Analysis
-
max time kernel
600s -
max time network
490s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
04-05-2023 11:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bs.serving-sys.com/Serving/adServer.bs?cn=brd&PluID=0&Pos=20&EyeblasterID=1086486580&clk=1&ctick=00484900&rtu=http%3A%2F%2Fsherylcataluna.com%2Fsynch%2Fchrome%2Fsf_rand_string_lowercase6%2F%2F%2F%2F["https://bs.serving-sys.com/Serving/adServer.bs?cn=brd&PluID=0&Pos=20&EyeblasterID=1086486580&clk=1&ctick=00484900&rtu=http%3A%2F%2Fsherylcataluna.com%2Fsynch%2Fchrome%2Fsf_rand_string_lowercase6%2F%2F%2F%2FanVsaWUudGF0ZUBleHByZXNzaGVhbHRoY2FyZW53LmNvbQ=="]
Resource
win10-20230220-en
General
-
Target
https://bs.serving-sys.com/Serving/adServer.bs?cn=brd&PluID=0&Pos=20&EyeblasterID=1086486580&clk=1&ctick=00484900&rtu=http%3A%2F%2Fsherylcataluna.com%2Fsynch%2Fchrome%2Fsf_rand_string_lowercase6%2F%2F%2F%2F["https://bs.serving-sys.com/Serving/adServer.bs?cn=brd&PluID=0&Pos=20&EyeblasterID=1086486580&clk=1&ctick=00484900&rtu=http%3A%2F%2Fsherylcataluna.com%2Fsynch%2Fchrome%2Fsf_rand_string_lowercase6%2F%2F%2F%2FanVsaWUudGF0ZUBleHByZXNzaGVhbHRoY2FyZW53LmNvbQ=="]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133276794868986644" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1308 chrome.exe 1308 chrome.exe 3212 chrome.exe 3212 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1308 wrote to memory of 4952 1308 chrome.exe 66 PID 1308 wrote to memory of 4952 1308 chrome.exe 66 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 364 1308 chrome.exe 69 PID 1308 wrote to memory of 1428 1308 chrome.exe 68 PID 1308 wrote to memory of 1428 1308 chrome.exe 68 PID 1308 wrote to memory of 4776 1308 chrome.exe 70 PID 1308 wrote to memory of 4776 1308 chrome.exe 70 PID 1308 wrote to memory of 4776 1308 chrome.exe 70 PID 1308 wrote to memory of 4776 1308 chrome.exe 70 PID 1308 wrote to memory of 4776 1308 chrome.exe 70 PID 1308 wrote to memory of 4776 1308 chrome.exe 70 PID 1308 wrote to memory of 4776 1308 chrome.exe 70 PID 1308 wrote to memory of 4776 1308 chrome.exe 70 PID 1308 wrote to memory of 4776 1308 chrome.exe 70 PID 1308 wrote to memory of 4776 1308 chrome.exe 70 PID 1308 wrote to memory of 4776 1308 chrome.exe 70 PID 1308 wrote to memory of 4776 1308 chrome.exe 70 PID 1308 wrote to memory of 4776 1308 chrome.exe 70 PID 1308 wrote to memory of 4776 1308 chrome.exe 70 PID 1308 wrote to memory of 4776 1308 chrome.exe 70 PID 1308 wrote to memory of 4776 1308 chrome.exe 70 PID 1308 wrote to memory of 4776 1308 chrome.exe 70 PID 1308 wrote to memory of 4776 1308 chrome.exe 70 PID 1308 wrote to memory of 4776 1308 chrome.exe 70 PID 1308 wrote to memory of 4776 1308 chrome.exe 70 PID 1308 wrote to memory of 4776 1308 chrome.exe 70 PID 1308 wrote to memory of 4776 1308 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://bs.serving-sys.com/Serving/adServer.bs?cn=brd&PluID=0&Pos=20&EyeblasterID=1086486580&clk=1&ctick=00484900&rtu=http%3A%2F%2Fsherylcataluna.com%2Fsynch%2Fchrome%2Fsf_rand_string_lowercase6%2F%2F%2F%2F["https://bs.serving-sys.com/Serving/adServer.bs?cn=brd&PluID=0&Pos=20&EyeblasterID=1086486580&clk=1&ctick=00484900&rtu=http%3A%2F%2Fsherylcataluna.com%2Fsynch%2Fchrome%2Fsf_rand_string_lowercase6%2F%2F%2F%2FanVsaWUudGF0ZUBleHByZXNzaGVhbHRoY2FyZW53LmNvbQ=="]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0x44,0xd8,0x7ffd65f79758,0x7ffd65f79768,0x7ffd65f797782⤵PID:4952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1964 --field-trial-handle=1760,i,7780874024327822822,5717254243221892832,131072 /prefetch:82⤵PID:1428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1528 --field-trial-handle=1760,i,7780874024327822822,5717254243221892832,131072 /prefetch:22⤵PID:364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1960 --field-trial-handle=1760,i,7780874024327822822,5717254243221892832,131072 /prefetch:82⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3052 --field-trial-handle=1760,i,7780874024327822822,5717254243221892832,131072 /prefetch:12⤵PID:4112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1760,i,7780874024327822822,5717254243221892832,131072 /prefetch:12⤵PID:4704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4308 --field-trial-handle=1760,i,7780874024327822822,5717254243221892832,131072 /prefetch:12⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4772 --field-trial-handle=1760,i,7780874024327822822,5717254243221892832,131072 /prefetch:82⤵PID:632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3672 --field-trial-handle=1760,i,7780874024327822822,5717254243221892832,131072 /prefetch:82⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1760,i,7780874024327822822,5717254243221892832,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3212
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4168
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
705B
MD5484b38891de03e3614f96bbddce3e585
SHA118d40678efb570807c370274d93506ac5f65ec60
SHA2568ea3a6b105b44e791e9c212f05d5df7c972f2ef53256e12b44b466d9bb962dfb
SHA512a4cbe0d2c3c7563ecba35e2b33d715e252f68b7756d5c4f83b024155a8ea536061c9f742a04c1db4dc5c0ae7437e290282c4dd3158b9e0cf475c5761b49cdf61
-
Filesize
5KB
MD5de583e2d7f6797b5335bbea714785163
SHA1daea524f04e7767f0be75610ba6544f982a9b8e4
SHA25617ac4ed7959a64609b578341f03ef7b395be193a8decb024e5bd0b8f233d4e6d
SHA512fed710fcb92d69b56df4d0faf9dd87f0ff3cffb21eeaec2d2b90278263fb2a2ccc4f20ad546ec40be46543f81a88a167589fd42fda4902845ee049e18685b707
-
Filesize
5KB
MD5b536067630da71af7abec755869bfa74
SHA18fa53282ac2c51455dece272a83ce4ca0977d795
SHA2566b1ded90a78e5467142f5e2e9710d775eb83d3aa0effc7fd7e4b6b567f442a31
SHA5127c21b12af246f4974dc7c6195d4e67cbb042331308c3cbd4b54235b07f999ef5aa698956a14cb7fff31ea426c420c4512db301316c0c39e726783e3c491cff25
-
Filesize
6KB
MD59e66697daa3a00478d172a41c6d05dae
SHA1e64621bc82c4f21ba36eb144251d8c8a415e8728
SHA256638f7be1c4dd0825b83e74b2e51d061399bb645bff523c1e7103688d50815b93
SHA5125140885114e3a0339c4d160394d4f87ca71ffc940aed52fa0044c45ff418dada5439151480ad92cc22248bc7a0447f96bbb39b63fc4f9dbf63422c48596a57b2
-
Filesize
148KB
MD558f879bf8e853d7fd9258309b202c43c
SHA1d3ed3cbfbd6ab1520f7b85dd9eaa557d8a9c7873
SHA25670fcaa751bcf64dca9121f331f06a04df33989768e80aaa85cac023579d02ddc
SHA5124f9cbea7a4fd56885640998c2e9132f99561e3c4f775bc3909f128f16a8f1d9f1b8f1f11835b7a0e2f642bb791d65bfcb27d8d1291954a66833dd87efc4c6e6d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd