Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2023, 14:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://singlahomefashion.com/
Resource
win10v2004-20230220-en
General
-
Target
http://singlahomefashion.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133262152407876263" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2916 chrome.exe 2916 chrome.exe 2800 chrome.exe 2800 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2916 chrome.exe 2916 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2916 wrote to memory of 1604 2916 chrome.exe 85 PID 2916 wrote to memory of 1604 2916 chrome.exe 85 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 212 2916 chrome.exe 86 PID 2916 wrote to memory of 236 2916 chrome.exe 87 PID 2916 wrote to memory of 236 2916 chrome.exe 87 PID 2916 wrote to memory of 2000 2916 chrome.exe 88 PID 2916 wrote to memory of 2000 2916 chrome.exe 88 PID 2916 wrote to memory of 2000 2916 chrome.exe 88 PID 2916 wrote to memory of 2000 2916 chrome.exe 88 PID 2916 wrote to memory of 2000 2916 chrome.exe 88 PID 2916 wrote to memory of 2000 2916 chrome.exe 88 PID 2916 wrote to memory of 2000 2916 chrome.exe 88 PID 2916 wrote to memory of 2000 2916 chrome.exe 88 PID 2916 wrote to memory of 2000 2916 chrome.exe 88 PID 2916 wrote to memory of 2000 2916 chrome.exe 88 PID 2916 wrote to memory of 2000 2916 chrome.exe 88 PID 2916 wrote to memory of 2000 2916 chrome.exe 88 PID 2916 wrote to memory of 2000 2916 chrome.exe 88 PID 2916 wrote to memory of 2000 2916 chrome.exe 88 PID 2916 wrote to memory of 2000 2916 chrome.exe 88 PID 2916 wrote to memory of 2000 2916 chrome.exe 88 PID 2916 wrote to memory of 2000 2916 chrome.exe 88 PID 2916 wrote to memory of 2000 2916 chrome.exe 88 PID 2916 wrote to memory of 2000 2916 chrome.exe 88 PID 2916 wrote to memory of 2000 2916 chrome.exe 88 PID 2916 wrote to memory of 2000 2916 chrome.exe 88 PID 2916 wrote to memory of 2000 2916 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://singlahomefashion.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb0b619758,0x7ffb0b619768,0x7ffb0b6197782⤵PID:1604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1852,i,14217445737684428199,16371316686734039436,131072 /prefetch:22⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1852,i,14217445737684428199,16371316686734039436,131072 /prefetch:82⤵PID:236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1296 --field-trial-handle=1852,i,14217445737684428199,16371316686734039436,131072 /prefetch:82⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3148 --field-trial-handle=1852,i,14217445737684428199,16371316686734039436,131072 /prefetch:12⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3168 --field-trial-handle=1852,i,14217445737684428199,16371316686734039436,131072 /prefetch:12⤵PID:1160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 --field-trial-handle=1852,i,14217445737684428199,16371316686734039436,131072 /prefetch:82⤵PID:4156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 --field-trial-handle=1852,i,14217445737684428199,16371316686734039436,131072 /prefetch:82⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4988 --field-trial-handle=1852,i,14217445737684428199,16371316686734039436,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2800
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3512
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
768B
MD55c7bd6f742fc4314aaaf845672ab3284
SHA1d200bf51e0401ce1ded38ca5b0b608b5a2495408
SHA2562ca068e881e0fb211a7249811f59f7e3594c3b01f05488a4799ae4a76b2e7fa5
SHA5122d04d6e02330b6dc76e7411c6ad9d9d808d1e44abff6b1ed12e1eb62c27fa3fac72b77a852a24f510e1b6f9a2060e89f348f54c0e010fdc93055049c329b9f03
-
Filesize
1KB
MD59150ee85b04f4bf8174db54645175b9a
SHA1516adf6a29af584397c3ff269a54a5938ed08fe9
SHA256c74c7c56f8b9bb0a1e243b267c45fbfa365681e28cf70fddf3c4d11fe7721b94
SHA5122b10a2a1be279c124545fbe4f24a43aff4cb2c090b8ced42b10f653e386c13dce2f2aca8f6513f9ad1c43330b62b502956bd4f36cb8897839ab2409b7dd953a8
-
Filesize
6KB
MD5a1e3fab90cb8e3cf7ceff4601e5ca1f4
SHA1112f1641cdd53d45205217a120bcb748490c7155
SHA256d33dfa992c72bc578a5f58ed06633b717de782573e58a1df58b6dc8d9d17ffd7
SHA512f1665bb365d8aee6313baef1735d94d0321acccb143508065e31e8336dae576ac4db46a68e936cb1a4ceed7d3975993c27f5e8d8c27779ec569f93b5d33331e1
-
Filesize
5KB
MD50826dfbff9dc94c5b37c6665eef4fbfc
SHA104ede32a69394fedb99278ad33a6448efb4a8c2e
SHA25602a9b389d32911da90884b12f7f50f27b55d4375006d021e7ce72b9a71236876
SHA512107f4c752647718f6eb0065c62672dd03b16bb613aa3b1ff4d2365e306ad70bce747d6108e25f0be513d9d0dbff102656ff4ac65b1b2912ccb245f7796c7082a
-
Filesize
5KB
MD51027a76ae50655c230c609c6458fe52e
SHA15ccc777b5c7efbbb77779c46f60f09bdfe15f480
SHA256a9457de9cfad7621c196d660bab975a68e75592afcb8bee46fe5842b473688d3
SHA5127ffd98568da239b68cc9c507346182934fcf35d0849648d214fe28d0832512aa30108d1243c51a68b803eeb1a665b43e868353ff675a3fc0fdc0976b5856adb9
-
Filesize
199KB
MD507cf03efe5c8c75d770531467ca31734
SHA12f63449596c56772db85b104f9f6890449017752
SHA25611ab4e1ebda0d99d90fdc3bf7191ac27531f6594a9a5007c43e318d83447daec
SHA512d50708bf545a2973b18fbe5e5905a26eb71abf429456b4015e2acd631d279cf72d6ed896a2b7a61c81ad6788b2214489a2b32589b8e27bb7d0c200de7f30f7b2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd