Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20-03-2023 02:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ums.koreanair.com/Check.html?redirectUrl=9JRD01MTMy&U1RZUEU9TUFTUw=TElTVF9UQUJMRT1FTVNfTUFTU19TRU5EX0xJU1Q=E9TVF9JRD0yMDE5MDkyMzAwMDAy&VEM9MjAxOTEwMjM=0lORD1D&Q0lEPTAwMg=URL=https://ums.koreanair.com/Check.html?redirectUrl=9JRD01MTMy&U1RZUEU9TUFTUw=TElTVF9UQUJMRT1FTVNfTUFTU19TRU5EX0xJU1Q=E9TVF9JRD0yMDE5MDkyMzAwMDAy&VEM9MjAxOTEwMjM=0lORD1D&Q0lEPTAwMg=URL=https://scgfounders.com/elup/jobwan///[email protected]
Resource
win10v2004-20230220-en
General
-
Target
https://ums.koreanair.com/Check.html?redirectUrl=9JRD01MTMy&U1RZUEU9TUFTUw=TElTVF9UQUJMRT1FTVNfTUFTU19TRU5EX0xJU1Q=E9TVF9JRD0yMDE5MDkyMzAwMDAy&VEM9MjAxOTEwMjM=0lORD1D&Q0lEPTAwMg=URL=https://ums.koreanair.com/Check.html?redirectUrl=9JRD01MTMy&U1RZUEU9TUFTUw=TElTVF9UQUJMRT1FTVNfTUFTU19TRU5EX0xJU1Q=E9TVF9JRD0yMDE5MDkyMzAwMDAy&VEM9MjAxOTEwMjM=0lORD1D&Q0lEPTAwMg=URL=https://scgfounders.com/elup/jobwan///[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133237559655464494" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2596 chrome.exe 2596 chrome.exe 3860 chrome.exe 3860 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2596 chrome.exe 2596 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2596 wrote to memory of 1508 2596 chrome.exe 85 PID 2596 wrote to memory of 1508 2596 chrome.exe 85 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 1824 2596 chrome.exe 86 PID 2596 wrote to memory of 2876 2596 chrome.exe 87 PID 2596 wrote to memory of 2876 2596 chrome.exe 87 PID 2596 wrote to memory of 2200 2596 chrome.exe 88 PID 2596 wrote to memory of 2200 2596 chrome.exe 88 PID 2596 wrote to memory of 2200 2596 chrome.exe 88 PID 2596 wrote to memory of 2200 2596 chrome.exe 88 PID 2596 wrote to memory of 2200 2596 chrome.exe 88 PID 2596 wrote to memory of 2200 2596 chrome.exe 88 PID 2596 wrote to memory of 2200 2596 chrome.exe 88 PID 2596 wrote to memory of 2200 2596 chrome.exe 88 PID 2596 wrote to memory of 2200 2596 chrome.exe 88 PID 2596 wrote to memory of 2200 2596 chrome.exe 88 PID 2596 wrote to memory of 2200 2596 chrome.exe 88 PID 2596 wrote to memory of 2200 2596 chrome.exe 88 PID 2596 wrote to memory of 2200 2596 chrome.exe 88 PID 2596 wrote to memory of 2200 2596 chrome.exe 88 PID 2596 wrote to memory of 2200 2596 chrome.exe 88 PID 2596 wrote to memory of 2200 2596 chrome.exe 88 PID 2596 wrote to memory of 2200 2596 chrome.exe 88 PID 2596 wrote to memory of 2200 2596 chrome.exe 88 PID 2596 wrote to memory of 2200 2596 chrome.exe 88 PID 2596 wrote to memory of 2200 2596 chrome.exe 88 PID 2596 wrote to memory of 2200 2596 chrome.exe 88 PID 2596 wrote to memory of 2200 2596 