Analysis
-
max time kernel
195s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
17/03/2023, 14:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.asb-china.com/
Resource
win10v2004-20230221-en
General
-
Target
http://www.asb-china.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133235409734761864" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2328 chrome.exe 2328 chrome.exe 3928 chrome.exe 3928 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2328 chrome.exe 2328 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe Token: SeShutdownPrivilege 2328 chrome.exe Token: SeCreatePagefilePrivilege 2328 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2328 wrote to memory of 4544 2328 chrome.exe 85 PID 2328 wrote to memory of 4544 2328 chrome.exe 85 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 2116 2328 chrome.exe 86 PID 2328 wrote to memory of 3156 2328 chrome.exe 87 PID 2328 wrote to memory of 3156 2328 chrome.exe 87 PID 2328 wrote to memory of 748 2328 chrome.exe 88 PID 2328 wrote to memory of 748 2328 chrome.exe 88 PID 2328 wrote to memory of 748 2328 chrome.exe 88 PID 2328 wrote to memory of 748 2328 chrome.exe 88 PID 2328 wrote to memory of 748 2328 chrome.exe 88 PID 2328 wrote to memory of 748 2328 chrome.exe 88 PID 2328 wrote to memory of 748 2328 chrome.exe 88 PID 2328 wrote to memory of 748 2328 chrome.exe 88 PID 2328 wrote to memory of 748 2328 chrome.exe 88 PID 2328 wrote to memory of 748 2328 chrome.exe 88 PID 2328 wrote to memory of 748 2328 chrome.exe 88 PID 2328 wrote to memory of 748 2328 chrome.exe 88 PID 2328 wrote to memory of 748 2328 chrome.exe 88 PID 2328 wrote to memory of 748 2328 chrome.exe 88 PID 2328 wrote to memory of 748 2328 chrome.exe 88 PID 2328 wrote to memory of 748 2328 chrome.exe 88 PID 2328 wrote to memory of 748 2328 chrome.exe 88 PID 2328 wrote to memory of 748 2328 chrome.exe 88 PID 2328 wrote to memory of 748 2328 chrome.exe 88 PID 2328 wrote to memory of 748 2328 chrome.exe 88 PID 2328 wrote to memory of 748 2328 chrome.exe 88 PID 2328 wrote to memory of 748 2328 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://www.asb-china.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd048a9758,0x7ffd048a9768,0x7ffd048a97782⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1812,i,140355077026473566,13259144880311694218,131072 /prefetch:22⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,140355077026473566,13259144880311694218,131072 /prefetch:82⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2164 --field-trial-handle=1812,i,140355077026473566,13259144880311694218,131072 /prefetch:82⤵PID:748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3156 --field-trial-handle=1812,i,140355077026473566,13259144880311694218,131072 /prefetch:12⤵PID:4004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3168 --field-trial-handle=1812,i,140355077026473566,13259144880311694218,131072 /prefetch:12⤵PID:3624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5100 --field-trial-handle=1812,i,140355077026473566,13259144880311694218,131072 /prefetch:82⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 --field-trial-handle=1812,i,140355077026473566,13259144880311694218,131072 /prefetch:82⤵PID:4428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 --field-trial-handle=1812,i,140355077026473566,13259144880311694218,131072 /prefetch:82⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1812,i,140355077026473566,13259144880311694218,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3928
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4756
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408B
MD5d197eab052e69567b1c6f696ff43830c
SHA175ad850e5a7ec627e545c87e08e9bd69c3ad89d8
SHA2568480a24d2c6895f99740177b42cfff904dcff15d8cd16f9c04aa75c9ccf7734e
SHA51212516f1579a7ae017b7c465a77008271b5015f52f24615027d72838f1fd61cbe0ae3016abbc8e898dbbf005194acd7c12ad784372961ba11ab69d3a19155b246
-
Filesize
1KB
MD5ae1a72f725529b15cdfb0a61d753ccbe
SHA1f37d8f65a415998c6d46cc34d0d58ae2183e721e
SHA256c518ef4c7d8ad9b914d1fb56f2c0eb6f5af33c4b3236bb1d70f77cb96edac4a7
SHA51270d8b2be61cbacef6ef3a8e8161bfe1c074f31c0a8e84c52a40c7cbbe4b685677d720c256135200f7d9233dd36df7648f4e56ec79050768210f4aeec35350725
-
Filesize
1KB
MD56b73a9e326d25deda2c627cef76205a9
SHA14f46954f3b32c5f6183779f5dbc1f6a0533dce27
SHA256d472ac93c8c8de8b7ecf37de3fe991c07777d6a79193c402148dce145e79b882
SHA512550bbdf9e91e9773b2d5046409e4dbbc1be9b26b01c43c70760fda4b0c66dff6432aa6ba0f14caad2680d132a2930a23d6d2ec3d52edd48f8018fa4d8b8a5e50
-
Filesize
6KB
MD5d8c9d3fe0feba224cd3404cea627ad4f
SHA1ecfc114790ba2d37cea90099f83f2350a2bdd9fc
SHA2561f3fa6619ee0f3f962984891b4156bfc2dea7ce92dd4ee4f9bc1a5712dc4a544
SHA512daaf3084cdfc260d31bc8288a3806da29e10b0ea2bcdb50e58b2199772cb3c86d7decbf316e1ec7549625af57e440115087cdf0c366f86506c65c0e30cb60766
-
Filesize
15KB
MD5b14a12a015c8f36f5f192c129636136d
SHA12bde3886daed5b6912250ee1c1dcac3de793c43b
SHA256ab7f55a6e55318a3e9dce045a73d51fe67009fbec40396665660c46cba7a49a8
SHA51204af9d59fe4affde5837720eddc56eed8fd70f64c3e148961be9a2f498739f5f256769b6c51e6a8f3761d09411584c5101f14fae05d2015a332e0f7a585bcac4
-
Filesize
15KB
MD53d3b6778dcffe80f2a5b89658b723af6
SHA142512101f341f8aad7966231bb84f0e0d2ac378a
SHA256592324fcf96f9a523b8036e109f314f3122eed1e5e2e7e0962665693510ee286
SHA512a4701cdd1f669c479d725ae2e1ce7a9b0af27d50a5edc9715d18f39848f9892817599957a5455d5fb69bed0add50663bd2388919a75baf807ac7855046698dbd
-
Filesize
143KB
MD5c576c1a58d32d58db529e4e1f2a11da0
SHA15ea737ee4040e5ebd69ae24ed8c0bb712c911e92
SHA256011cbb5f1546381342636c04bbfc7fb11072c06325d23f772a2a5c0df42aed74
SHA5124752b283fc7d116802110d79d611789cdcf59776f58ade13edc840e0c682ce734de7e902ecbc3e27643f46129fc02b9d2d4ffc1681ceb92a93aab5b85b3ea3df
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd