Analysis
-
max time kernel
1800s -
max time network
1694s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 09:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.rd.usda.gov/
Resource
win10v2004-20230220-en
General
-
Target
http://www.rd.usda.gov/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133277611236446551" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1876 chrome.exe 1876 chrome.exe 4128 chrome.exe 4128 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe Token: SeShutdownPrivilege 1876 chrome.exe Token: SeCreatePagefilePrivilege 1876 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe 1876 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1876 wrote to memory of 1940 1876 chrome.exe 85 PID 1876 wrote to memory of 1940 1876 chrome.exe 85 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 1464 1876 chrome.exe 86 PID 1876 wrote to memory of 3340 1876 chrome.exe 87 PID 1876 wrote to memory of 3340 1876 chrome.exe 87 PID 1876 wrote to memory of 848 1876 chrome.exe 88 PID 1876 wrote to memory of 848 1876 chrome.exe 88 PID 1876 wrote to memory of 848 1876 chrome.exe 88 PID 1876 wrote to memory of 848 1876 chrome.exe 88 PID 1876 wrote to memory of 848 1876 chrome.exe 88 PID 1876 wrote to memory of 848 1876 chrome.exe 88 PID 1876 wrote to memory of 848 1876 chrome.exe 88 PID 1876 wrote to memory of 848 1876 chrome.exe 88 PID 1876 wrote to memory of 848 1876 chrome.exe 88 PID 1876 wrote to memory of 848 1876 chrome.exe 88 PID 1876 wrote to memory of 848 1876 chrome.exe 88 PID 1876 wrote to memory of 848 1876 chrome.exe 88 PID 1876 wrote to memory of 848 1876 chrome.exe 88 PID 1876 wrote to memory of 848 1876 chrome.exe 88 PID 1876 wrote to memory of 848 1876 chrome.exe 88 PID 1876 wrote to memory of 848 1876 chrome.exe 88 PID 1876 wrote to memory of 848 1876 chrome.exe 88 PID 1876 wrote to memory of 848 1876 chrome.exe 88 PID 1876 wrote to memory of 848 1876 chrome.exe 88 PID 1876 wrote to memory of 848 1876 chrome.exe 88 PID 1876 wrote to memory of 848 1876 chrome.exe 88 PID 1876 wrote to memory of 848 1876 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://www.rd.usda.gov/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ff968e39758,0x7ff968e39768,0x7ff968e397782⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1828,i,518279702075984833,10050424627607293517,131072 /prefetch:22⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1828,i,518279702075984833,10050424627607293517,131072 /prefetch:82⤵PID:3340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2256 --field-trial-handle=1828,i,518279702075984833,10050424627607293517,131072 /prefetch:82⤵PID:848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2980 --field-trial-handle=1828,i,518279702075984833,10050424627607293517,131072 /prefetch:12⤵PID:1060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2996 --field-trial-handle=1828,i,518279702075984833,10050424627607293517,131072 /prefetch:12⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4416 --field-trial-handle=1828,i,518279702075984833,10050424627607293517,131072 /prefetch:12⤵PID:4580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 --field-trial-handle=1828,i,518279702075984833,10050424627607293517,131072 /prefetch:82⤵PID:952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 --field-trial-handle=1828,i,518279702075984833,10050424627607293517,131072 /prefetch:82⤵PID:4028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5172 --field-trial-handle=1828,i,518279702075984833,10050424627607293517,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4128
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4452
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD54da74aea49f596a14db2f4ae166b056d
SHA14218fb2435059076938827a8e02dd9f360e6c000
SHA256e7d605f7aa5bedc10c22c1fde6c2c25401ac197e0d6918933f70af70b2be1beb
SHA512b821fefae1793568ea37e32121899a66db67a058fd038d6967acb0f176480f7fdac8a75cd3b7d18d3288d14aa937fe956b0b94990c9b7432c27018d1c903b4be
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\8f610896-1676-4e41-a8bb-be10ea260296.tmp
Filesize1KB
MD54862dce644bd5e2ac0578f15490cdc34
SHA1c88e1b70541187a4b3486f9b85f240b01e57a0e6
SHA256d8404fc6d3bfec32b9d1b714ee4737e817c35b499db9ae75f8c352f56c663960
SHA512974a5a7d325305227cdd46f29d65a0f0f982be034569213ea613e7c90c0d905072728d4cda3a0897dbc7eff09c42eab1fbc7cd721bcddb523852d3d54710ef8b
-
Filesize
2KB
MD5428c2272595338000745eef3a37b23b5
SHA17cb1378e5c8d389f89b9f54d59b588b5a328aeff
SHA256d96554d5db84d1e00664cb1ac56d92755b1d5cd03e48bfd2cde2d917e8d63a98
SHA512bb6a6d45b6789fbb35b9045a9084b611a23f375b7d708095d15111e43ebfee854422a89c5871c59fed24b03374b57e15406f8666dac2835d04a7d0ef3d636484
-
Filesize
2KB
MD52760a22584af5cdbbf9a6db146ff30e0
SHA1844d412bf95a3e613f143e78537aa3b2a93ff426
SHA25625c858917c7185a1705b0428b436810bcd90af0cc0b38e65371626756c730a35
SHA5120260cc3af74b71f05c6c45b686eeb95f47d5029904328bf17427103f2544c4e3783f727cd55a80391dfaeedd93037a13a53fa196a0c239a9c2072f3a7e076343
-
Filesize
1KB
MD5e613998ad8bab9f346dbb661b9738ff2
SHA1d81b96b730ddd1b4b6ea8d310d64f0c3c893b4f0
SHA256b6673f72528a76ff42c45bfc2d1b480ceb0cad477bab58e85d083dbccc7d9376
SHA5127a7083129b9b138def6273a9821a1225a95cacb49e7e2883baef477932cd40d337c5f65b43b06c6093c5e7f96d3efe8b8d9a6f7e36ce7c821116cbc1b4cdaecb
-
Filesize
1KB
MD561a9d11d6b590fa6f708c2ef4ba36d4f
SHA1784b00d62606db74bcaf018ad252caf934a20a5a
SHA256f8ad9535e89a16b142e112d2972dd189af662663ad73f26541a57286b11cd5cb
SHA512e54407e902720bb05bde73b88c3814df0be18f71fe8501fe1eab91e618a5618a4c54e86930a011f34e97c3945018969ba697cc95736d021a9b4775871b8305af
-
Filesize
4KB
MD54662dde192c1bc92fbd7dc73c699007e
SHA17bda50263d488e50426922d871e1826959cab3bb
SHA256183ef9a8a779dd34fb762554193ad33a6bc9d876b53cdc47e90f8ceb0e0e3c13
SHA51241f56c6c2804497958f87070aa341b75262dc4b396fea81a1ffb69585c89a6727d72b298080d25e00915df7ce2715fcad1bf9400983f2bb332d30103841d6ed6
-
Filesize
4KB
MD5ec371d9ab7ca4f0ef59b7cd8278e1412
SHA12bfabe6c15959b415e9a50240c3b5eb16520928c
SHA25608910da097a6d5816208d4e12ff6853e5e7bd1a6d4743be0e23bf9a0ffd83c36
SHA5127bc230f29279677e7cc7bd27313fe7c3794898eebbc9cacad953549c6cfc93db4ee5ee5d3c962fb6b48c0e2ac5c8171d324762b3837268a963b8fdcffdf7234c
-
Filesize
4KB
MD53361b5436b9887bda1b9b645595e204f
SHA13cd233a8e7a567538a305977d52402fa9d4dce83
SHA256cb1c4e3e1da8fdbaa9d7d4143c1f9911d496f6691ab06efeeefd8eb5b2f4cf56
SHA512623d142a8b8fb53b0d4d712f54108412c7a6671b04b7b485a0862e87f91e9b6aabb8c2369d74b13c901c709fd2db6095ea0583caaabbcccff31d15d1fbe92786
-
Filesize
4KB
MD53a64fb6f5a7a608e5b0d67e017470b58
SHA17139c8925907e6348617af0afc6173ea7e08b7ee
SHA2569588f35e7e310a6fbea88513ff4a8b88c1afcf56a9aed19236ce39faea094439
SHA5125b8133588831dd0bf2c7e5d250ca4ed962f1e3be741da43e1fd13689129844a71e86fcea24254707e499da919dd00bbda4adeade1b728d5eb790ea6f60d553db
-
Filesize
148KB
MD5db6af205784f1f130ec86bb29a813c15
SHA1a5e25481dbc20988bab2c739ab9e87f0b82e1ea4
SHA2562d93b6c5a125f9f44b687ddd304789d2c787b3d0e1634eb8bc1d93eac5c75ee8
SHA51238f402fe9a2143a77998fb347ea004c88e809565e30db3dc5145d6618668a2be2c3df5c9ab191da5ead209d279e3e21a7b355e6903acfe291ec948775a9ae533