Analysis
-
max time kernel
60s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2023 16:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.pennstatehershey.org/c/blogs/find_entry?p_1_id=0&noSuchEntryRedirect=https://memory.psych.upenn.edu//sd3.harapan.ac.id/js/a/data/
Resource
win10v2004-20230220-en
General
-
Target
https://www.pennstatehershey.org/c/blogs/find_entry?p_1_id=0&noSuchEntryRedirect=https://memory.psych.upenn.edu//sd3.harapan.ac.id/js/a/data/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133227668630093879" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1456 chrome.exe 1456 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1456 chrome.exe 1456 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1456 wrote to memory of 764 1456 chrome.exe 86 PID 1456 wrote to memory of 764 1456 chrome.exe 86 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 4592 1456 chrome.exe 87 PID 1456 wrote to memory of 1816 1456 chrome.exe 88 PID 1456 wrote to memory of 1816 1456 chrome.exe 88 PID 1456 wrote to memory of 528 1456 chrome.exe 89 PID 1456 wrote to memory of 528 1456 chrome.exe 89 PID 1456 wrote to memory of 528 1456 chrome.exe 89 PID 1456 wrote to memory of 528 1456 chrome.exe 89 PID 1456 wrote to memory of 528 1456 chrome.exe 89 PID 1456 wrote to memory of 528 1456 chrome.exe 89 PID 1456 wrote to memory of 528 1456 chrome.exe 89 PID 1456 wrote to memory of 528 1456 chrome.exe 89 PID 1456 wrote to memory of 528 1456 chrome.exe 89 PID 1456 wrote to memory of 528 1456 chrome.exe 89 PID 1456 wrote to memory of 528 1456 chrome.exe 89 PID 1456 wrote to memory of 528 1456 chrome.exe 89 PID 1456 wrote to memory of 528 1456 chrome.exe 89 PID 1456 wrote to memory of 528 1456 chrome.exe 89 PID 1456 wrote to memory of 528 1456 chrome.exe 89 PID 1456 wrote to memory of 528 1456 chrome.exe 89 PID 1456 wrote to memory of 528 1456 chrome.exe 89 PID 1456 wrote to memory of 528 1456 chrome.exe 89 PID 1456 wrote to memory of 528 1456 chrome.exe 89 PID 1456 wrote to memory of 528 1456 chrome.exe 89 PID 1456 wrote to memory of 528 1456 chrome.exe 89 PID 1456 wrote to memory of 528 1456 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://www.pennstatehershey.org/c/blogs/find_entry?p_1_id=0&noSuchEntryRedirect=https://memory.psych.upenn.edu//sd3.harapan.ac.id/js/a/data/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d6a59758,0x7ff8d6a59768,0x7ff8d6a597782⤵PID:764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 --field-trial-handle=1784,i,12710400715391880497,18330743433907402974,131072 /prefetch:22⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1784,i,12710400715391880497,18330743433907402974,131072 /prefetch:82⤵PID:1816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1224 --field-trial-handle=1784,i,12710400715391880497,18330743433907402974,131072 /prefetch:82⤵PID:528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3168 --field-trial-handle=1784,i,12710400715391880497,18330743433907402974,131072 /prefetch:12⤵PID:4408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3184 --field-trial-handle=1784,i,12710400715391880497,18330743433907402974,131072 /prefetch:12⤵PID:968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4532 --field-trial-handle=1784,i,12710400715391880497,18330743433907402974,131072 /prefetch:82⤵PID:3776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 --field-trial-handle=1784,i,12710400715391880497,18330743433907402974,131072 /prefetch:82⤵PID:3884
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4664
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD51e42f65b2f03b447a481cdde6626c1b1
SHA1659c28ac8998e6426917afd4c62e2bf964a08cf0
SHA256c3eb285afa0720fafe20338096ea1b577d670216e31ae46621f469e5c91bc343
SHA512b4c70266ae4164f98b343d70d19ea15bde4e9972d9737e592235b14a4a1707256a4535923028477d430b9cba356e33f2014646170b01640dd54d3f4c639284e9
-
Filesize
5KB
MD598d1dc563704b5e68fe0db3dec7d63a4
SHA1392fed8ea2bf296831046e45dfe00b36dc09c909
SHA25680f94898abcbd79039a4574a883a65aaf5229af4a24acac13bdf982f8723739e
SHA5129a829611b8b91a01ea42b76f17f04b62231fa2c49caa5eff048933cacec9ca9e99fb5eed44e3dc4e98b65185f6daf5338004fca1c45f0ecb94b1e9236536b603
-
Filesize
143KB
MD5d6ac03eb5738d8be4be06d459e0248c4
SHA1bbab51d7b8a10af23b9a87217f12adb033e2d7d7
SHA256d88b3c1ebc3e75f4cc4481a74e12a964dce685b814e86417eef7922ec20430c9
SHA5122b898c7bc6242e3601a94a89c44cd367701b9a804c76bef04439a863247a1a3c11ed269937f8f3f84002319b85f02e7ffb31eb5efcca045de9c2ccee1ec119b1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd