Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
12-05-2023 11:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://hse.gov.uk
Resource
win10-20230220-en
General
-
Target
http://hse.gov.uk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133283715143877354" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 1304 chrome.exe 1304 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3596 wrote to memory of 3532 3596 chrome.exe 66 PID 3596 wrote to memory of 3532 3596 chrome.exe 66 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 3448 3596 chrome.exe 68 PID 3596 wrote to memory of 4644 3596 chrome.exe 69 PID 3596 wrote to memory of 4644 3596 chrome.exe 69 PID 3596 wrote to memory of 4708 3596 chrome.exe 70 PID 3596 wrote to memory of 4708 3596 chrome.exe 70 PID 3596 wrote to memory of 4708 3596 chrome.exe 70 PID 3596 wrote to memory of 4708 3596 chrome.exe 70 PID 3596 wrote to memory of 4708 3596 chrome.exe 70 PID 3596 wrote to memory of 4708 3596 chrome.exe 70 PID 3596 wrote to memory of 4708 3596 chrome.exe 70 PID 3596 wrote to memory of 4708 3596 chrome.exe 70 PID 3596 wrote to memory of 4708 3596 chrome.exe 70 PID 3596 wrote to memory of 4708 3596 chrome.exe 70 PID 3596 wrote to memory of 4708 3596 chrome.exe 70 PID 3596 wrote to memory of 4708 3596 chrome.exe 70 PID 3596 wrote to memory of 4708 3596 chrome.exe 70 PID 3596 wrote to memory of 4708 3596 chrome.exe 70 PID 3596 wrote to memory of 4708 3596 chrome.exe 70 PID 3596 wrote to memory of 4708 3596 chrome.exe 70 PID 3596 wrote to memory of 4708 3596 chrome.exe 70 PID 3596 wrote to memory of 4708 3596 chrome.exe 70 PID 3596 wrote to memory of 4708 3596 chrome.exe 70 PID 3596 wrote to memory of 4708 3596 chrome.exe 70 PID 3596 wrote to memory of 4708 3596 chrome.exe 70 PID 3596 wrote to memory of 4708 3596 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://hse.gov.uk1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fff3fec9758,0x7fff3fec9768,0x7fff3fec97782⤵PID:3532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 --field-trial-handle=1768,i,10540859669494848876,14459968640735325393,131072 /prefetch:22⤵PID:3448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1768,i,10540859669494848876,14459968640735325393,131072 /prefetch:82⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2064 --field-trial-handle=1768,i,10540859669494848876,14459968640735325393,131072 /prefetch:82⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2756 --field-trial-handle=1768,i,10540859669494848876,14459968640735325393,131072 /prefetch:12⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2744 --field-trial-handle=1768,i,10540859669494848876,14459968640735325393,131072 /prefetch:12⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4336 --field-trial-handle=1768,i,10540859669494848876,14459968640735325393,131072 /prefetch:12⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1768,i,10540859669494848876,14459968640735325393,131072 /prefetch:82⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 --field-trial-handle=1768,i,10540859669494848876,14459968640735325393,131072 /prefetch:82⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3184 --field-trial-handle=1768,i,10540859669494848876,14459968640735325393,131072 /prefetch:82⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 --field-trial-handle=1768,i,10540859669494848876,14459968640735325393,131072 /prefetch:82⤵PID:3124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4824 --field-trial-handle=1768,i,10540859669494848876,14459968640735325393,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1304
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3732
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\31300701-28ed-40bd-9909-f207ac205910.tmp
Filesize6KB
MD5c36fd05478caee2706999cf211cdbb60
SHA1ae58104b6eb67f7d41ee18c245639d96b1b87927
SHA2567469bd4a2fc03fe4d0ee92d030227d4ed17025ad50ff88d726ae3baccf6adfa2
SHA5125d87956ebf0d2ab6b9cc0e8e81f19e9c064569487700391de0e93a6411f06fd1e7bfd1fd2dadfe6cb806340b527ba143f5e1b0cb1e95eba25576fa7daace56cd
-
Filesize
192B
MD551ee70cae6bc0d45de2ecbb16c2e6da5
SHA176f1c242463dcd16778d9cdf32d8ad107f764802
SHA25637946c993c85fc629bfda0531930eb7492dcbbda3b9cee89300efcccdf43f57b
SHA512587e54811c3a551aedc77a555ccfd111a6391861bf54d1bacf1f31fd13799f056bb617be0a5333de3b2052d71b1d45a5c03694b80a96caf534fa481974493161
-
Filesize
1KB
MD5a6395dd7b3091595daaeddb3fb1ca3e8
SHA194835c699fc871d54a15804b9c62096a95a5d714
SHA25692ce7447eb39811c41001790fdb7ab650eb51bec6503cb4ae1efad22369078b8
SHA512fef9b4c40f081dd336e1775e0a1225f8971ac47c2772830f19b06ae8fa3a07df0d1ce23f8c2ec06770b1bb10ed142fc144b0181f10cfd37083b3d29171302bab
-
Filesize
5KB
MD5b801ad7a323f470ef6075f4bffc2ab95
SHA1bdedaf470fb51591452c786eb3cbe4180e586f21
SHA256819c2b6b869b0b50cea6030a9cbeba97e0d0631eebecce6b887529498485b283
SHA512a6d216ededf0486c6339acbd7a5050de45df2752f1f2d5c24202a28e73c324d6f11d78f8a9a59c9789ab2ce21bcb854fdb4cd03af8ac6e703001cc13ad9413b4
-
Filesize
5KB
MD504c1499aad7cda865155840c6af74ab8
SHA11dd1833a9fa5cfd6143b1573ddf146fc41b59283
SHA2568ea626607aacae291f7e5b5df35f9b9c9a2dd783efa011f2a57b2d64096c4ad1
SHA512957d476a477ef5a3599a909b1fd76daf3c9c2766b66c8feed4c0ef8e75a37bf9f152127ceef2077fcd79173ca77f2adff4a000bd068a937da5f5767e4d373dfd
-
Filesize
152KB
MD5db5f66805968aede52e76a8031165bbd
SHA1c7418244dc6fa05aecd20c187e45d3465aa5ad9c
SHA25696191abcec56cad5ccd597c69a565d9c8fdf415d30d2355bd99fba0e79d261fa
SHA5120ac09d04510c36da173e05ef2d11c555e3d2960516bf56ff3b77a4a34d5d53a921bfdad479e743ecebf158a5802d5fab83ef9125a3b3833b26b4852446ef3091
-
Filesize
151KB
MD5535d9c6170a9e56e1d5baae0d75ac8ce
SHA13455a5119d334118e70146ba74824fcb8402b7ca
SHA256b273e419bed7b9f9a3ed65f114dcc7bf665bba83b21984a9fa8662dba94da0e4
SHA5128fe3c78bac0d49a4aa3ae6b03c8454cd40f068d451bb61dcc293858da8dc42aac11a930fbdd3257a40d53b2d8f13079abffa681f23da31158f41a4015169b559
-
Filesize
151KB
MD5d9d354739c9225050e9cf5849c797634
SHA12832ba2bf47f3e484a2490f774f16da171ed8efa
SHA256fd6fdb4684c794ab5062c74c5a2ea95a8277b582167e87338544a5d216d79a7c
SHA51274f543bf6e06f4f016ead51288490a9fddd6f0a034b4587fe5fb8d43960c8882bde2cb48a729924ae548266609756d84a1abe7a84a60df4ac939feefbd683901
-
Filesize
72KB
MD57e3fd8eaabcc3572086531793dc79a41
SHA1b67b2f7d30c394c82795691e80b70f5bf82fbfb7
SHA2566a56a7bbf73fc9869217c9dda63f4bfdb78c6881793bfabec306cc7715b72075
SHA51220b8f8c312a84bc756d1b8705a83c8ac199e23b3e794aeebe6dfc763c5c4be71e54fdbbff81d8039e3c44129823bc23f3d89b5ff6722591e00678a6ceb3ba153
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd