Analysis
-
max time kernel
1800s -
max time network
1688s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2023, 23:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://sascollegekonni.in/assets/css/font/jsysg
Resource
win10v2004-20230220-en
General
-
Target
http://sascollegekonni.in/assets/css/font/jsysg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133243558030563771" chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1032 chrome.exe 1032 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe Token: SeShutdownPrivilege 1884 chrome.exe Token: SeCreatePagefilePrivilege 1884 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe 1884 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1884 wrote to memory of 1188 1884 chrome.exe 82 PID 1884 wrote to memory of 1188 1884 chrome.exe 82 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 5024 1884 chrome.exe 83 PID 1884 wrote to memory of 4528 1884 chrome.exe 84 PID 1884 wrote to memory of 4528 1884 chrome.exe 84 PID 1884 wrote to memory of 4288 1884 chrome.exe 85 PID 1884 wrote to memory of 4288 1884 chrome.exe 85 PID 1884 wrote to memory of 4288 1884 chrome.exe 85 PID 1884 wrote to memory of 4288 1884 chrome.exe 85 PID 1884 wrote to memory of 4288 1884 chrome.exe 85 PID 1884 wrote to memory of 4288 1884 chrome.exe 85 PID 1884 wrote to memory of 4288 1884 chrome.exe 85 PID 1884 wrote to memory of 4288 1884 chrome.exe 85 PID 1884 wrote to memory of 4288 1884 chrome.exe 85 PID 1884 wrote to memory of 4288 1884 chrome.exe 85 PID 1884 wrote to memory of 4288 1884 chrome.exe 85 PID 1884 wrote to memory of 4288 1884 chrome.exe 85 PID 1884 wrote to memory of 4288 1884 chrome.exe 85 PID 1884 wrote to memory of 4288 1884 chrome.exe 85 PID 1884 wrote to memory of 4288 1884 chrome.exe 85 PID 1884 wrote to memory of 4288 1884 chrome.exe 85 PID 1884 wrote to memory of 4288 1884 chrome.exe 85 PID 1884 wrote to memory of 4288 1884 chrome.exe 85 PID 1884 wrote to memory of 4288 1884 chrome.exe 85 PID 1884 wrote to memory of 4288 1884 chrome.exe 85 PID 1884 wrote to memory of 4288 1884 chrome.exe 85 PID 1884 wrote to memory of 4288 1884 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://sascollegekonni.in/assets/css/font/jsysg1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa27ff9758,0x7ffa27ff9768,0x7ffa27ff97782⤵PID:1188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1788,i,6238571897395855159,273701909077586171,131072 /prefetch:22⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1788,i,6238571897395855159,273701909077586171,131072 /prefetch:82⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1788,i,6238571897395855159,273701909077586171,131072 /prefetch:82⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3112 --field-trial-handle=1788,i,6238571897395855159,273701909077586171,131072 /prefetch:12⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3124 --field-trial-handle=1788,i,6238571897395855159,273701909077586171,131072 /prefetch:12⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4516 --field-trial-handle=1788,i,6238571897395855159,273701909077586171,131072 /prefetch:12⤵PID:3948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4716 --field-trial-handle=1788,i,6238571897395855159,273701909077586171,131072 /prefetch:82⤵PID:1092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4904 --field-trial-handle=1788,i,6238571897395855159,273701909077586171,131072 /prefetch:82⤵PID:796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4868 --field-trial-handle=1788,i,6238571897395855159,273701909077586171,131072 /prefetch:82⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3140 --field-trial-handle=1788,i,6238571897395855159,273701909077586171,131072 /prefetch:82⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2828 --field-trial-handle=1788,i,6238571897395855159,273701909077586171,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1032
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4332
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD510e4bee62893f34aa4815bdc03c77140
SHA136f6acc3704be2aa37bbdc31208452a063799753
SHA256127a6368aa738d484b45d7c136bf9e72a01d462ca28146f059c3ee74d097193f
SHA512b3d37d760b33b40bc29c746e1b2375477d5a1a77c977c0403523ff29e320acaa3072c2934a85c8b234bcff69f56be4116b0393ea57b8aca2e562a1a3815aa2bb
-
Filesize
6KB
MD5298ad5b7eff750363ca5ed319ba6ee84
SHA11c24fd7dd2ea13abae89d971e2fa691b94aac5d7
SHA256af176cfc4ca4a58b8d1370c1d829c442fb5125934ba1d1f217408f044377ea0c
SHA512a00ce9a44e2addec69a4b3f28a8a73b91f739f51625055e5c9ad5c1e9685cdb96c65b131d9d89341583b0673f7a0610e39acccdcfe0577fad4cf87dda3a976be
-
Filesize
15KB
MD5455dd4579deed83680bc64b4f5155655
SHA180096c23a015d3e2e8c99943c8eb32f8f5d7ba9b
SHA256c5aa0a5dc780c5bf1cf87f5538ddedffe5c6334a1cf2c23b265cee573b8f8967
SHA512c7155941b3bdb60147320e09c5b889dfcda1ec7980b05068533133537c99281d25935c652dc24de22a4a960d02d0058aff9bcda7fb1b9801a061715d1ac51eac
-
Filesize
144KB
MD5b8275e8ecedc405f5af5ebb780e3f70b
SHA1de4b282ce75b187ba2f3cf8979c2724c2aa51c0e
SHA2567ec3202f8578abfb2e91fc791b790a21abc2b607b646ac2338efeeedfc6db7e5
SHA51271bbadc17e3637b650691538923f0983cb405253e471f26ee19f3ab47bad9b894bc80bb20e25212b9ac44836218906b85a57a48548ad752a81e690c1534a2426
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2.1MB
MD5a326a8e75099c18b986558bd026b8fa5
SHA100e94563144ebfe236f35f7483ff9707ddf02714
SHA256ca88100653905b244bc827b9acff81517c063996ea09530fd171f3322a516b9a
SHA51275458be988c42c4153018a3ef8b62bbbc3652a7240376f0d0ffaaa48ad692831dad650e539521206b88b27eaca7b86d4f34bcccdcd9f980d02b157cba3f3ff93