Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2023 17:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://chemistryexams.com/byb1e
Resource
win10v2004-20230220-en
General
-
Target
https://chemistryexams.com/byb1e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133283064561471650" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1400 chrome.exe 1400 chrome.exe 3360 chrome.exe 3360 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeCreatePagefilePrivilege 1400 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1400 wrote to memory of 1464 1400 chrome.exe 83 PID 1400 wrote to memory of 1464 1400 chrome.exe 83 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 4200 1400 chrome.exe 84 PID 1400 wrote to memory of 756 1400 chrome.exe 85 PID 1400 wrote to memory of 756 1400 chrome.exe 85 PID 1400 wrote to memory of 4716 1400 chrome.exe 86 PID 1400 wrote to memory of 4716 1400 chrome.exe 86 PID 1400 wrote to memory of 4716 1400 chrome.exe 86 PID 1400 wrote to memory of 4716 1400 chrome.exe 86 PID 1400 wrote to memory of 4716 1400 chrome.exe 86 PID 1400 wrote to memory of 4716 1400 chrome.exe 86 PID 1400 wrote to memory of 4716 1400 chrome.exe 86 PID 1400 wrote to memory of 4716 1400 chrome.exe 86 PID 1400 wrote to memory of 4716 1400 chrome.exe 86 PID 1400 wrote to memory of 4716 1400 chrome.exe 86 PID 1400 wrote to memory of 4716 1400 chrome.exe 86 PID 1400 wrote to memory of 4716 1400 chrome.exe 86 PID 1400 wrote to memory of 4716 1400 chrome.exe 86 PID 1400 wrote to memory of 4716 1400 chrome.exe 86 PID 1400 wrote to memory of 4716 1400 chrome.exe 86 PID 1400 wrote to memory of 4716 1400 chrome.exe 86 PID 1400 wrote to memory of 4716 1400 chrome.exe 86 PID 1400 wrote to memory of 4716 1400 chrome.exe 86 PID 1400 wrote to memory of 4716 1400 chrome.exe 86 PID 1400 wrote to memory of 4716 1400 chrome.exe 86 PID 1400 wrote to memory of 4716 1400 chrome.exe 86 PID 1400 wrote to memory of 4716 1400 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://chemistryexams.com/byb1e1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ffc855b9758,0x7ffc855b9768,0x7ffc855b97782⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1708,i,12951113099566917403,10445595365143259628,131072 /prefetch:22⤵PID:4200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1708,i,12951113099566917403,10445595365143259628,131072 /prefetch:82⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1708,i,12951113099566917403,10445595365143259628,131072 /prefetch:82⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3152 --field-trial-handle=1708,i,12951113099566917403,10445595365143259628,131072 /prefetch:12⤵PID:3780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3124 --field-trial-handle=1708,i,12951113099566917403,10445595365143259628,131072 /prefetch:12⤵PID:4660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4448 --field-trial-handle=1708,i,12951113099566917403,10445595365143259628,131072 /prefetch:12⤵PID:4396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1708,i,12951113099566917403,10445595365143259628,131072 /prefetch:82⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5060 --field-trial-handle=1708,i,12951113099566917403,10445595365143259628,131072 /prefetch:82⤵PID:3200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5132 --field-trial-handle=1708,i,12951113099566917403,10445595365143259628,131072 /prefetch:12⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3304 --field-trial-handle=1708,i,12951113099566917403,10445595365143259628,131072 /prefetch:12⤵PID:1804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3400 --field-trial-handle=1708,i,12951113099566917403,10445595365143259628,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3360
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4036
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
700B
MD58e3cfcbe9f555ae55e771569495cda47
SHA182dcc87d80a51526c2a977fef5d5ccdf3f570b93
SHA256b347e2f2c76a8c05436f36877f22d9a0af63169a417bf4c6db1cd3ed9a265505
SHA51270723d39b2432aa46e565cc234eaea58cdd96af82b66879f2887f33af240eafe4eeea368f523bef3c0e895f85c3d398326ebfa17b1f4eaa6415f0e12948c9a85
-
Filesize
4KB
MD519edc72d34e7222c5f00193c1fd11d0b
SHA1d9e142e448f43e614ea178138be59f575ba1b38e
SHA2565f2be0c565fd6fd2ddc452875c3e0f6d1ead0383f25f687a94f191d6f215914a
SHA5124be7b737767b99d650c678bf1c44a713ca05679c10dacc06fd94351b855086fda22dc1e9b560a24b3a6b69697ac11cec61205cd0c7972a6732d5afe49c3f8583
-
Filesize
5KB
MD58fcc5f27fd50cbdbdbfa784178ee05e7
SHA1ead72935f0649e6b4e5cdb7bea1612f4d7e46b64
SHA2568f5dc1356559c6d50ba6432cb3fb09098bbea250177c22ef44b132c183cbe8f5
SHA512fa9ec2c31363c488c79c61b4aca473386937de26d042e43cc1cc558ff37b5471519b27fc41414ae089d2aec0072fa808f965dacff1fbc3f67e1dacdb75ed4096
-
Filesize
149KB
MD53b652bb8c78d7925b53ec4348a824fed
SHA1177d86298c4b582243929c5ebabd37eabceb1092
SHA2568e204726ac9b40ce647b797fa1b32fdac2710ce5422e7f7ef7931a31f2445042
SHA512050840883c05f3bd6a39f51cb4021cdb7ed70e7ba41f048f33b818d3983be479bc038ff1716886d263957ac51acf3a1edf42de88b0f895f783bdf917fa3b6454
-
Filesize
149KB
MD5ccd4d90a21dda74a649a9c985ca63a38
SHA1a60b62b2405fe3481941ce059372cc26795ab9ee
SHA256ea69a463ea4084f1b7324fb3f84055f9f364d2d35a8cf9cefa5732c2d99759a6
SHA512480bbb174b12a767147fe08ea66b539be2bc0f52201a673d2c89dafab4e6b0fe51f31c851443e25a22b272d99161cdf00e94822233c030e673c72aa33a7397c2