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://ums.koreanair.com/Check.html?redirectUrl=9JRD01MTMy&U1RZUEU9TUFTUw=TElTVF9UQUJMRT1FTVNfTUFTU19TRU5EX0xJU1Q=E9TVF9JRD0yMDE5MDkyMzAwMDAy&VEM9MjAxOTEwMjM=0lORD1D&Q0lEPTAwMg=URL=https://ums.koreanair.com/Check.html?redirectUrl=9JRD01MTMy&U1RZUEU9TUFTUw=TElTVF9UQUJMRT1FTVNfTUFTU19TRU5EX0xJU1Q=E9TVF9JRD0yMDE5MDkyMzAwMDAy&VEM9MjAxOTEwMjM=0lORD1D&Q0lEPTAwMg=URL=https://scgfounders.com/elup/jobwan///[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfb949758,0x7ffcfb949768,0x7ffcfb9497782⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1812,i,16453063146320297772,2098724913386107420,131072 /prefetch:22⤵PID:1824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,16453063146320297772,2098724913386107420,131072 /prefetch:82⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1812,i,16453063146320297772,2098724913386107420,131072 /prefetch:82⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3184 --field-trial-handle=1812,i,16453063146320297772,2098724913386107420,131072 /prefetch:12⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3152 --field-trial-handle=1812,i,16453063146320297772,2098724913386107420,131072 /prefetch:12⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 --field-trial-handle=1812,i,16453063146320297772,2098724913386107420,131072 /prefetch:82⤵PID:1356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5044 --field-trial-handle=1812,i,16453063146320297772,2098724913386107420,131072 /prefetch:82⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 --field-trial-handle=1812,i,16453063146320297772,2098724913386107420,131072 /prefetch:82⤵PID:1476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3720 --field-trial-handle=1812,i,16453063146320297772,2098724913386107420,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3860
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2152
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5abb60741cfd195425aef201b9d73518c
SHA1de6e5e4fa1c69369bcd8fab43ba56ecd062ade65
SHA25689fe95118e7450a4fac857026d71535254489184e98587fd3c477bd4fe121423
SHA512c039034ceffb184fb73b5e5baac99dceda43f85f5573f01873f819fe1154a7731462e7bdb1ef1a61eec17cbe9e724a19f1bfff363935044e773a2dcc4aaaebee
-
Filesize
6KB
MD5adb7cbd2feeee75f615a7579e8ba3f07
SHA16db58842b92e78600c8a05b8a5daaa4af8dd38b6
SHA2561c0da82cd0ff18a25ea947fca6a36aa3782df3bca0758aad21efed250ff43f0d
SHA512e5ce18d9a2c4ca511595dda26f84f5271d012ed5e1b0dbb2ce2f8d82c292961bb00c6739a14657b1155d8b7aba5dfb418e1d499f3b44f7929d14f9424c6ce780
-
Filesize
15KB
MD5c64cfc04ae8bcec56f28088aff631ba7
SHA1c5f1fd9856a7bcd379a4cba46cefaf9fd15bf722
SHA256edd9bc70f494cf188d4e094a64b1fa08017989daca81b5f02aeaa1c0e9851fa5
SHA51266cc1aa4a65674c988ccf385e49e0c604fa7121eeae1d4a4c1ea16f5fbd243ba587e70fc16a2ab600512f00c9f22e740c4b4e916ed79a898485e8796d7a00e05
-
Filesize
143KB
MD550e11babe5114f7bc6ea9030981aaff6
SHA148e4502f06f9e7a17c68ea92ec4bfc429cc327c0
SHA2561be17d02f9fd3edcaf601cc6b1d4e725b017ff20ab1da7f7dfbd6fa6cf0240a1
SHA512e8400b76e8fbb4aa2289d3adb2e12cbca67f5d11554d84aac13bf7ab1b2a69fff734b8c0f21a42dd5cb1c551b3f76c48fdef18c392e082f197edc53b7b9c4e4d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd