Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30-03-2023 15:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://flexgrades.com/aie4m
Resource
win10v2004-20230220-en
General
-
Target
https://flexgrades.com/aie4m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133246695847644769" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2804 chrome.exe 2804 chrome.exe 4860 chrome.exe 4860 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2804 wrote to memory of 724 2804 chrome.exe 85 PID 2804 wrote to memory of 724 2804 chrome.exe 85 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 1796 2804 chrome.exe 86 PID 2804 wrote to memory of 3980 2804 chrome.exe 87 PID 2804 wrote to memory of 3980 2804 chrome.exe 87 PID 2804 wrote to memory of 1624 2804 chrome.exe 88 PID 2804 wrote to memory of 1624 2804 chrome.exe 88 PID 2804 wrote to memory of 1624 2804 chrome.exe 88 PID 2804 wrote to memory of 1624 2804 chrome.exe 88 PID 2804 wrote to memory of 1624 2804 chrome.exe 88 PID 2804 wrote to memory of 1624 2804 chrome.exe 88 PID 2804 wrote to memory of 1624 2804 chrome.exe 88 PID 2804 wrote to memory of 1624 2804 chrome.exe 88 PID 2804 wrote to memory of 1624 2804 chrome.exe 88 PID 2804 wrote to memory of 1624 2804 chrome.exe 88 PID 2804 wrote to memory of 1624 2804 chrome.exe 88 PID 2804 wrote to memory of 1624 2804 chrome.exe 88 PID 2804 wrote to memory of 1624 2804 chrome.exe 88 PID 2804 wrote to memory of 1624 2804 chrome.exe 88 PID 2804 wrote to memory of 1624 2804 chrome.exe 88 PID 2804 wrote to memory of 1624 2804 chrome.exe 88 PID 2804 wrote to memory of 1624 2804 chrome.exe 88 PID 2804 wrote to memory of 1624 2804 chrome.exe 88 PID 2804 wrote to memory of 1624 2804 chrome.exe 88 PID 2804 wrote to memory of 1624 2804 chrome.exe 88 PID 2804 wrote to memory of 1624 2804 chrome.exe 88 PID 2804 wrote to memory of 1624 2804 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://flexgrades.com/aie4m1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xb4,0xe0,0x104,0x40,0x108,0x7ffa03a89758,0x7ffa03a89768,0x7ffa03a897782⤵PID:724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1812,i,8896760578305776773,18290100533123816942,131072 /prefetch:22⤵PID:1796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,8896760578305776773,18290100533123816942,131072 /prefetch:82⤵PID:3980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2164 --field-trial-handle=1812,i,8896760578305776773,18290100533123816942,131072 /prefetch:82⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3184 --field-trial-handle=1812,i,8896760578305776773,18290100533123816942,131072 /prefetch:12⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3204 --field-trial-handle=1812,i,8896760578305776773,18290100533123816942,131072 /prefetch:12⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4648 --field-trial-handle=1812,i,8896760578305776773,18290100533123816942,131072 /prefetch:12⤵PID:1744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3388 --field-trial-handle=1812,i,8896760578305776773,18290100533123816942,131072 /prefetch:82⤵PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3592 --field-trial-handle=1812,i,8896760578305776773,18290100533123816942,131072 /prefetch:82⤵PID:3496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3592 --field-trial-handle=1812,i,8896760578305776773,18290100533123816942,131072 /prefetch:82⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2764 --field-trial-handle=1812,i,8896760578305776773,18290100533123816942,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3892
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
955B
MD5a0b5f746bf9d67dd18156b9521413196
SHA1a31e46f820b0832f1ed8036ec0bd4663491a822e
SHA2563cdca55c980b44b5001fb00fbb8f7449d3d7f4c7edda06d48e63ab6e85e72262
SHA512d54186f1b9224e953de4a86f662217617811d496d7eeec4c3eb4b3af5d6758acdd1e6703f8f8c06ed1fb5d7527c94b0a41b6b899d85355a68b0bcd94631784a3
-
Filesize
6KB
MD51b2911fbe750b1dc6e0bd7e7ff9a32e6
SHA19201bfd564995ceccc681f66258d7fd27af0e1cc
SHA256cf3d9c3f801dabd0674457cd9518b94ebce6dd83aad4ddd21ae50ef52343c915
SHA512247c97f191c2e7cbca613b40133349dfd643e3f9c6e318ad26b438a873c7b2c4d50a5caff187859765325319910c7af9da68e0bd82d8c1bd40b4c2dd6b578db6
-
Filesize
15KB
MD5dd865e1ca8dc2e6cc782dae6c19ca755
SHA1635d86539f23af3481eeec4d258ce194387f3875
SHA256dabf42bcc7ab6fd08ab4fd2653f8c8761c7642b04e755cba69449b4ac1ab5be4
SHA512a91dff433d78c40d5aeee51da6579b06d90b5ea0510e6222991dbe8fa027e7ad91e700dcef244cf1688a806384baf10327ff0c0c0ae270f6b65e90e3e154d3d9
-
Filesize
145KB
MD5ac5b0f60707b3083982de7eacc5f8673
SHA1d31f99d7a431c7654f9b3731bf556344575ae77f
SHA2569b4f249f52445729caa460ae9bb70b1a650f680bab6aa61a6c802ffdb923fcd4
SHA5125c82f204abc47ec62b409da78be0ba02aeeae58cfca195a2837d6ab66009cbdc7be1089cc7dd1f090e97b3373d8093a225b176af4553c509137621c3ff9c8bb3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd