Analysis
-
max time kernel
201s -
max time network
302s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2023, 18:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bs.serving-sys.com/Serving/adServer.bs?cn=brd&PluID=0&Pos=029124433873312&EyeblasterID=1086486580&clk=12&ctick=33302&rtu=https%3A%2F%2Fdse3net.web.app/s3Rhri2Psdy9s3RarlsWO3nx0qs3Rri2Pk17i2Ps3Ralsk17ark17dy9s3RWO3BM2&c=023302331202
Resource
win10v2004-20230221-en
General
-
Target
https://bs.serving-sys.com/Serving/adServer.bs?cn=brd&PluID=0&Pos=029124433873312&EyeblasterID=1086486580&clk=12&ctick=33302&rtu=https%3A%2F%2Fdse3net.web.app/s3Rhri2Psdy9s3RarlsWO3nx0qs3Rri2Pk17i2Ps3Ralsk17ark17dy9s3RWO3BM2&c=023302331202
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133261514686788018" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2736 chrome.exe 2736 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2736 chrome.exe 2736 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe Token: SeShutdownPrivilege 2736 chrome.exe Token: SeCreatePagefilePrivilege 2736 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe 2736 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2736 wrote to memory of 4308 2736 chrome.exe 82 PID 2736 wrote to memory of 4308 2736 chrome.exe 82 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 4536 2736 chrome.exe 83 PID 2736 wrote to memory of 1220 2736 chrome.exe 84 PID 2736 wrote to memory of 1220 2736 chrome.exe 84 PID 2736 wrote to memory of 4476 2736 chrome.exe 85 PID 2736 wrote to memory of 4476 2736 chrome.exe 85 PID 2736 wrote to memory of 4476 2736 chrome.exe 85 PID 2736 wrote to memory of 4476 2736 chrome.exe 85 PID 2736 wrote to memory of 4476 2736 chrome.exe 85 PID 2736 wrote to memory of 4476 2736 chrome.exe 85 PID 2736 wrote to memory of 4476 2736 chrome.exe 85 PID 2736 wrote to memory of 4476 2736 chrome.exe 85 PID 2736 wrote to memory of 4476 2736 chrome.exe 85 PID 2736 wrote to memory of 4476 2736 chrome.exe 85 PID 2736 wrote to memory of 4476 2736 chrome.exe 85 PID 2736 wrote to memory of 4476 2736 chrome.exe 85 PID 2736 wrote to memory of 4476 2736 chrome.exe 85 PID 2736 wrote to memory of 4476 2736 chrome.exe 85 PID 2736 wrote to memory of 4476 2736 chrome.exe 85 PID 2736 wrote to memory of 4476 2736 chrome.exe 85 PID 2736 wrote to memory of 4476 2736 chrome.exe 85 PID 2736 wrote to memory of 4476 2736 chrome.exe 85 PID 2736 wrote to memory of 4476 2736 chrome.exe 85 PID 2736 wrote to memory of 4476 2736 chrome.exe 85 PID 2736 wrote to memory of 4476 2736 chrome.exe 85 PID 2736 wrote to memory of 4476 2736 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://bs.serving-sys.com/Serving/adServer.bs?cn=brd&PluID=0&Pos=029124433873312&EyeblasterID=1086486580&clk=12&ctick=33302&rtu=https%3A%2F%2Fdse3net.web.app/s3Rhri2Psdy9s3RarlsWO3nx0qs3Rri2Pk17i2Ps3Ralsk17ark17dy9s3RWO3BM2&c=0233023312021⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ff872039758,0x7ff872039768,0x7ff8720397782⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 --field-trial-handle=1840,i,5089061285648919170,8721880784250774516,131072 /prefetch:22⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 --field-trial-handle=1840,i,5089061285648919170,8721880784250774516,131072 /prefetch:82⤵PID:1220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2264 --field-trial-handle=1840,i,5089061285648919170,8721880784250774516,131072 /prefetch:82⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3104 --field-trial-handle=1840,i,5089061285648919170,8721880784250774516,131072 /prefetch:12⤵PID:1652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3116 --field-trial-handle=1840,i,5089061285648919170,8721880784250774516,131072 /prefetch:12⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3292
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD54ce244fa29a089fd1ed319883dc5ddb2
SHA1c3ab66c30ba55537b2549ad6d3ce3b3a64ca356b
SHA25602e3637b6ba0dd25cdd50a2403e69c807be9eef18c0536e0a13010e1bb318b5c
SHA512ca631d13c6a0ad86d5564f94a5c438d6f638328e220753e1e4bb1341a992311e21e28d57f7e4061ee4f912dec00aecdf5f42c97790633bee787f523c2d03ff92
-
Filesize
71KB
MD5468e2ee1348298aebfd100ebc6bc41d2
SHA12cbab644b9fdf7e600cba0f3cc7ee9e46e02d0f1
SHA256c878d852a402b3ac940ccea7d8dc38759f5414d9ec61ede98bc2cd27e9519366
SHA512d5912967971fc3d41de00a41249501e73c5986afa2e6ec22555af6e9d6b1b52922dbc07b10be64be6364afc02f6ca6a1b00c0e9e49439ca9eb0a0ababe9ae6ea