Analysis
-
max time kernel
24s -
max time network
27s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-es -
resource tags
arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
18-03-2023 21:42
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://mogagrocol.ru/wp-content/plugins/akismet/fv/[email protected]
Resource
win10v2004-20230220-es
General
-
Target
http://mogagrocol.ru/wp-content/plugins/akismet/fv/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133236530041966110" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 3924 chrome.exe 3924 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe Token: SeShutdownPrivilege 3924 chrome.exe Token: SeCreatePagefilePrivilege 3924 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe 3924 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3924 wrote to memory of 3556 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 3556 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 1604 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 3832 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 3832 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 4224 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 4224 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 4224 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 4224 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 4224 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 4224 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 4224 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 4224 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 4224 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 4224 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 4224 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 4224 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 4224 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 4224 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 4224 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 4224 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 4224 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 4224 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 4224 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 4224 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 4224 3924 chrome.exe chrome.exe PID 3924 wrote to memory of 4224 3924 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://mogagrocol.ru/wp-content/plugins/akismet/fv/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffda1a49758,0x7ffda1a49768,0x7ffda1a497782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1832,i,8958809299033122028,11057895469310417550,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1832,i,8958809299033122028,11057895469310417550,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1832,i,8958809299033122028,11057895469310417550,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3028 --field-trial-handle=1832,i,8958809299033122028,11057895469310417550,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3036 --field-trial-handle=1832,i,8958809299033122028,11057895469310417550,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4840 --field-trial-handle=1832,i,8958809299033122028,11057895469310417550,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4916 --field-trial-handle=1832,i,8958809299033122028,11057895469310417550,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 --field-trial-handle=1832,i,8958809299033122028,11057895469310417550,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5100 --field-trial-handle=1832,i,8958809299033122028,11057895469310417550,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000015Filesize
160KB
MD5f22f07ee02fbeed3958345c90b52b818
SHA12aa44ea19d580589c06c2170103b4d0505e18cdb
SHA256dc1eadf37f70bef92766d0c316d1da7af283b84e5c309a4732d8ed35d7bbfb84
SHA5128473f7cef3e9289f355047689f5a2b82aafc49501c65f118e5b0632a6a690e542eeae45644e77fa5b869df17b05ed138b4183cc93364935b1fa7d89e32fe5d5d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5c83a976d91e67553359bef93f6fc6471
SHA19c69503665b043d6137af731153d0ece11a4d02b
SHA2565d9f1d39a88423b53d1bf6bf1727a6a819eb6fe97835df7ce99307f3b988f463
SHA512aaa436c9dc2f204d0a2f6d0d3bc2c5ee546f67621828e1ee63fc984d4a0dac40e326423d733ba3a056a805f6b8da5966127512af8ce4986a9440a0e4ec6a2282
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
15KB
MD5f7c8f7f5b821accd31c231da98ac6536
SHA1b4b26d8904240573d87364010a22c539a9f228d0
SHA2563ef72daa5da670906341f7cfa914c2f967f61d98a3b63ed3afa5050c431d8690
SHA512811b5066a96ba5be5a6823d2505333e6bee01afa500309d0d7fe904d63f810ca32d19d227d5120c5005591d8553825c62344d2683ea471f006ad8e197f310750
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
145KB
MD50e154356ed6cf4df6c38df57d6356f50
SHA1c181ffad7c1b93272a08fdb964b8f23e35ee5f4e
SHA256eab8762363115d8b02b40cc1803c9ec929af46d4fe8c04d6f4ad65c71764cb87
SHA512259943868538923448b644fad62a54953d20af8a2efda1dbd281827cbfaf02bfa8ddc764f9b87ad29041ba3f1e9c73b368c6d5188a820405a5b7300cfdfc0a9b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
72KB
MD5a8072dd9cd25fda393f7bf6cf2b7a6c5
SHA12ae54f099a2abbd6e3813798f4ebeb66a8b68dd9
SHA2567450613e878ae192f64fb73c05e44e5d9a0c4ceadcd014df7210e010ebbb36c0
SHA5122973730ba61f11091bd9175514a472f05a8f67b3bf6ad068e11ce686b241433458202e639671831a32f568342c62e5ddbdd41bc49f61ebf96a5c07076458342b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_3924_QDDQHWSYWBWNFZDWMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e