Analysis
-
max time kernel
300s -
max time network
296s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2023, 12:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.roads.maryland.gov/OCImages/511_logo_sm.JPG
Resource
win10v2004-20230221-en
General
-
Target
http://www.roads.maryland.gov/OCImages/511_logo_sm.JPG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133263020721218196" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1248 chrome.exe 1248 chrome.exe 1016 chrome.exe 1016 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe Token: SeShutdownPrivilege 1248 chrome.exe Token: SeCreatePagefilePrivilege 1248 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe 1248 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1248 wrote to memory of 444 1248 chrome.exe 84 PID 1248 wrote to memory of 444 1248 chrome.exe 84 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 2080 1248 chrome.exe 85 PID 1248 wrote to memory of 4076 1248 chrome.exe 86 PID 1248 wrote to memory of 4076 1248 chrome.exe 86 PID 1248 wrote to memory of 2616 1248 chrome.exe 87 PID 1248 wrote to memory of 2616 1248 chrome.exe 87 PID 1248 wrote to memory of 2616 1248 chrome.exe 87 PID 1248 wrote to memory of 2616 1248 chrome.exe 87 PID 1248 wrote to memory of 2616 1248 chrome.exe 87 PID 1248 wrote to memory of 2616 1248 chrome.exe 87 PID 1248 wrote to memory of 2616 1248 chrome.exe 87 PID 1248 wrote to memory of 2616 1248 chrome.exe 87 PID 1248 wrote to memory of 2616 1248 chrome.exe 87 PID 1248 wrote to memory of 2616 1248 chrome.exe 87 PID 1248 wrote to memory of 2616 1248 chrome.exe 87 PID 1248 wrote to memory of 2616 1248 chrome.exe 87 PID 1248 wrote to memory of 2616 1248 chrome.exe 87 PID 1248 wrote to memory of 2616 1248 chrome.exe 87 PID 1248 wrote to memory of 2616 1248 chrome.exe 87 PID 1248 wrote to memory of 2616 1248 chrome.exe 87 PID 1248 wrote to memory of 2616 1248 chrome.exe 87 PID 1248 wrote to memory of 2616 1248 chrome.exe 87 PID 1248 wrote to memory of 2616 1248 chrome.exe 87 PID 1248 wrote to memory of 2616 1248 chrome.exe 87 PID 1248 wrote to memory of 2616 1248 chrome.exe 87 PID 1248 wrote to memory of 2616 1248 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://www.roads.maryland.gov/OCImages/511_logo_sm.JPG1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffde6489758,0x7ffde6489768,0x7ffde64897782⤵PID:444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1808,i,11489802751366254178,18159764436964104849,131072 /prefetch:22⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1808,i,11489802751366254178,18159764436964104849,131072 /prefetch:82⤵PID:4076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1808,i,11489802751366254178,18159764436964104849,131072 /prefetch:82⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3124 --field-trial-handle=1808,i,11489802751366254178,18159764436964104849,131072 /prefetch:12⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3100 --field-trial-handle=1808,i,11489802751366254178,18159764436964104849,131072 /prefetch:12⤵PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4744 --field-trial-handle=1808,i,11489802751366254178,18159764436964104849,131072 /prefetch:82⤵PID:2532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 --field-trial-handle=1808,i,11489802751366254178,18159764436964104849,131072 /prefetch:82⤵PID:984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=1808,i,11489802751366254178,18159764436964104849,131072 /prefetch:82⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4784 --field-trial-handle=1808,i,11489802751366254178,18159764436964104849,131072 /prefetch:12⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4432 --field-trial-handle=1808,i,11489802751366254178,18159764436964104849,131072 /prefetch:12⤵PID:8
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4964 --field-trial-handle=1808,i,11489802751366254178,18159764436964104849,131072 /prefetch:12⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=212 --field-trial-handle=1808,i,11489802751366254178,18159764436964104849,131072 /prefetch:12⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2736 --field-trial-handle=1808,i,11489802751366254178,18159764436964104849,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3344 --field-trial-handle=1808,i,11489802751366254178,18159764436964104849,131072 /prefetch:12⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:324
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
882B
MD5b10c43f644dd4b43aa4f3d5bcd54b893
SHA1c06790f541eaceba94bec86f35bbdaff69711b43
SHA256e98f5861637e477a952389c1485a651ac72689d585165a80dceb47aa4ac101e9
SHA5126693402bac632d2650d49c05d60cecb8189054583c3149a41440b1c8aecd457dc32aa0b0cdb58d7754cd1535f69f19b0900399bd2ba1a991d8a45e1dca0c81d0
-
Filesize
6KB
MD5b57d3e1af7937777b92f91497a54fd11
SHA17b7891353f3bde3052937af94bc195edfc1fb82b
SHA256a015ee59ed32b264b99003830d9746d933ef8a1038ac0db8ced7aa5e903367e1
SHA5124a0047626f7a2196288e7e7963d4bc24df7370a1af2f64a077c9ec3671dcd50f87ac8115e0693aaf46f6b9d31eeced79dc786be429fba45abe759decf5a0cebc
-
Filesize
6KB
MD55fdff1ea3e8d8ea144ce53c967fff611
SHA112eb491efdb2b05ef239c5af8c5ffd8095c325e7
SHA256e5335f2a7623de31403a19163167ef997891dc953c3a9293bb45da35f4ed1001
SHA51287f2484c38d683a65a550933531c88f434b8a156384b68b08234e2da61820438d2cbc80abc850dbd6dedb51343232895733491848f0e894baf1c9eed27949d22
-
Filesize
15KB
MD5245c4190de11987ce488d6aed162412f
SHA19d3d978596db17bb60dc3c0b0f86d669146b4a4c
SHA256beab3812f68808ed529f10990e5a1daa7274cd2ec66167fdf6eaad46d7e11d2e
SHA512a4c259e26a05634f00b2f70d531582edc07a9883fd2ff506d9a13a0f6004e0acf534a26d64fd036d64df3667ccb50e571b627fceeab989d8c35a329065e2ed84
-
Filesize
199KB
MD5f4d460f14705d8a2888cb617f820ebb5
SHA1ef10d637f8fc0d57953f8bbf34d7213e40624c42
SHA25603cfe735ff09181403663fa9ac57a331083b5ee3024120f479efd259e34be939
SHA512f9413b02f5c9dd98001fe3ca9607e3735ae8fbb50b905bca760c19fc8de8822e2b35fd1a98eddcae52f89a6e93acd9b75a68215c999a2f608e9c62ea3b06084d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd