ea1a0c3d2438c8fb87dceefeea28ec5b49debcbbca7be6810b061eee9682f886458a98d2a4c79feca83a21f8491f3bba2e225423825ad338147
-
Filesize
1KB
MD5f718fe97b45ceeb89e0fbd71d3eeaa50
SHA1b17e48e9cc7ac102f2a62fd0a4973c1c5356aff2
SHA256a29638a54ec51db48dbba1adbd737436572c2d12a3927119e954450c1cb910e0
SHA5127dd8c5a15fbac6a6b6ccac34489116ea2ba5ff17581a82f0be65c60dbde2818b6cd5aaaba849dfd9f2ebbb7df9339b9c12184164c9e4fffea9da9c742b5e6e96
-
Filesize
4KB
MD5774cdac097adb9e8c07bd19d1ba4179e
SHA10d13e9002425a32df387aeb613e1698c8ac04f73
SHA256f4eec74ab872c50b9ab2ea50ff6793a5288f05d0ae89514e3e1dd2a211599379
SHA512a4842c60d95affd385e69124a04c6787ca1e83d403ed84b2f99665bcd581aaca9eeccc51f4f95578a0b26a9f77cb175147f65a516ab941ef423f7847e1090bd4
-
Filesize
4KB
MD5cf6628d3ea21d3d99a72976e11508358
SHA1a0301570548bb49c971bbb71d9b1d667c0ddaded
SHA25600e5c35151c743b14b3b0974ff4ab395c49cf2aa200ccfb8fa038cbf7d878200
SHA512b986d797d5c44ed6d32c73cb619bfb69bfcd604585183338fd4496eaae54be4ba417d338e903b5954daa021e12185da5a7ba65590dab12d7d7a261683d179e65
-
Filesize
4KB
MD5c17bacf812012cf1b9c34892ec389760
SHA10af026b1a22b1fa50fe4f9624a75c3b92a0ecad7
SHA2568bec648fe94887ace825ad860fd9f8f2493a7727ce5d40b062be964e3b474ae1
SHA51223b8ad30276895bd5fd84469788285171e16ece7ca2cb7220f7c35f6cb52ba0b9dbab08786505ff43f991efa511396c2798acddbdebeee4b3e98642ab291b3d2
-
Filesize
143KB
MD5fd251eacc01bc64ee1c8a94738e63b4c
SHA18fccc217c00915e16e495348c48289c12a336d24
SHA2567f3e3dd87ce3fb3cd63780236331fc0f1c3d720e438a920d99baeebdfc0e04f8
SHA512e2ef394ef5bdbc174bc212a7f85a6d07bb8ecb0486093a4bb5cfcd874b64718bd367c18f33d8e1d3ed8ee89d69fe2596751060597ce871adc79676091d44913a