Analysis
-
max time kernel
14s -
max time network
15s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
07/03/2023, 11:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.autofichi.ru
Resource
win10-20230220-en
7 signatures
1800 seconds
General
-
Target
http://www.autofichi.ru
Score
1/10
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2488 chrome.exe 2488 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe Token: SeShutdownPrivilege 2488 chrome.exe Token: SeCreatePagefilePrivilege 2488 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe 2488 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2592 2488 chrome.exe 66 PID 2488 wrote to memory of 2592 2488 chrome.exe 66 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 2796 2488 chrome.exe 68 PID 2488 wrote to memory of 4456 2488 chrome.exe 69 PID 2488 wrote to memory of 4456 2488 chrome.exe 69 PID 2488 wrote to memory of 3060 2488 chrome.exe 70 PID 2488 wrote to memory of 3060 2488 chrome.exe 70 PID 2488 wrote to memory of 3060 2488 chrome.exe 70 PID 2488 wrote to memory of 3060 2488 chrome.exe 70 PID 2488 wrote to memory of 3060 2488 chrome.exe 70 PID 2488 wrote to memory of 3060 2488 chrome.exe 70 PID 2488 wrote to memory of 3060 2488 chrome.exe 70 PID 2488 wrote to memory of 3060 2488 chrome.exe 70 PID 2488 wrote to memory of 3060 2488 chrome.exe 70 PID 2488 wrote to memory of 3060 2488 chrome.exe 70 PID 2488 wrote to memory of 3060 2488 chrome.exe 70 PID 2488 wrote to memory of 3060 2488 chrome.exe 70 PID 2488 wrote to memory of 3060 2488 chrome.exe 70 PID 2488 wrote to memory of 3060 2488 chrome.exe 70 PID 2488 wrote to memory of 3060 2488 chrome.exe 70 PID 2488 wrote to memory of 3060 2488 chrome.exe 70 PID 2488 wrote to memory of 3060 2488 chrome.exe 70 PID 2488 wrote to memory of 3060 2488 chrome.exe 70 PID 2488 wrote to memory of 3060 2488 chrome.exe 70 PID 2488 wrote to memory of 3060 2488 chrome.exe 70 PID 2488 wrote to memory of 3060 2488 chrome.exe 70 PID 2488 wrote to memory of 3060 2488 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://www.autofichi.ru1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xac,0xd8,0x7ffa870e9758,0x7ffa870e9768,0x7ffa870e97782⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1756,i,15079867026605028096,3335329212928560629,131072 /prefetch:22⤵PID:2796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1884 --field-trial-handle=1756,i,15079867026605028096,3335329212928560629,131072 /prefetch:82⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2116 --field-trial-handle=1756,i,15079867026605028096,3335329212928560629,131072 /prefetch:82⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2640 --field-trial-handle=1756,i,15079867026605028096,3335329212928560629,131072 /prefetch:12⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2648 --field-trial-handle=1756,i,15079867026605028096,3335329212928560629,131072 /prefetch:12⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4212 --field-trial-handle=1756,i,15079867026605028096,3335329212928560629,131072 /prefetch:12⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3608 --field-trial-handle=1756,i,15079867026605028096,3335329212928560629,131072 /prefetch:12⤵PID:1824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3104 --field-trial-handle=1756,i,15079867026605028096,3335329212928560629,131072 /prefetch:12⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3800
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5f59f5d3443c1272451b3e9b02781a054
SHA16cde3d787b7afa9fc4cd5abde8337b8ba18560b6
SHA2568e1a787e077892b9f5e823f4b003138a195befc4805dea2c207394e84a2a62e5
SHA5126f08c29df8eed836c60d96a0ab4f6e71eaf543528f93f3adcfab53f623656e72caa53e8e3b5e5db2160b5b05067b8e4e75181b1bbad086d8dd48a4d30a779e06
-
Filesize
143KB
MD50ad5f0c90e40905721718d9c6d7a1712
SHA1e863ab62e4c1d46c0e2894a1e63c40de867068f2
SHA256b4d3858fe531b5f34cb60da26c240be65bf68b5d11071476631b324f7468f124
SHA512d4f649fd70f505d0f188fc0cb38a65987ac15c6e007feca666e57a0a989af26b49b450414d0d96ca5e692e664f68a508c28b14177ce57f055d81c8934daec332