Analysis
-
max time kernel
42s -
max time network
41s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10-03-2023 08:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://id2.action-media.ru/products/my-products?widgetop=open
Resource
win10-20230220-en
General
-
Target
https://id2.action-media.ru/products/my-products?widgetop=open
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133229138579675039" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3240 chrome.exe 3240 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3240 chrome.exe 3240 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3240 wrote to memory of 4104 3240 chrome.exe 66 PID 3240 wrote to memory of 4104 3240 chrome.exe 66 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 2072 3240 chrome.exe 68 PID 3240 wrote to memory of 4764 3240 chrome.exe 69 PID 3240 wrote to memory of 4764 3240 chrome.exe 69 PID 3240 wrote to memory of 2572 3240 chrome.exe 70 PID 3240 wrote to memory of 2572 3240 chrome.exe 70 PID 3240 wrote to memory of 2572 3240 chrome.exe 70 PID 3240 wrote to memory of 2572 3240 chrome.exe 70 PID 3240 wrote to memory of 2572 3240 chrome.exe 70 PID 3240 wrote to memory of 2572 3240 chrome.exe 70 PID 3240 wrote to memory of 2572 3240 chrome.exe 70 PID 3240 wrote to memory of 2572 3240 chrome.exe 70 PID 3240 wrote to memory of 2572 3240 chrome.exe 70 PID 3240 wrote to memory of 2572 3240 chrome.exe 70 PID 3240 wrote to memory of 2572 3240 chrome.exe 70 PID 3240 wrote to memory of 2572 3240 chrome.exe 70 PID 3240 wrote to memory of 2572 3240 chrome.exe 70 PID 3240 wrote to memory of 2572 3240 chrome.exe 70 PID 3240 wrote to memory of 2572 3240 chrome.exe 70 PID 3240 wrote to memory of 2572 3240 chrome.exe 70 PID 3240 wrote to memory of 2572 3240 chrome.exe 70 PID 3240 wrote to memory of 2572 3240 chrome.exe 70 PID 3240 wrote to memory of 2572 3240 chrome.exe 70 PID 3240 wrote to memory of 2572 3240 chrome.exe 70 PID 3240 wrote to memory of 2572 3240 chrome.exe 70 PID 3240 wrote to memory of 2572 3240 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://id2.action-media.ru/products/my-products?widgetop=open1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0x88,0xd8,0x7ffd52f59758,0x7ffd52f59768,0x7ffd52f597782⤵PID:4104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1600 --field-trial-handle=1756,i,17875489768902915602,2782196792752409845,131072 /prefetch:22⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1924 --field-trial-handle=1756,i,17875489768902915602,2782196792752409845,131072 /prefetch:82⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2088 --field-trial-handle=1756,i,17875489768902915602,2782196792752409845,131072 /prefetch:82⤵PID:2572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2944 --field-trial-handle=1756,i,17875489768902915602,2782196792752409845,131072 /prefetch:12⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2952 --field-trial-handle=1756,i,17875489768902915602,2782196792752409845,131072 /prefetch:12⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 --field-trial-handle=1756,i,17875489768902915602,2782196792752409845,131072 /prefetch:82⤵PID:3108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4496 --field-trial-handle=1756,i,17875489768902915602,2782196792752409845,131072 /prefetch:82⤵PID:3560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 --field-trial-handle=1756,i,17875489768902915602,2782196792752409845,131072 /prefetch:82⤵PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 --field-trial-handle=1756,i,17875489768902915602,2782196792752409845,131072 /prefetch:82⤵PID:3916
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4440
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD550108e195042cf8d399a29c93b173be5
SHA140e5fd600465cdfc0b0b6bc40c79e6d14c51d172
SHA256bfc3b35a050049117b1e52da221876e9b2a5c5f0ef84962127d64c88f8e263bb
SHA512e57951a72e5338ed954a080a6c929b5fab2f080cba4055d378271d441531ad18809afd4c52c99e9aa6c6e26a060dfb8cb79aa07dbf2e396e872d755242d2aa34
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD5ba553cc1e514b16985aa3b0bc0a65659
SHA13f83c0bda4d02a37f5254a47f7bcae03403c5cb5
SHA25681aad434da1e9f84834fa49a6ab186c8c88a02d831ae2187ff8bccc5464d56cb
SHA512f406f6d62ab1a3182adb2b6bd93b79ff52b81a1f5c255b4f55f6dbd691d03b23e9d56e74896285d8879e025d37e38a0bd2508d0659537965b7d98cf1a9edff93
-
Filesize
1KB
MD5910f45a24fbaf7a098f881617706d39c
SHA118260698f0a11ef9be368a381e91298acbed4b03
SHA2564a2c05f9747ff9c6b5a6c23f5384aecd6e7dfd677e61c48994eace9945d2131f
SHA512e292dab48428bea42af52f9bbcf3c53f209d9f86472e06e5d017afb9200393636e0efaac0848b6e68ef361c65f88376565541dce95df5dc2cbcdf4de7d799583
-
Filesize
5KB
MD5e8163b8e8374e31b5e1e109e3887685e
SHA1251ba223d7c9a68fae23cf32b3c797a6a765051e
SHA2560f29e839f195ae1b527c62387b1c57b67399958bbddefc8bef2864f4b2054a32
SHA5123af7920e066fa93c597a24aa0dcd6f33679334116136cc14ebd73715e6ad76135cccc9ee6c16741d016e396e4c1787506918db75c2bb107f7136ef87d8797e75
-
Filesize
5KB
MD5539e7ef1c419614d3afa518c585eaa01
SHA1ac65074b766bd15e394e177fa26384d824377902
SHA25640b84f2e0d7614fa191caf849f8b5450bfe4ec395ec3830f3a75f06181dbda98
SHA51270cfc59f3320302ca2e79ffab0d7745f935770aa50e064bf126e7bde86ee45e2e14440707adb39ddc1afe6ccb1573fee73a0d1b2f8330d4d92699d8fd229df83
-
Filesize
72KB
MD5f70ab70e7fc2e80e8fae0bbdff6eab3b
SHA1cae615764007e37eade83f69f657c298ff714f3a
SHA2565330ef7330242ef6789b01282c5ac96ff180a1133bcf5fdfed7067e6cb73322b
SHA512dd93dd8db126659aea0c549b61ca5f5e59e7764eb85edb2815a6038a96b26f535ee7b3501e75a6007ddb56c6fef6c593a9ca9f84e527ffe0969b9917316c59f6
-
Filesize
145KB
MD52238c488d0be576da4410496c901e29c
SHA13248132dd2d52f2e91e4a383f2f43f4ca09fc896
SHA256a069af7aa813ddd88667da2c139dafcd5374307f90dfbd690f8f561d6aa4c01e
SHA5129d303af31d8e27d04b39485c65a553474742272537af5e847d5b638361f348876e42aa0cbd39772a1a214f476fc9c40c4d675112d9374a8e3aad5b94bb57feeb
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd