Analysis
-
max time kernel
46s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20/04/2023, 04:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.bing.com/ck/a?!&&p=04e799ea6c25c6e5JmltdHM9MTY4MTg2MjQwMCZpZ3VpZD0xMTI5NzJmYS1lNzVhLTY4ZTgtMzY2ZC02MDBjZTY0NjY5MjAmaW5zaWQ9NTEyOA&ptn=3&hsh=3&fclid=112972fa-e75a-68e8-366d-600ce6466920&u=a1aHR0cHM6Ly9icmF6aGFpcnNob3AuY29tLw&ntb=1__;!!McZBpqUsJQ!rAv1uWd90VNSJiOmbeCDTRrKUz0NxPh4ZuehBVc5kGZ0qidv0fUEonVoGK5Oj5arr9_Avpwy-TSaJgOS1os$
Resource
win7-20230220-en
General
-
Target
https://www.bing.com/ck/a?!&&p=04e799ea6c25c6e5JmltdHM9MTY4MTg2MjQwMCZpZ3VpZD0xMTI5NzJmYS1lNzVhLTY4ZTgtMzY2ZC02MDBjZTY0NjY5MjAmaW5zaWQ9NTEyOA&ptn=3&hsh=3&fclid=112972fa-e75a-68e8-366d-600ce6466920&u=a1aHR0cHM6Ly9icmF6aGFpcnNob3AuY29tLw&ntb=1__;!!McZBpqUsJQ!rAv1uWd90VNSJiOmbeCDTRrKUz0NxPh4ZuehBVc5kGZ0qidv0fUEonVoGK5Oj5arr9_Avpwy-TSaJgOS1os$
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1928 chrome.exe 1928 chrome.exe -
Suspicious use of AdjustPrivilegeToken 54 IoCs
description pid Process Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe Token: SeShutdownPrivilege 1928 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2044 1928 chrome.exe 28 PID 1928 wrote to memory of 2044 1928 chrome.exe 28 PID 1928 wrote to memory of 2044 1928 chrome.exe 28 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 584 1928 chrome.exe 30 PID 1928 wrote to memory of 1068 1928 chrome.exe 31 PID 1928 wrote to memory of 1068 1928 chrome.exe 31 PID 1928 wrote to memory of 1068 1928 chrome.exe 31 PID 1928 wrote to memory of 1584 1928 chrome.exe 32 PID 1928 wrote to memory of 1584 1928 chrome.exe 32 PID 1928 wrote to memory of 1584 1928 chrome.exe 32 PID 1928 wrote to memory of 1584 1928 chrome.exe 32 PID 1928 wrote to memory of 1584 1928 chrome.exe 32 PID 1928 wrote to memory of 1584 1928 chrome.exe 32 PID 1928 wrote to memory of 1584 1928 chrome.exe 32 PID 1928 wrote to memory of 1584 1928 chrome.exe 32 PID 1928 wrote to memory of 1584 1928 chrome.exe 32 PID 1928 wrote to memory of 1584 1928 chrome.exe 32 PID 1928 wrote to memory of 1584 1928 chrome.exe 32 PID 1928 wrote to memory of 1584 1928 chrome.exe 32 PID 1928 wrote to memory of 1584 1928 chrome.exe 32 PID 1928 wrote to memory of 1584 1928 chrome.exe 32 PID 1928 wrote to memory of 1584 1928 chrome.exe 32 PID 1928 wrote to memory of 1584 1928 chrome.exe 32 PID 1928 wrote to memory of 1584 1928 chrome.exe 32 PID 1928 wrote to memory of 1584 1928 chrome.exe 32 PID 1928 wrote to memory of 1584 1928 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://www.bing.com/ck/a?!