Analysis
-
max time kernel
66s -
max time network
69s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/03/2023, 14:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://jobsforu.ca
Resource
win10v2004-20230220-en
General
-
Target
http://jobsforu.ca
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133238861690772443" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 872 chrome.exe 872 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 872 wrote to memory of 4216 872 chrome.exe 85 PID 872 wrote to memory of 4216 872 chrome.exe 85 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 4656 872 chrome.exe 86 PID 872 wrote to memory of 996 872 chrome.exe 87 PID 872 wrote to memory of 996 872 chrome.exe 87 PID 872 wrote to memory of 3924 872 chrome.exe 88 PID 872 wrote to memory of 3924 872 chrome.exe 88 PID 872 wrote to memory of 3924 872 chrome.exe 88 PID 872 wrote to memory of 3924 872 chrome.exe 88 PID 872 wrote to memory of 3924 872 chrome.exe 88 PID 872 wrote to memory of 3924 872 chrome.exe 88 PID 872 wrote to memory of 3924 872 chrome.exe 88 PID 872 wrote to memory of 3924 872 chrome.exe 88 PID 872 wrote to memory of 3924 872 chrome.exe 88 PID 872 wrote to memory of 3924 872 chrome.exe 88 PID 872 wrote to memory of 3924 872 chrome.exe 88 PID 872 wrote to memory of 3924 872 chrome.exe 88 PID 872 wrote to memory of 3924 872 chrome.exe 88 PID 872 wrote to memory of 3924 872 chrome.exe 88 PID 872 wrote to memory of 3924 872 chrome.exe 88 PID 872 wrote to memory of 3924 872 chrome.exe 88 PID 872 wrote to memory of 3924 872 chrome.exe 88 PID 872 wrote to memory of 3924 872 chrome.exe 88 PID 872 wrote to memory of 3924 872 chrome.exe 88 PID 872 wrote to memory of 3924 872 chrome.exe 88 PID 872 wrote to memory of 3924 872 chrome.exe 88 PID 872 wrote to memory of 3924 872 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://jobsforu.ca1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff864bc9758,0x7ff864bc9768,0x7ff864bc97782⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1808,i,16378113197675067577,2033018251405676993,131072 /prefetch:22⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1808,i,16378113197675067577,2033018251405676993,131072 /prefetch:82⤵PID:996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1808,i,16378113197675067577,2033018251405676993,131072 /prefetch:82⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3032 --field-trial-handle=1808,i,16378113197675067577,2033018251405676993,131072 /prefetch:12⤵PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1808,i,16378113197675067577,2033018251405676993,131072 /prefetch:12⤵PID:2944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4716 --field-trial-handle=1808,i,16378113197675067577,2033018251405676993,131072 /prefetch:12⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3180 --field-trial-handle=1808,i,16378113197675067577,2033018251405676993,131072 /prefetch:12⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2976 --field-trial-handle=1808,i,16378113197675067577,2033018251405676993,131072 /prefetch:12⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4836 --field-trial-handle=1808,i,16378113197675067577,2033018251405676993,131072 /prefetch:12⤵PID:3440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4524 --field-trial-handle=1808,i,16378113197675067577,2033018251405676993,131072 /prefetch:12⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5204 --field-trial-handle=1808,i,16378113197675067577,2033018251405676993,131072 /prefetch:12⤵PID:1552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5452 --field-trial-handle=1808,i,16378113197675067577,2033018251405676993,131072 /prefetch:82⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5516 --field-trial-handle=1808,i,16378113197675067577,2033018251405676993,131072 /prefetch:82⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 --field-trial-handle=1808,i,16378113197675067577,2033018251405676993,131072 /prefetch:82⤵PID:3080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5320 --field-trial-handle=1808,i,16378113197675067577,2033018251405676993,131072 /prefetch:12⤵PID:3860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=5512 --field-trial-handle=1808,i,16378113197675067577,2033018251405676993,131072 /prefetch:12⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:736
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\6cdae786-e6ff-4870-af59-c41afa89c982.tmp
Filesize6KB
MD5a2b484659d31047c070be730318dcb00
SHA151936379324ade8dd6e34481266202c6d90d1d73
SHA25623210df5a9324289d124b5bbe2724855d91921894d818cf0063f43cfe9430bca
SHA512ca900b10f95c502e43f9b3c58a98a2cea257e563825823a6734b17ac2c1a5ccca535b4c53eae2f94e7ea9529a17b03d450e57bab934a2a2307c902d8f9460ca6
-
Filesize
538B
MD5f7c056f861b090a91988fc3a923ddf43
SHA177058efb017ee86868abfbc271bb846ed2b773bf
SHA256f6f7f71f75fb9343621e99471bb847ac4ac80ce49dd0719295de5d6250f6b2e5
SHA512a313ef3cc6176620846f4411f9d411b1b84fe5e455be17eb20bd1ea075a96cb87680bd4fdead34dcbb36532f8f1a3120e1e50696459b9547858aceabdecda7c6
-
Filesize
15KB
MD507961430bf23f3762b38ac187e2bc207
SHA1896eb74425e30559963946b97912c3e80bea4a28
SHA256b7dc8e690ca18d5a49ecd72265d545c2c2968f24bcddbdef3c151564582ec23a
SHA51290c466e92d8afa462e4eeb7408b5f918f0eabcc568341c2f388651ea5564c1f2589d0d178a6b1b0f4a270092be870ab18fabf9daceee766c3ddbccc3b870dd19
-
Filesize
15KB
MD501a9eee8dabdf97c97783ded9e129b52
SHA1c208fcb3303cd459dcb530769685d476d3743379
SHA256520a9d9dcfa9f41a9feca1243e1b087e20a3ea725f077b8e71f7b850cd0e0181
SHA5126cebeaaff5fe0dc7c1a0dba5110966585e40380ca3c0fb2f0bfe760a3d62e12fc075c5a1f25e4d5e604ca3233fab6480ecd6c369547abaa72a3719c60dc935d2
-
Filesize
144KB
MD51afd886973365f3407ebbe6f397490f2
SHA1e91db9a0517d5b828265517860b6eed301f84df6
SHA25676bbc1f1fee8ee9a46aabacf24cb40c3d7fb37a6a3d77fb31b7b9e698187e578
SHA512b9255326b9162c8b977017967e351a6f431b500f7900285d72790e5cdd45df558df2e29a8cd72f212fb1a5f75850b52a1f3ecedbf2585f73d72ff61bc05416b0