Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 12:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://brandequity.economictimes.indiatimes.com/etl.php?url=https%3A%2F%2Fnancysupo.com%2FNew%2FAuth%2F/vtcos1%2F%2F%2F%[email protected]
Resource
win10v2004-20230220-en
General
-
Target
https://brandequity.economictimes.indiatimes.com/etl.php?url=https%3A%2F%2Fnancysupo.com%2FNew%2FAuth%2F/vtcos1%2F%2F%2F%[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133241398940439400" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 1720 chrome.exe 1720 chrome.exe 4640 chrome.exe 4640 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1720 wrote to memory of 1468 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 1468 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 2292 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4980 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4980 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4776 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4776 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4776 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4776 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4776 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4776 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4776 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4776 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4776 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4776 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4776 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4776 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4776 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4776 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4776 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4776 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4776 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4776 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4776 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4776 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4776 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4776 1720 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://brandequity.economictimes.indiatimes.com/etl.php?url=https%3A%2F%2Fnancysupo.com%2FNew%2FAuth%2F/vtcos1%2F%2F%2F%[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9d9529758,0x7ff9d9529768,0x7ff9d95297782⤵PID:1468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1768,i,3203631770757799957,412635851188633677,131072 /prefetch:22⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1768,i,3203631770757799957,412635851188633677,131072 /prefetch:82⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1768,i,3203631770757799957,412635851188633677,131072 /prefetch:82⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3156 --field-trial-handle=1768,i,3203631770757799957,412635851188633677,131072 /prefetch:12⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3152 --field-trial-handle=1768,i,3203631770757799957,412635851188633677,131072 /prefetch:12⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4532 --field-trial-handle=1768,i,3203631770757799957,412635851188633677,131072 /prefetch:12⤵PID:1652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3864 --field-trial-handle=1768,i,3203631770757799957,412635851188633677,131072 /prefetch:12⤵PID:4392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 --field-trial-handle=1768,i,3203631770757799957,412635851188633677,131072 /prefetch:82⤵PID:3952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 --field-trial-handle=1768,i,3203631770757799957,412635851188633677,131072 /prefetch:82⤵PID:208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3364 --field-trial-handle=1768,i,3203631770757799957,412635851188633677,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4640
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3476
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD53b4e1ec3234bacd1f20cdc5df62e7126
SHA145d94f3608fc98ce3d9d70d7685881c892671f35
SHA256c7795b288a76979f55ecaf64cb1b1d030ff538a355379d152d9a7f36b6ebc2b4
SHA512673cf2abc8d7087649df8422d2ccbdd85b46bdc140371192308585c55a5084ade2752d1f9048ffb5662a56a41c37e07c18c4c217cda66440d4a5062fa2b99bec
-
Filesize
2KB
MD5e94278f86631ea8989c92275c11e4864
SHA146e627fb7198e8d5ebfb155b34fbbf8d88835ebe
SHA256ea2a3412d6c8292a18ca2093b727fa375f5b302e9a914d389e431a41af5d6b68
SHA51282abbf2972ffd379fb912d12c3514680f8d8f4423086e6d200d590347ef2a6b4788ceb8ce49345b0ab8b52ce5fd9527fbb988e0efcae14fc7bad953e41f56fc5
-
Filesize
1KB
MD5e662923fbe66abf5f3fab8001e42262c
SHA1ef97615a5c7499dbb052f5a2ea893b1a3a82f363
SHA256b115a54c89fab551b73e059e92fdd07537e784003f218854a2fdd7f990bcccad
SHA512080db9d829984c2b7b7a33608fd0c38255ab3e292fd24767e96a9ad92d74ee5db022c8d7aa538e7f6b795fa0247aa1000cfb3a3761a9a199023b2e59b82f08f7
-
Filesize
4KB
MD5aa17ea5d2dd881d02e3193ffd1a9a98e
SHA16591932db84577610da3d6f4502f8beac4f99e32
SHA2565f8d2b7546a85a7dc6340ab030879fbfaefed54dfc59573d11541f6f8f99ac40
SHA51222033f79a517f598aac194b1885c7466888814ba063f91c05b7fb07151476f50ec6393c348491db72201546de2dcfd8c035cd03f98047797349157ae45796b46
-
Filesize
5KB
MD546732591daae56b09a5c5060d22508ed
SHA15fa402251f0e9bdf96b23526b263d32300369120
SHA25637338d105279a0dbf8556b9eb01e346d61c6b728a10285c2e0a9188229c5963e
SHA512abf8cfa5b368f96c8af96238a9e4fc41ece7fd1a7352742322c6edbbea7a841695721f2285f4823cc52aa4b0b4e336d97477a21fc58e94ce018e1c6f52a33497
-
Filesize
4KB
MD518ef484e2cd4ffbb1e26c34d0cbc3efd
SHA1a0f3bf3cb1e6a20f3eb8813d8843627e3228b273
SHA2568a47b10bc0e940078175129d3d9fe7bef84904cdb251c8a3163b066e104769cd
SHA512af60e7e0161ad29c3503488206cd3b2ee57a3aea9b68494c1dc4bdeecdb611318e9edec47ae280071b6a2ef582bf844d950eb1a094c26b066a373cda21f644c2
-
Filesize
144KB
MD588625f18321baa1e1e43de1fcee4272f
SHA1ad17843981278bd72d49c569e65deaa2924fab3d
SHA256f7fe5850e7ee78a493d5a9da6f5e94df933fd8be032815431e7b0298fb568a0f
SHA51249822813f175b9a891b7e99c8cb0c8ddddc6583977739313e0b92e97e211685e46bf744c5817ece1f8a4407bd3e70b2edd0f72011367b3237cf6a937a54a0aa6
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e