Analysis
-
max time kernel
253s -
max time network
256s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2023, 20:25
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://monikainternational.co.in/net/fitin/sf_rand_string_mixed(3)////[email protected]?sso=1&sso_redirect_count=2&access_token=
Resource
win10v2004-20230221-en
General
-
Target
https://monikainternational.co.in/net/fitin/sf_rand_string_mixed(3)////[email protected]?sso=1&sso_redirect_count=2&access_token=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133258983415957476" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4924 chrome.exe 4924 chrome.exe 1492 chrome.exe 1492 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4924 wrote to memory of 4876 4924 chrome.exe 84 PID 4924 wrote to memory of 4876 4924 chrome.exe 84 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 616 4924 chrome.exe 85 PID 4924 wrote to memory of 3144 4924 chrome.exe 86 PID 4924 wrote to memory of 3144 4924 chrome.exe 86 PID 4924 wrote to memory of 3972 4924 chrome.exe 87 PID 4924 wrote to memory of 3972 4924 chrome.exe 87 PID 4924 wrote to memory of 3972 4924 chrome.exe 87 PID 4924 wrote to memory of 3972 4924 chrome.exe 87 PID 4924 wrote to memory of 3972 4924 chrome.exe 87 PID 4924 wrote to memory of 3972 4924 chrome.exe 87 PID 4924 wrote to memory of 3972 4924 chrome.exe 87 PID 4924 wrote to memory of 3972 4924 chrome.exe 87 PID 4924 wrote to memory of 3972 4924 chrome.exe 87 PID 4924 wrote to memory of 3972 4924 chrome.exe 87 PID 4924 wrote to memory of 3972 4924 chrome.exe 87 PID 4924 wrote to memory of 3972 4924 chrome.exe 87 PID 4924 wrote to memory of 3972 4924 chrome.exe 87 PID 4924 wrote to memory of 3972 4924 chrome.exe 87 PID 4924 wrote to memory of 3972 4924 chrome.exe 87 PID 4924 wrote to memory of 3972 4924 chrome.exe 87 PID 4924 wrote to memory of 3972 4924 chrome.exe 87 PID 4924 wrote to memory of 3972 4924 chrome.exe 87 PID 4924 wrote to memory of 3972 4924 chrome.exe 87 PID 4924 wrote to memory of 3972 4924 chrome.exe 87 PID 4924 wrote to memory of 3972 4924 chrome.exe 87 PID 4924 wrote to memory of 3972 4924 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://monikainternational.co.in/net/fitin/sf_rand_string_mixed(3)////[email protected]?sso=1&sso_redirect_count=2&access_token=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffadf309758,0x7ffadf309768,0x7ffadf3097782⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1820,i,2327017365385863157,1810115489630443812,131072 /prefetch:22⤵PID:616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1820,i,2327017365385863157,1810115489630443812,131072 /prefetch:82⤵PID:3144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1820,i,2327017365385863157,1810115489630443812,131072 /prefetch:82⤵PID:3972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3196 --field-trial-handle=1820,i,2327017365385863157,1810115489630443812,131072 /prefetch:12⤵PID:4472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3208 --field-trial-handle=1820,i,2327017365385863157,1810115489630443812,131072 /prefetch:12⤵PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4796 --field-trial-handle=1820,i,2327017365385863157,1810115489630443812,131072 /prefetch:12⤵PID:940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 --field-trial-handle=1820,i,2327017365385863157,1810115489630443812,131072 /prefetch:82⤵PID:1652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5192 --field-trial-handle=1820,i,2327017365385863157,1810115489630443812,131072 /prefetch:82⤵PID:1576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 --field-trial-handle=1820,i,2327017365385863157,1810115489630443812,131072 /prefetch:82⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2820 --field-trial-handle=1820,i,2327017365385863157,1810115489630443812,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1492
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1308
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD5e16995b14c35907ad934ee11389d3f59
SHA1c8072ab3cff894dbf88fe7a274af1e7b394c8137
SHA256366b9ed8f6af52eb9f86adae565347edb7fe213811c81e70d029ecc4d1f29257
SHA512f2b66a243a096cc815d7d86be3029f34614c854ceccfb2d79873b70affc6ed6ca948c9fdfe139c1571d6367496c9f4d3c6f6edf22243281e4535410aa182c80d
-
Filesize
2KB
MD58a07d96e2492ded5f29f293e68549d50
SHA1eae63f57d5a62355d3316c35f7f905176067fd43
SHA2569b926773089b429f4ca046abdccdccabfadf55df539da222b5848e15bce59b21
SHA512d0333ea1a587e21f44746011010e8ebbf0331676f2c3bbe898a0ff0733c4e23eb9ca53922ff0f0baac3e5df099b31d2af541fca639ec8b2f5e79588f731a305e
-
Filesize
874B
MD5a7c9d12ef7be01a70fb189274755716a
SHA13f97c1aa81b96f5d50ff155e2cdc85cb6f419e0d
SHA256e29d7f5b3447c137b95a103172c9df466d92c18c029093168cad74fd8ecc25b1
SHA51228cd6cda3453bb82215fd521ccf8afde86fcf2e65d80fa5206bf09d256497ba164720301141c2149981d847ed60f6737843dc8f15e72f7ac87e335086d2b3413
-
Filesize
6KB
MD52feb3aca87927adf36d860173914f647
SHA16e2ee082695e2f9c84ee792d3f51e2f11effaf87
SHA256d17850cc8fe7a0662c0750ac3afe0d13c7916aa556a1b0cd5b4421492e4d3c85
SHA51242cd45136e7ff49dfd11eedaf08d34950eaf2df37a831a3de1913c760a4ed5475ca7482a6817af7e61e62428aec0ae8099d76573ffbb89e5779f7da621635a70
-
Filesize
6KB
MD51b3850f6147a94b6a54592d5e7521de1
SHA1866b55af05a33630f301b941f05219f75cb18bee
SHA2566169f4ca0b4b632bc8a65249f7fa9e137ce77f8065639279f202efbeb66be1d2
SHA512db8639b7a84872b122e00e04c96c4db04da7c0087e9866a44d4354d5830d6598382f6dbd865a3f56bee7d8e4bd59611e996dd5c7b74f47db7e20b96fe16d340b
-
Filesize
15KB
MD5acce89b0047504fb24d5b3a2c650d0be
SHA17f0d0dd2d91ab63fe9f075c0c5e3d99faa1f9d6b
SHA256620bf2a5ffd11659a33e20d152d19afaa9cb17f55fb328bf5b67a5d6f599b3b0
SHA512cc48cc910f6c0e9113a327da300613e5812b455f0481c9aaf7c98924d0d77dee9d54433b116ce15bebe84c95a0b20eba2d4b16ccf2f8c8e552548421427b5d82
-
Filesize
199KB
MD58ceac346b128ed8959abb7431a782140
SHA1c6e52339ab92597bf8db0d357999dc981763d614
SHA2569be9e8d8e432e6d57cfe58d0a54504bd3a185f97d90afb6b72c281f6f3b813e5
SHA512ffb921df70ab5589a51346b567f9319de05a1ccc2b508994b91334379bd7ce3cb14e2f6f9de198c665abf30bbbf2cbad146589517435ccde7d216d19b8227c88
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84