Analysis
-
max time kernel
61s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2023, 18:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://bs.serving-sys.com
Resource
win10v2004-20230220-en
General
-
Target
http://bs.serving-sys.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133250207521704683" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3268 chrome.exe 3268 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe Token: SeShutdownPrivilege 3268 chrome.exe Token: SeCreatePagefilePrivilege 3268 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe 3268 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3268 wrote to memory of 1248 3268 chrome.exe 84 PID 3268 wrote to memory of 1248 3268 chrome.exe 84 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 2296 3268 chrome.exe 85 PID 3268 wrote to memory of 216 3268 chrome.exe 86 PID 3268 wrote to memory of 216 3268 chrome.exe 86 PID 3268 wrote to memory of 4528 3268 chrome.exe 87 PID 3268 wrote to memory of 4528 3268 chrome.exe 87 PID 3268 wrote to memory of 4528 3268 chrome.exe 87 PID 3268 wrote to memory of 4528 3268 chrome.exe 87 PID 3268 wrote to memory of 4528 3268 chrome.exe 87 PID 3268 wrote to memory of 4528 3268 chrome.exe 87 PID 3268 wrote to memory of 4528 3268 chrome.exe 87 PID 3268 wrote to memory of 4528 3268 chrome.exe 87 PID 3268 wrote to memory of 4528 3268 chrome.exe 87 PID 3268 wrote to memory of 4528 3268 chrome.exe 87 PID 3268 wrote to memory of 4528 3268 chrome.exe 87 PID 3268 wrote to memory of 4528 3268 chrome.exe 87 PID 3268 wrote to memory of 4528 3268 chrome.exe 87 PID 3268 wrote to memory of 4528 3268 chrome.exe 87 PID 3268 wrote to memory of 4528 3268 chrome.exe 87 PID 3268 wrote to memory of 4528 3268 chrome.exe 87 PID 3268 wrote to memory of 4528 3268 chrome.exe 87 PID 3268 wrote to memory of 4528 3268 chrome.exe 87 PID 3268 wrote to memory of 4528 3268 chrome.exe 87 PID 3268 wrote to memory of 4528 3268 chrome.exe 87 PID 3268 wrote to memory of 4528 3268 chrome.exe 87 PID 3268 wrote to memory of 4528 3268 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://bs.serving-sys.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb46e39758,0x7ffb46e39768,0x7ffb46e397782⤵PID:1248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1812,i,16049690138676285529,3605430595306615401,131072 /prefetch:22⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1812,i,16049690138676285529,3605430595306615401,131072 /prefetch:82⤵PID:216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 --field-trial-handle=1812,i,16049690138676285529,3605430595306615401,131072 /prefetch:82⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1812,i,16049690138676285529,3605430595306615401,131072 /prefetch:12⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3080 --field-trial-handle=1812,i,16049690138676285529,3605430595306615401,131072 /prefetch:12⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4548 --field-trial-handle=1812,i,16049690138676285529,3605430595306615401,131072 /prefetch:12⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1812,i,16049690138676285529,3605430595306615401,131072 /prefetch:82⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 --field-trial-handle=1812,i,16049690138676285529,3605430595306615401,131072 /prefetch:82⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5036 --field-trial-handle=1812,i,16049690138676285529,3605430595306615401,131072 /prefetch:12⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5124 --field-trial-handle=1812,i,16049690138676285529,3605430595306615401,131072 /prefetch:12⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5056 --field-trial-handle=1812,i,16049690138676285529,3605430595306615401,131072 /prefetch:12⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5488 --field-trial-handle=1812,i,16049690138676285529,3605430595306615401,131072 /prefetch:12⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3324
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\02b3db08-3e09-496e-b40c-93be796ac6d1.tmp
Filesize6KB
MD59c5ef0a3eb9d300d82d6ed7d9c7ed6fc
SHA1de4d0db76be4ce115a788bd0c620720dc9ad4149
SHA2564dbc989b040dfebcc3ad02117c1eaec9d5a996ed061512ed1db70d1c1b26d5c3
SHA512691777e8e37a87704db0766f33b37eda4608b78bc8c97e88d99cf1a5dd9acfd832b6db1488acd0f98f85702ea747fdc54fbe53d11e4ca6cddf41e89297669b5e
-
Filesize
504B
MD5b5b8be5358f434c204f62daf7ab63ffb
SHA11fdc87361a9f62a9c58cb8a881a5638cb0507a3d
SHA256af7db6635f93f5936822d6499ee8c136fa590d27eab240f3a7b086a188e4c8a6
SHA512a207a45426ef32e96d5a1e0c9044c807209a9bd97ace87dce0d05da4753481474cfe6f7cd4a96a8a6baf98ea589d664df10768ed52487854511694e1ce570804
-
Filesize
538B
MD58c126cc3641ea3d652bbbe0b51bff522
SHA1fc924a0b7b2910fdcc33776d5638917e87fcff1c
SHA2568faeb89506aead9a51548084445ec97b46661fdfc3eaa4a37b69464a631bb926
SHA5120b999dade99cea6b0a2be89de1d6f230a205dea62a90a099da2495ef74ae959883092d362c7a037ad4317c2257eff594d4b6e7fa8924eccdc0d8e72c2aa7afb2
-
Filesize
1KB
MD50e3264511a228c960df32a16a88914c2
SHA1bd68cdab169c972139cb6dfa05d302958e6d6e13
SHA25640e1681352805b196393f1cf5396e1400ad9f1224629d21b6e59c2cea23ef50f
SHA512db5ddd0e963cde26ad43c4626d152cd239034fdf4762b97117524ee80d155e70817b5a7054f06a5d8bd68de6ae4487c72b524e96096cb46f128239bc2472b2fe
-
Filesize
5KB
MD58fa6d19d1cf460ce239e4111814bb947
SHA11a49bd790b16ba6c2d15170eb2d9ef70967ecb63
SHA2569470df105edb9564fc546df4cf67a2dfa0412ea363ddb5ada695c5a237e0669c
SHA5128b5f912801460f09278c572d35655d44a59518722a600207e6fcb7ea76941f177df0c95931ee2e7d9ab30032fef447d85ec192f6de8d222bfb3ba06ae1330e8d
-
Filesize
174KB
MD549c0bfdf225313aa03a10f19e7f8e122
SHA1f01e72fc14bae89e71ed8663edc90de234ea3c42
SHA2561683c7111bb8a55c8244da8b1d7cf8746a641f47f85dbd3673b8ba0b93c88ff6
SHA512dbbc691b7a1fde7ff61d25b8cef5aa541148928f5254e1d74da2fc952509c5f16ca91a97b8cb1c0997d7476957412f2a3c55cbd1408f42e1fa60c99b7ca18a41
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd