Analysis
-
max time kernel
23s -
max time network
26s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-04-2023 11:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://salesdevelopmentinc.com/azy3i
Resource
win10v2004-20230220-en
General
-
Target
https://salesdevelopmentinc.com/azy3i
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133268178221861210" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1528 chrome.exe 1528 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1528 wrote to memory of 4292 1528 chrome.exe 84 PID 1528 wrote to memory of 4292 1528 chrome.exe 84 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 3764 1528 chrome.exe 85 PID 1528 wrote to memory of 1892 1528 chrome.exe 86 PID 1528 wrote to memory of 1892 1528 chrome.exe 86 PID 1528 wrote to memory of 4408 1528 chrome.exe 87 PID 1528 wrote to memory of 4408 1528 chrome.exe 87 PID 1528 wrote to memory of 4408 1528 chrome.exe 87 PID 1528 wrote to memory of 4408 1528 chrome.exe 87 PID 1528 wrote to memory of 4408 1528 chrome.exe 87 PID 1528 wrote to memory of 4408 1528 chrome.exe 87 PID 1528 wrote to memory of 4408 1528 chrome.exe 87 PID 1528 wrote to memory of 4408 1528 chrome.exe 87 PID 1528 wrote to memory of 4408 1528 chrome.exe 87 PID 1528 wrote to memory of 4408 1528 chrome.exe 87 PID 1528 wrote to memory of 4408 1528 chrome.exe 87 PID 1528 wrote to memory of 4408 1528 chrome.exe 87 PID 1528 wrote to memory of 4408 1528 chrome.exe 87 PID 1528 wrote to memory of 4408 1528 chrome.exe 87 PID 1528 wrote to memory of 4408 1528 chrome.exe 87 PID 1528 wrote to memory of 4408 1528 chrome.exe 87 PID 1528 wrote to memory of 4408 1528 chrome.exe 87 PID 1528 wrote to memory of 4408 1528 chrome.exe 87 PID 1528 wrote to memory of 4408 1528 chrome.exe 87 PID 1528 wrote to memory of 4408 1528 chrome.exe 87 PID 1528 wrote to memory of 4408 1528 chrome.exe 87 PID 1528 wrote to memory of 4408 1528 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://salesdevelopmentinc.com/azy3i1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdec4f9758,0x7ffdec4f9768,0x7ffdec4f97782⤵PID:4292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1920,i,13560598441316813863,879808059976472406,131072 /prefetch:22⤵PID:3764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1920,i,13560598441316813863,879808059976472406,131072 /prefetch:82⤵PID:1892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1920,i,13560598441316813863,879808059976472406,131072 /prefetch:82⤵PID:4408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3160 --field-trial-handle=1920,i,13560598441316813863,879808059976472406,131072 /prefetch:12⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3180 --field-trial-handle=1920,i,13560598441316813863,879808059976472406,131072 /prefetch:12⤵PID:2256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4588 --field-trial-handle=1920,i,13560598441316813863,879808059976472406,131072 /prefetch:12⤵PID:636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5096 --field-trial-handle=1920,i,13560598441316813863,879808059976472406,131072 /prefetch:82⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 --field-trial-handle=1920,i,13560598441316813863,879808059976472406,131072 /prefetch:82⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 --field-trial-handle=1920,i,13560598441316813863,879808059976472406,131072 /prefetch:82⤵PID:4452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5244 --field-trial-handle=1920,i,13560598441316813863,879808059976472406,131072 /prefetch:12⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4948 --field-trial-handle=1920,i,13560598441316813863,879808059976472406,131072 /prefetch:12⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3724
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
882B
MD5e65e6959b43578ff180b0a30b5c7a150
SHA1a793acb38647ec0250043a2b35a3945fccb1222d
SHA2560d911befa62ec2c27d6fc022927e6aaf9f1ade0c5419a2f1caf9cc983ede19c8
SHA51256ed5f828cf6c32b1e09dcd29a118a4fe39a9af499cc7359188e6251484576859db264a2888302929c96b3a00c6417a14bf03bd7952db4a444d5f3e95afc8379
-
Filesize
9KB
MD54b5cbe6d85315574bd8c866865542f3c
SHA1c2620619d8470d9820d958dbb86f5917e81fe2f2
SHA2567a3abb0e2f19e4818673e4a4e03187c1db0b791e89ccefb816ed3de83936506d
SHA51214f420adffc102f4e294f93ea0b57abc575134d6041ca59a62bd65d4954b25a8097df83489be02b5458202a47a551ce188f6ce881b2ebfb95aab5243b2f2a60d
-
Filesize
9KB
MD52167ef94e32688814d247140059b814d
SHA119cc5ac38d743d4897a15af1b923b4569b3dee0f
SHA256951ed6c072a35dbc598b26102ab1e6623a34af402122cc8e2ca68ef4ca685eea
SHA51270645ea58c5615786ee23ffc0e8075d66c85a2f91ec8c0e3389287b98f688f28e44531f1410329c848812fe839d1075798fc23b89f939cab06cbcd50d2b0e9d3
-
Filesize
15KB
MD5ac7902af52931a27ca23223fe92a5e9a
SHA18d817e2922f1b04605448c497878e14a1b77e031
SHA2564f5cf75b70ae4e34bfa9bbedf2960f532a61b03c1acaecea744eac81ff31b90a
SHA5126f054599746d07f2a16607455e647e3ca15cae1310a755d2531dc7cc51b3b857dcb31525406db4d59c78cc2c84dbedfe6f42c112494e4244eb920b2f84723981
-
Filesize
201KB
MD5d69aa9b681b9deb41f70f2846dcbcbbc
SHA119a975b0795fa0bd32eab655d8aeb00658110dae
SHA256eff8cffb41c646aab495f682545398483438a79b25531ba909f0aa851712533f
SHA512e8fdbf9ce60cf1c1a5473aec0c6348c5d513eb583bddfe57a138c93be8a0b45ccdc1a33ca0e5daa692a70c89297bfb5da3c51955b5be8eab590139c040dacc29
-
Filesize
201KB
MD587f31207a21b38b99053b73ebe9e6ef9
SHA1ae6f1c2f78a490cd48bf960baf57516016c1fcff
SHA2561cdf696ff6467845d50f5e672f7968bc7931ccabae6719e186e34902f1916a36
SHA512ea94d7d76771316a9a29f90199128a9342792eecc77eaa1c15cc371e7f0827d70a0fd0e12e7e00f2df7ee0369f4c6e3afbc13b2d0eac31e2b10931304591e0c1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd