Analysis
-
max time kernel
37s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2023 16:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.qantas.uat.travelguard.com
Resource
win10v2004-20230220-en
General
-
Target
http://www.qantas.uat.travelguard.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133289084404422007" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1488 chrome.exe 1488 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe -
Suspicious use of AdjustPrivilegeToken 62 IoCs
description pid Process Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe Token: SeShutdownPrivilege 1488 chrome.exe Token: SeCreatePagefilePrivilege 1488 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe 1488 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1488 wrote to memory of 2908 1488 chrome.exe 83 PID 1488 wrote to memory of 2908 1488 chrome.exe 83 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 2356 1488 chrome.exe 84 PID 1488 wrote to memory of 1624 1488 chrome.exe 85 PID 1488 wrote to memory of 1624 1488 chrome.exe 85 PID 1488 wrote to memory of 2824 1488 chrome.exe 86 PID 1488 wrote to memory of 2824 1488 chrome.exe 86 PID 1488 wrote to memory of 2824 1488 chrome.exe 86 PID 1488 wrote to memory of 2824 1488 chrome.exe 86 PID 1488 wrote to memory of 2824 1488 chrome.exe 86 PID 1488 wrote to memory of 2824 1488 chrome.exe 86 PID 1488 wrote to memory of 2824 1488 chrome.exe 86 PID 1488 wrote to memory of 2824 1488 chrome.exe 86 PID 1488 wrote to memory of 2824 1488 chrome.exe 86 PID 1488 wrote to memory of 2824 1488 chrome.exe 86 PID 1488 wrote to memory of 2824 1488 chrome.exe 86 PID 1488 wrote to memory of 2824 1488 chrome.exe 86 PID 1488 wrote to memory of 2824 1488 chrome.exe 86 PID 1488 wrote to memory of 2824 1488 chrome.exe 86 PID 1488 wrote to memory of 2824 1488 chrome.exe 86 PID 1488 wrote to memory of 2824 1488 chrome.exe 86 PID 1488 wrote to memory of 2824 1488 chrome.exe 86 PID 1488 wrote to memory of 2824 1488 chrome.exe 86 PID 1488 wrote to memory of 2824 1488 chrome.exe 86 PID 1488 wrote to memory of 2824 1488 chrome.exe 86 PID 1488 wrote to memory of 2824 1488 chrome.exe 86 PID 1488 wrote to memory of 2824 1488 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://www.qantas.uat.travelguard.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc855b9758,0x7ffc855b9768,0x7ffc855b97782⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 --field-trial-handle=1780,i,17692694891172431524,6188222075319068691,131072 /prefetch:22⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1780,i,17692694891172431524,6188222075319068691,131072 /prefetch:82⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1780,i,17692694891172431524,6188222075319068691,131072 /prefetch:82⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3016 --field-trial-handle=1780,i,17692694891172431524,6188222075319068691,131072 /prefetch:12⤵PID:916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1780,i,17692694891172431524,6188222075319068691,131072 /prefetch:12⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3980 --field-trial-handle=1780,i,17692694891172431524,6188222075319068691,131072 /prefetch:12⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3152 --field-trial-handle=1780,i,17692694891172431524,6188222075319068691,131072 /prefetch:12⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4076 --field-trial-handle=1780,i,17692694891172431524,6188222075319068691,131072 /prefetch:82⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4896 --field-trial-handle=1780,i,17692694891172431524,6188222075319068691,131072 /prefetch:82⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4084 --field-trial-handle=1780,i,17692694891172431524,6188222075319068691,131072 /prefetch:12⤵PID:2816
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4852
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD513182afce7a641c7aa2c816dfd1f930a
SHA143ad8d0193ef15beb6a67dfc21069656f8429e6e
SHA2567febb3ec78413e9a4189b9d11951d2de4b4beaf5c4db5094080f63371ba462de
SHA5124434af0b417792af664040945d8d783cf8d203459bb0edc408b4a31a88754918ca073ec0c2d7684229164be071913ab653f6f7751576b22e529f0aa27c976234
-
Filesize
151KB
MD5c80753e43568105a04de22a3ec08c328
SHA16c6410d9b39ac9ffacfa60aa7fb5e49bedb6c097
SHA256ed856a7c951ed5aab7648d6c3e606dac2f28042a615903231287031338eea005
SHA512dea6b573fe57ab2be4c7ac7b76604508ff714b1b5149305d3b784bc6314314d7d9b06575e26876cc7dd0f8ef415f16ef3878647ede62554889c6881a3cbdb618