&&p=04e799ea6c25c6e5JmltdHM9MTY4MTg2MjQwMCZpZ3VpZD0xMTI5NzJmYS1lNzVhLTY4ZTgtMzY2ZC02MDBjZTY0NjY5MjAmaW5zaWQ9NTEyOA&ptn=3&hsh=3&fclid=112972fa-e75a-68e8-366d-600ce6466920&u=a1aHR0cHM6Ly9icmF6aGFpcnNob3AuY29tLw&ntb=1__;!!McZBpqUsJQ!rAv1uWd90VNSJiOmbeCDTRrKUz0NxPh4ZuehBVc5kGZ0qidv0fUEonVoGK5Oj5arr9_Avpwy-TSaJgOS1os$1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6db9758,0x7fef6db9768,0x7fef6db97782⤵PID:2044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1192 --field-trial-handle=1220,i,4216633524917395387,9048300208290180544,131072 /prefetch:22⤵PID:584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1544 --field-trial-handle=1220,i,4216633524917395387,9048300208290180544,131072 /prefetch:82⤵PID:1068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1656 --field-trial-handle=1220,i,4216633524917395387,9048300208290180544,131072 /prefetch:82⤵PID:1584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2296 --field-trial-handle=1220,i,4216633524917395387,9048300208290180544,131072 /prefetch:12⤵PID:108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2324 --field-trial-handle=1220,i,4216633524917395387,9048300208290180544,131072 /prefetch:12⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1296 --field-trial-handle=1220,i,4216633524917395387,9048300208290180544,131072 /prefetch:22⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1276 --field-trial-handle=1220,i,4216633524917395387,9048300208290180544,131072 /prefetch:12⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2616 --field-trial-handle=1220,i,4216633524917395387,9048300208290180544,131072 /prefetch:12⤵PID:2640
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2000
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e69ba672932c3bfb56bd22ab37f2c69
SHA11d17e27f0dae9f79cc20643cbe277f0a10551aff
SHA2560b18a732d5dff8aa8b19f2afa2bf22559a9d04ae76e5f29633b9d6c417d9c6af
SHA51281e0b3db1c3249cebb6dee1687fa8e31ec22af70b455da3079b8a6353a28cc7a2efbc989eaeffb68c232ca3d2e3ad71cf6c5cde5b4ad4d37ab10f6b9b60547c6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\260b749d-888f-4b50-8d68-bb338bebad22.tmp
Filesize5KB
MD5fcfdac8527767a6a483e3fad42358881
SHA137fb371838f6f90eaf6738769761afae567d3bec
SHA256d54ef047523ef140c9f5e401402bec7b9e8abde7a9b83eec01439fb5f3e01d91
SHA51240ee743f44d822fcfd4f20015e4a633bc001f148512a993380c64a7c0cfc60d282596dd1b45b01bf94f7a90b2ab6455ad7cf31619d786f9d81333f2a27baad80
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD5580edc3bf0a674e52245f907cfd6f523
SHA10732fe5a6d86c21ba8a17de629536c15661b3540
SHA2564b8aa66c07f0788d6c9b9dc23360df77a889679f5cd33b3dc0725a34b228a363
SHA512da04ecb66ea50142a3e6a2fb9cdebea9e0ef590c8da126e0b6140daba46760792ca5b3700a9014e61b76c8a3977598aef36590fe421f1c43a1b4c7e528e0162d
-
Filesize
4KB
MD55418de4a9165bb9d315a46c285e705be
SHA1d62c9d44bb1bf89766c2f0dd3c4d83e8b3e4d29f
SHA256cd1091f7b9446d8f8f86f7e58a0bdb32d9ba8bcfcb3e3ea068b188f3949560d1
SHA512c1d7dc996311e4303447d0660553fb6f332b3d45bffc586f14e0118fec9e3b20fb4a325977f524ae86a3cdb50a622223d6288aba0605bfd04e838ed58da07bc9
-
Filesize
4KB
MD529be9870f322058c41978cf3753ee9e7
SHA1c3b5eec317d480b5d8b02a50572a502c77abd564
SHA256b4fa5ec72d7e358ff3c4346ead7304218314441cd179ba9b908a02599ef4d79c
SHA512a730867890d62a012ffb96fb7bc5b962c46aaac569fe996df2124c8653b4eb2496357102617c9e6fb93a84c513d6fba0c8bcddee9eb228eea585ad221faff06f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000004.dbtmp
Filesize16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff