Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2023 21:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://unitedflybooking.com
Resource
win10v2004-20230220-en
General
-
Target
http://unitedflybooking.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133234760547357289" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2228 chrome.exe 2228 chrome.exe 1056 chrome.exe 1056 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe Token: SeShutdownPrivilege 2228 chrome.exe Token: SeCreatePagefilePrivilege 2228 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe 2228 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2228 wrote to memory of 3364 2228 chrome.exe 85 PID 2228 wrote to memory of 3364 2228 chrome.exe 85 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 3804 2228 chrome.exe 86 PID 2228 wrote to memory of 100 2228 chrome.exe 87 PID 2228 wrote to memory of 100 2228 chrome.exe 87 PID 2228 wrote to memory of 5032 2228 chrome.exe 88 PID 2228 wrote to memory of 5032 2228 chrome.exe 88 PID 2228 wrote to memory of 5032 2228 chrome.exe 88 PID 2228 wrote to memory of 5032 2228 chrome.exe 88 PID 2228 wrote to memory of 5032 2228 chrome.exe 88 PID 2228 wrote to memory of 5032 2228 chrome.exe 88 PID 2228 wrote to memory of 5032 2228 chrome.exe 88 PID 2228 wrote to memory of 5032 2228 chrome.exe 88 PID 2228 wrote to memory of 5032 2228 chrome.exe 88 PID 2228 wrote to memory of 5032 2228 chrome.exe 88 PID 2228 wrote to memory of 5032 2228 chrome.exe 88 PID 2228 wrote to memory of 5032 2228 chrome.exe 88 PID 2228 wrote to memory of 5032 2228 chrome.exe 88 PID 2228 wrote to memory of 5032 2228 chrome.exe 88 PID 2228 wrote to memory of 5032 2228 chrome.exe 88 PID 2228 wrote to memory of 5032 2228 chrome.exe 88 PID 2228 wrote to memory of 5032 2228 chrome.exe 88 PID 2228 wrote to memory of 5032 2228 chrome.exe 88 PID 2228 wrote to memory of 5032 2228 chrome.exe 88 PID 2228 wrote to memory of 5032 2228 chrome.exe 88 PID 2228 wrote to memory of 5032 2228 chrome.exe 88 PID 2228 wrote to memory of 5032 2228 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://unitedflybooking.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffede1c9758,0x7ffede1c9768,0x7ffede1c97782⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1824,i,9960326285751550534,8139788018879637614,131072 /prefetch:22⤵PID:3804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1824,i,9960326285751550534,8139788018879637614,131072 /prefetch:82⤵PID:100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1824,i,9960326285751550534,8139788018879637614,131072 /prefetch:82⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3124 --field-trial-handle=1824,i,9960326285751550534,8139788018879637614,131072 /prefetch:12⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3144 --field-trial-handle=1824,i,9960326285751550534,8139788018879637614,131072 /prefetch:12⤵PID:2460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4604 --field-trial-handle=1824,i,9960326285751550534,8139788018879637614,131072 /prefetch:12⤵PID:3360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=1824,i,9960326285751550534,8139788018879637614,131072 /prefetch:82⤵PID:1180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 --field-trial-handle=1824,i,9960326285751550534,8139788018879637614,131072 /prefetch:82⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2884 --field-trial-handle=1824,i,9960326285751550534,8139788018879637614,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4240
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD5a906b53668e0a7a60bd05b35c0e59de5
SHA133f7a0f386b88f063391b8106f993f19ec8b8c6a
SHA256cecf78691b1bce7c056dfc7b87a67eb53982820019103d28d1f332e9ff89fd4a
SHA512d92ca1bd9e567ea88da8c71073f64ff55f3620a1c126dd95e57abccdef32d3ca2c65572a87f68ac610c319bf9771674c041802df855edd63191aae1722d0e0b2
-
Filesize
1KB
MD567c7dd294cbe22b3c401a7fae22aed18
SHA1445c011acf796d4295da0b7c30555958c21375b5
SHA256ed72121469d925b5fb5d1912007e3b85f3d6f6b950439ce04520fb4a1cb223c8
SHA512e875b50658c5bd89540b363cdfab401da7f3c357e478db6e92e4405c8ed41539d86b4bfdc80ca8c8dde47ba1560a3db9d98ceda34680a488f6180c5f99862ccf
-
Filesize
1KB
MD59be3c73a973875d4677b70ca934e7763
SHA1b51e22f477d20b53329a9fe73721f0851463f38a
SHA256c4f1f0468b020d5724b0c8aefa0f136185b2d29b0cef9aca4ad6ea356182ca7b
SHA5122ac841709404e937b26a07ae84e58f2f72ae31c3fc26a8ba07f827cdc126cd09bd399562b7e8edc4796d15bb3aeeb914492343b04f82319a6c48288c71c18f8c
-
Filesize
537B
MD56bb307e85e88ae8be6768b258c172de4
SHA1ca2d6155416d42adcc53ab2877e65597e277f467
SHA256fbd3a48be9f4792815be5216273284bbc9ded329923c2f8a2a20fb2b11d70c4b
SHA512292eae001f457db2e2f50acb59e153e4dd73366548410da8599d7a7b20f07b8302cfd4831f74582e0fc3a0f6ddce84cb7104cc42e75b827520cc775eb579cded
-
Filesize
5KB
MD5af1f14f36a97c9e970a96f4eae47a48d
SHA1090e1b0f39854f6e12d74584e9fe53456b1cd9dd
SHA2569bebd65efeef0433f726282d1bef02a061ee89ee3ac515d5f12123a64ecace92
SHA512a6f376003c28048af745e09098f6e7f9840153692913fb442203910ef4690af3e668bcac8dcbefbb592e869ff72edfac0d84c83df4acc5941b3f0addcc5530db
-
Filesize
5KB
MD5d06d26752b3731e7a42e971fcd4d1406
SHA1909f8cefdd37e782f80dfc3bb6d53bf96394ec81
SHA256a5d02ce488e602e617d45496b64149515d1ec83356d44b9734509ff514d1656f
SHA5127376b968ea6c4b2f634013370d00b6dabf5bceba5b0db4d3db38b37ef8b41b187e8079ae16cab881570722cea7c39111a1393fb20e436c994262c6bd9097c201
-
Filesize
5KB
MD5a79eebf92621f8a73017c4233e7f7213
SHA1aca72c23669edf3be51377468b65384ce67a6d4c
SHA256d722d0399a167438181c0a3c1a3c041f3beaa2527cfd0fb6bc2801121a752284
SHA51237091ac82b5797b11fe4ba2a1d7da28e2a570d33d59cd91cc458153e7ce8856164f3bf17569abcbfbb767e4c09fb94771e9c1449ad7aa2b1ed300873702c4297
-
Filesize
143KB
MD581cce68b2919ee4cdb930d959b91e115
SHA1cf9c1f059af9704f004a1cbc2e0a5dcf2e2bb729
SHA256acdc7a16a3a5804803714c5885f43389b880fb7b1313ccf2e29c5afa30c1c824
SHA51285b02907ae1f83cb148ab76f2631500e4af8becd53b16017cd5d65e36f1b808135d350ea86fbe6d1ff548cd01c367d8d14beaff4f888ef87cb71e1f519852f69
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd