Analysis
-
max time kernel
299s -
max time network
268s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2023, 17:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://alpharealestate.amaseon.com/download.php
Resource
win10v2004-20230220-en
General
-
Target
https://alpharealestate.amaseon.com/download.php
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133232873390248266" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4368 chrome.exe 4368 chrome.exe 376 chrome.exe 376 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4368 chrome.exe 4368 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe Token: SeShutdownPrivilege 4368 chrome.exe Token: SeCreatePagefilePrivilege 4368 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe 4368 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4368 wrote to memory of 2176 4368 chrome.exe 85 PID 4368 wrote to memory of 2176 4368 chrome.exe 85 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 3512 4368 chrome.exe 86 PID 4368 wrote to memory of 1440 4368 chrome.exe 87 PID 4368 wrote to memory of 1440 4368 chrome.exe 87 PID 4368 wrote to memory of 1456 4368 chrome.exe 88 PID 4368 wrote to memory of 1456 4368 chrome.exe 88 PID 4368 wrote to memory of 1456 4368 chrome.exe 88 PID 4368 wrote to memory of 1456 4368 chrome.exe 88 PID 4368 wrote to memory of 1456 4368 chrome.exe 88 PID 4368 wrote to memory of 1456 4368 chrome.exe 88 PID 4368 wrote to memory of 1456 4368 chrome.exe 88 PID 4368 wrote to memory of 1456 4368 chrome.exe 88 PID 4368 wrote to memory of 1456 4368 chrome.exe 88 PID 4368 wrote to memory of 1456 4368 chrome.exe 88 PID 4368 wrote to memory of 1456 4368 chrome.exe 88 PID 4368 wrote to memory of 1456 4368 chrome.exe 88 PID 4368 wrote to memory of 1456 4368 chrome.exe 88 PID 4368 wrote to memory of 1456 4368 chrome.exe 88 PID 4368 wrote to memory of 1456 4368 chrome.exe 88 PID 4368 wrote to memory of 1456 4368 chrome.exe 88 PID 4368 wrote to memory of 1456 4368 chrome.exe 88 PID 4368 wrote to memory of 1456 4368 chrome.exe 88 PID 4368 wrote to memory of 1456 4368 chrome.exe 88 PID 4368 wrote to memory of 1456 4368 chrome.exe 88 PID 4368 wrote to memory of 1456 4368 chrome.exe 88 PID 4368 wrote to memory of 1456 4368 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://alpharealestate.amaseon.com/download.php1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffd8b389758,0x7ffd8b389768,0x7ffd8b3897782⤵PID:2176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 --field-trial-handle=1812,i,11113972719018642697,14759442763783809447,131072 /prefetch:22⤵PID:3512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1812,i,11113972719018642697,14759442763783809447,131072 /prefetch:82⤵PID:1440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2164 --field-trial-handle=1812,i,11113972719018642697,14759442763783809447,131072 /prefetch:82⤵PID:1456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3232 --field-trial-handle=1812,i,11113972719018642697,14759442763783809447,131072 /prefetch:12⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3248 --field-trial-handle=1812,i,11113972719018642697,14759442763783809447,131072 /prefetch:12⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 --field-trial-handle=1812,i,11113972719018642697,14759442763783809447,131072 /prefetch:82⤵PID:996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 --field-trial-handle=1812,i,11113972719018642697,14759442763783809447,131072 /prefetch:82⤵PID:824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3732 --field-trial-handle=1812,i,11113972719018642697,14759442763783809447,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:376
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4376
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
371B
MD5dc2cb5816288f53a1fe1dee75b680fcf
SHA1f7b67bdb00802165b320bdd95130fe87688489b5
SHA256a8f7b3e5d52fad8dd91a0e9c66a79208d67b2a518cf7a754b5141e133e671e38
SHA51232386f87f5bcd6da68b62fef6eac070a0017bbb80d306a06901d11610bd225409a5632bee8515cc28de478bd8651227d017a88c07e1a84651cdef94ea24d049a
-
Filesize
5KB
MD5e8518405e77dc59bacb450e99b1c3a02
SHA14b48f42beadba13b01adc5bc9ab52daae4713c9b
SHA2568aab7a7b8835e25e938769d9407d9f277787ac8e9093322761ded4a9adb6660b
SHA5121a3e443abc0e119826d66d64196f8bbe67be77fb6277731084a7890e8061b377d87577c22c3f55cf60517b67845ba8f6c47a1006cac6ceee2368bd6960e1acdf
-
Filesize
5KB
MD52c901a1402f98b1873c76538c1d2957c
SHA1bc1265a8f1831e5f83f0f3f5cedb1085d1b3ea7d
SHA2560536853ace74f3b05ba9c8bea02ea686de7fdea753dfc8cd139910afa9c39705
SHA512db992c1b1917dbe2696023fcbbbc652b9487c81c747a0d528be2d7608cf7e53dd3f5130cc50fa15b46f1f185dd1b9c48e97ba73e801a001f7af891bda5a786c6
-
Filesize
5KB
MD5c1d4cb4615477d094820851a5fb21a58
SHA154c9530d69b8418061f859e373947ebe97044676
SHA2568079573d6e22a0fbb74b6773fe6f1aaace3c8cb2f6370c99b8121ea27644df15
SHA51237070311a9696e8c0f3ae523f5613827d9161be9ff1b0f6d15a3eec878ee8c893a42b734c80626c129e9b806277ef0d0e42bd59eca7b7f77dddbb00fe5b0f285
-
Filesize
5KB
MD571ff3f1f9f7f8fd4f17ac286721ad19f
SHA18a8fb2e6ff53d0c1b4fbb0ea6d3c9346735486ce
SHA256cc3e59e68bd114d48d1a773742f16cba285edd8c240b5f7880509e2c7264147a
SHA5129948cd949f4a87aa5edff220032b7e7140820dbd09d6da3a2df99f4b392dbaa6405a274b87681f856bee30a87f85030aa71ba2d21af033fe2046ffde562e9df9
-
Filesize
144KB
MD5e8c0698d3bbb23a4e7fdf3099f22623e
SHA13f8f5624b6e6b432b3f9de48c6a8b540a3d02154
SHA256ef4d7f59545471d24e1a68c2fc902d9e3099f419692afb04d1c960ebaa7f36ad
SHA512bb7301bf2216f0dd91c58337a7ad6da7b15c2f774782bb520e1812a27689bfa024bbe61ade91ee8c7b8d03db88f5cb9e187cd18e50ecb5daa140173692cafb54