Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2023 07:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.dhl.com/VA_chat/embed/MY_en.html?ref=contactus%20
Resource
win10v2004-20230220-en
General
-
Target
https://www.dhl.com/VA_chat/embed/MY_en.html?ref=contactus%20
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133288745058948250" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2320 chrome.exe 2320 chrome.exe 2784 chrome.exe 2784 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2320 chrome.exe 2320 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe Token: SeShutdownPrivilege 2320 chrome.exe Token: SeCreatePagefilePrivilege 2320 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe 2320 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2964 2320 chrome.exe 85 PID 2320 wrote to memory of 2964 2320 chrome.exe 85 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 1420 2320 chrome.exe 86 PID 2320 wrote to memory of 224 2320 chrome.exe 87 PID 2320 wrote to memory of 224 2320 chrome.exe 87 PID 2320 wrote to memory of 864 2320 chrome.exe 88 PID 2320 wrote to memory of 864 2320 chrome.exe 88 PID 2320 wrote to memory of 864 2320 chrome.exe 88 PID 2320 wrote to memory of 864 2320 chrome.exe 88 PID 2320 wrote to memory of 864 2320 chrome.exe 88 PID 2320 wrote to memory of 864 2320 chrome.exe 88 PID 2320 wrote to memory of 864 2320 chrome.exe 88 PID 2320 wrote to memory of 864 2320 chrome.exe 88 PID 2320 wrote to memory of 864 2320 chrome.exe 88 PID 2320 wrote to memory of 864 2320 chrome.exe 88 PID 2320 wrote to memory of 864 2320 chrome.exe 88 PID 2320 wrote to memory of 864 2320 chrome.exe 88 PID 2320 wrote to memory of 864 2320 chrome.exe 88 PID 2320 wrote to memory of 864 2320 chrome.exe 88 PID 2320 wrote to memory of 864 2320 chrome.exe 88 PID 2320 wrote to memory of 864 2320 chrome.exe 88 PID 2320 wrote to memory of 864 2320 chrome.exe 88 PID 2320 wrote to memory of 864 2320 chrome.exe 88 PID 2320 wrote to memory of 864 2320 chrome.exe 88 PID 2320 wrote to memory of 864 2320 chrome.exe 88 PID 2320 wrote to memory of 864 2320 chrome.exe 88 PID 2320 wrote to memory of 864 2320 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://www.dhl.com/VA_chat/embed/MY_en.html?ref=contactus%201⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb658a9758,0x7ffb658a9768,0x7ffb658a97782⤵PID:2964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1828,i,15915294448013932743,8969995599878078808,131072 /prefetch:22⤵PID:1420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1828,i,15915294448013932743,8969995599878078808,131072 /prefetch:82⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1828,i,15915294448013932743,8969995599878078808,131072 /prefetch:82⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3232 --field-trial-handle=1828,i,15915294448013932743,8969995599878078808,131072 /prefetch:12⤵PID:1352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3216 --field-trial-handle=1828,i,15915294448013932743,8969995599878078808,131072 /prefetch:12⤵PID:3872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5004 --field-trial-handle=1828,i,15915294448013932743,8969995599878078808,131072 /prefetch:82⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 --field-trial-handle=1828,i,15915294448013932743,8969995599878078808,131072 /prefetch:82⤵PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 --field-trial-handle=1828,i,15915294448013932743,8969995599878078808,131072 /prefetch:82⤵PID:4188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5176 --field-trial-handle=1828,i,15915294448013932743,8969995599878078808,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2784
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4192
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD530d793e2306441a6c7f1b31b25ecbd5f
SHA172b47a25c9563d26662555ffafde1fc58de31a5f
SHA25646f075a6383a0554bdef336fa5be891a83945c1c5c62953bc47188044cb8aea1
SHA5120d681b3c5bdfef6c27a48256c38867c558350f1d026fa274312bd6823d4fc92eaf8d030f509642b729fac3be8fb15c0f5846f8197b74d7578ab15a0babb57ecc
-
Filesize
1KB
MD52cadcc052f29f411264d937bcae98582
SHA1d9a0ea4ed57ca82383e6f225dc7038ed6deebf40
SHA25635ce3e328d99ce5b3176f0cdd39074654b90c0d8adbc5da1c607eb11d77ff954
SHA51226bcbb5b11187fd90da842f683756453288154519d927876a7237930adc540f42e752b3815a0ade4fba1e755d184a7b3f0d97b2f1cbef63679c9b9f27a399881
-
Filesize
873B
MD5f6d442f80702d0a83c80315429ef6c65
SHA165840178c41a208b8a62f4be7d7ee3be4b12ca4f
SHA256d526ae16ef9b66397179a74d330a6584d490bab2892c995c3bdd6c1f9743b670
SHA512896195bddb0133cdf2b522701d63c05801be25342a54dfabf9f24468a80dc89d7643ff74bdd7ea47c9cdd42ff8cdb19683d763099f2e00bcdd4218515450f75a
-
Filesize
6KB
MD5b2c4b7910e9fd8933cec5b07001e475b
SHA1ea1bfdf87e75cd00b2581f99acf7637079874608
SHA2568cfb752f1bf9f36dbfc19c3a4e35b1bd116ade9bfad2106010c4198fd05f02da
SHA5121f8a5dd84224493be46b594aa2c2bc95057ce4f5bd1c493a676e89a41ff31bcec6071855e4f85c945eac46f0414665447fabcc9953c9819379b69f1e581e80cc
-
Filesize
15KB
MD53906f6ea5b94dc71e3f022da898bef4f
SHA1b82888a37e7889f47a8266fc915fb291baaf0686
SHA256a230e1753364bf1b680ff41915c8d0cb17ca140ff796ea7700fc71b12d6df593
SHA512fd73c7655acea3493cb120e6bf5b44c2af1b4e3c6952d3378775b809d5ad7a175805d302781e4f184dc320dca75e8a9f96d8f1b9f15dbb6b8fbab9da6f56756b
-
Filesize
151KB
MD5fa7847a1a9dc4c808defc93e5c1dd166
SHA167360f69a96e08a59d67afc58271d20d39f39068
SHA256d1ee919a1b1bea02cae6f8ecc780ccf997289a41e60a80e2adbee4023bba5250
SHA51276bfbbe7bbd4afa8c3d0fe19607c14eb7430c298ed8f381a6c84947c1d581a734a8c7809531c3c57b2359abc303afe3e614c8fd6b70df9e39bf0254dedd02f1d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd