Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2023, 07:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.fakturera-enklare.net/
Resource
win10v2004-20230220-en
General
-
Target
https://www.fakturera-enklare.net/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133234273535134049" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4380 chrome.exe 4380 chrome.exe 3772 chrome.exe 3772 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4380 chrome.exe 4380 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4380 wrote to memory of 1232 4380 chrome.exe 87 PID 4380 wrote to memory of 1232 4380 chrome.exe 87 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 3720 4380 chrome.exe 88 PID 4380 wrote to memory of 4788 4380 chrome.exe 89 PID 4380 wrote to memory of 4788 4380 chrome.exe 89 PID 4380 wrote to memory of 3260 4380 chrome.exe 90 PID 4380 wrote to memory of 3260 4380 chrome.exe 90 PID 4380 wrote to memory of 3260 4380 chrome.exe 90 PID 4380 wrote to memory of 3260 4380 chrome.exe 90 PID 4380 wrote to memory of 3260 4380 chrome.exe 90 PID 4380 wrote to memory of 3260 4380 chrome.exe 90 PID 4380 wrote to memory of 3260 4380 chrome.exe 90 PID 4380 wrote to memory of 3260 4380 chrome.exe 90 PID 4380 wrote to memory of 3260 4380 chrome.exe 90 PID 4380 wrote to memory of 3260 4380 chrome.exe 90 PID 4380 wrote to memory of 3260 4380 chrome.exe 90 PID 4380 wrote to memory of 3260 4380 chrome.exe 90 PID 4380 wrote to memory of 3260 4380 chrome.exe 90 PID 4380 wrote to memory of 3260 4380 chrome.exe 90 PID 4380 wrote to memory of 3260 4380 chrome.exe 90 PID 4380 wrote to memory of 3260 4380 chrome.exe 90 PID 4380 wrote to memory of 3260 4380 chrome.exe 90 PID 4380 wrote to memory of 3260 4380 chrome.exe 90 PID 4380 wrote to memory of 3260 4380 chrome.exe 90 PID 4380 wrote to memory of 3260 4380 chrome.exe 90 PID 4380 wrote to memory of 3260 4380 chrome.exe 90 PID 4380 wrote to memory of 3260 4380 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://www.fakturera-enklare.net/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea3719758,0x7ffea3719768,0x7ffea37197782⤵PID:1232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1920,i,9050939007335496794,7027806377484770837,131072 /prefetch:22⤵PID:3720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1920,i,9050939007335496794,7027806377484770837,131072 /prefetch:82⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1920,i,9050939007335496794,7027806377484770837,131072 /prefetch:82⤵PID:3260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3184 --field-trial-handle=1920,i,9050939007335496794,7027806377484770837,131072 /prefetch:12⤵PID:1804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3196 --field-trial-handle=1920,i,9050939007335496794,7027806377484770837,131072 /prefetch:12⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 --field-trial-handle=1920,i,9050939007335496794,7027806377484770837,131072 /prefetch:82⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5252 --field-trial-handle=1920,i,9050939007335496794,7027806377484770837,131072 /prefetch:82⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 --field-trial-handle=1920,i,9050939007335496794,7027806377484770837,131072 /prefetch:82⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2832 --field-trial-handle=1920,i,9050939007335496794,7027806377484770837,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3772
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3592
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5fe52a1d69eecb9b5d38b2d6e7e3ee8bf
SHA1b2b216037c6739efd0df0cfa53a47de027f9bee4
SHA256ebba3bc2199dd164219d3455e061239c3626c2b05889a3074089cb4f21eb77d5
SHA5126f7b9c1086e42197e51733867e591a851173a1653fb493d27ea6d96bd0a1dcbbd081c8aab24bb34310b575cf8e753f9af5f4e6905d2ae5ec905054c97e8d8b48
-
Filesize
2KB
MD572d4184bf6852a4098936b861ae6c448
SHA1d3f3c8c156decbc1fed9ecf4842b91968867a362
SHA25672c66b7b99a18c8f40648bcbc6669a0bcaeef7554cbe8419274db9851a500264
SHA51267d6ffd523d739963dac22970548d7c843e552f8bb8e96e6cd8da3a0146021dff73c298efc25cd393e49af11b15a7de3144e2b38a730b7d56dc0659f617c2dd2
-
Filesize
873B
MD537dbaed638524c6425c7b7db2cc50fe7
SHA1ea4539d79ef0b2d9e2a3cb8ddd9f30b5f7604353
SHA256e35fc7e1a28fa8122c09ffe73304a2ad20e0d364ae204737cdae6e0d743bad89
SHA5124e487c574b2f91e748e2c4bcfbbf676b4145b78319401838688e857ea92109b85cd41c83ad881f5cd8d56b6f287a923718f30393d626bba8ff6ebc0a55d6cd6a
-
Filesize
6KB
MD564a6c548a2bcef876ab8b6393a7d6f9f
SHA12adf62344e144fbf7f759f3b78c401e8755f91c4
SHA2561f71b75213c5cff394bcec7e843140e94a862e63addd77b7836f10b8f88aaf1b
SHA5127d4cc7cb7d827fac661bfa4e915259266a03f2e9a41b70beef425082a67016f3730658e2cf1809f806ac252931bb81378147a2b2013d43ff69826ac726a57cfc
-
Filesize
15KB
MD549218d832a4e68f41856c97933d6e773
SHA16e5e5e08e496f002083c8962e231644ce886cd50
SHA25663c39b99b5fd0848eacaad44779a0a3e708a85b120ebda3357caea5295dab7a5
SHA512c488a2cb5bc054d6e3034d001ac204751e347cd70654181d9d890bf0e03c636f2bed9f06ca7282a9ccc01518e7851620976ecab3ae19cc99f290437416418258
-
Filesize
142KB
MD5e0bca0a7a7312b359af251f9afe444e3
SHA1207d7bfbbdad09a400fdf546247edc78f8b58ddc
SHA2562ae173ba5d81f8dc7d6854c3607a1284242dd586fd2586e2950922d6cc0409da
SHA512d40d09ee637d7b7dc76b22231500be848dd0902978d7e4b3f439a99e16e843e24f744c4425172b8be064e5b5b3801da9f57988eb333eaac5d703150142f712b6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd