Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2023 17:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://apiservices.krxd.net/click_tracker/track?kx_event_uid=LR25EaJr&clk=hxxps://sciencewin.co.uk%2F%2F%2F%2F%2F%2F%2F%2F/fctshet/%2F%2F%2F%2F/i0dnj1%2F%2F%2F%2Fam9obi5saW5kc2F5QGhwaW5jLmNvbQ==
Resource
win10v2004-20230220-en
General
-
Target
https://apiservices.krxd.net/click_tracker/track?kx_event_uid=LR25EaJr&clk=hxxps://sciencewin.co.uk%2F%2F%2F%2F%2F%2F%2F%2F/fctshet/%2F%2F%2F%2F/i0dnj1%2F%2F%2F%2Fam9obi5saW5kc2F5QGhwaW5jLmNvbQ==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133289107631819122" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3448 chrome.exe 3448 chrome.exe 1436 chrome.exe 1436 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3448 wrote to memory of 4236 3448 chrome.exe 84 PID 3448 wrote to memory of 4236 3448 chrome.exe 84 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 3784 3448 chrome.exe 85 PID 3448 wrote to memory of 2764 3448 chrome.exe 86 PID 3448 wrote to memory of 2764 3448 chrome.exe 86 PID 3448 wrote to memory of 2560 3448 chrome.exe 87 PID 3448 wrote to memory of 2560 3448 chrome.exe 87 PID 3448 wrote to memory of 2560 3448 chrome.exe 87 PID 3448 wrote to memory of 2560 3448 chrome.exe 87 PID 3448 wrote to memory of 2560 3448 chrome.exe 87 PID 3448 wrote to memory of 2560 3448 chrome.exe 87 PID 3448 wrote to memory of 2560 3448 chrome.exe 87 PID 3448 wrote to memory of 2560 3448 chrome.exe 87 PID 3448 wrote to memory of 2560 3448 chrome.exe 87 PID 3448 wrote to memory of 2560 3448 chrome.exe 87 PID 3448 wrote to memory of 2560 3448 chrome.exe 87 PID 3448 wrote to memory of 2560 3448 chrome.exe 87 PID 3448 wrote to memory of 2560 3448 chrome.exe 87 PID 3448 wrote to memory of 2560 3448 chrome.exe 87 PID 3448 wrote to memory of 2560 3448 chrome.exe 87 PID 3448 wrote to memory of 2560 3448 chrome.exe 87 PID 3448 wrote to memory of 2560 3448 chrome.exe 87 PID 3448 wrote to memory of 2560 3448 chrome.exe 87 PID 3448 wrote to memory of 2560 3448 chrome.exe 87 PID 3448 wrote to memory of 2560 3448 chrome.exe 87 PID 3448 wrote to memory of 2560 3448 chrome.exe 87 PID 3448 wrote to memory of 2560 3448 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://apiservices.krxd.net/click_tracker/track?kx_event_uid=LR25EaJr&clk=hxxps://sciencewin.co.uk%2F%2F%2F%2F%2F%2F%2F%2F/fctshet/%2F%2F%2F%2F/i0dnj1%2F%2F%2F%2Fam9obi5saW5kc2F5QGhwaW5jLmNvbQ==1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf85d9758,0x7ffaf85d9768,0x7ffaf85d97782⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1800,i,11957683385182481212,18419871036313283028,131072 /prefetch:22⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1800,i,11957683385182481212,18419871036313283028,131072 /prefetch:82⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1296 --field-trial-handle=1800,i,11957683385182481212,18419871036313283028,131072 /prefetch:82⤵PID:2560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3204 --field-trial-handle=1800,i,11957683385182481212,18419871036313283028,131072 /prefetch:12⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3184 --field-trial-handle=1800,i,11957683385182481212,18419871036313283028,131072 /prefetch:12⤵PID:336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4504 --field-trial-handle=1800,i,11957683385182481212,18419871036313283028,131072 /prefetch:12⤵PID:3332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3356 --field-trial-handle=1800,i,11957683385182481212,18419871036313283028,131072 /prefetch:12⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4712 --field-trial-handle=1800,i,11957683385182481212,18419871036313283028,131072 /prefetch:82⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 --field-trial-handle=1800,i,11957683385182481212,18419871036313283028,131072 /prefetch:82⤵PID:3708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4720 --field-trial-handle=1800,i,11957683385182481212,18419871036313283028,131072 /prefetch:82⤵PID:3436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1800,i,11957683385182481212,18419871036313283028,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1436
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
960B
MD5b8adcfec95b9646d13b7a2623195f43d
SHA1fa12ee3fb73e1bb19e1def932bfd7ee129dd3051
SHA2569cb717ffdb717a38da36c74c9596946acba55c33a6e3bcd76079f0f2be1be6d9
SHA512c3596b547e82b2052b5ba7e43ca28d470e44e7c0ff4348c7b36be18c0310c87d227be9623d7c2d31ee7a3ff4d4a38487e65658fa09d7804344d8401f4f877c3c
-
Filesize
6KB
MD50ca61b4caef80e28cf43dd61d7173945
SHA11be2d6d01af81219c23cbd04fc05fffcef98f317
SHA256caa7282405ab6ab30bde51ca6474a741a0e1c003a7c0696dde4ba3ac5b7350f2
SHA512d114cc517b7094f144cdd79249540974821b31bbd04faab58e6278b34772ba6d5613bc5661d4db99bc50372b532e5d2236e606ff20b7caa0ec976938360a712d
-
Filesize
6KB
MD561281df8416f333c82e0ede94e872b8c
SHA115894f187685946c8a141a6637be2b086ac2133b
SHA256c9c115950f3134e9e2c3cde7343f1badb37a2d6fe6d9dea7f7e13d0a144e7379
SHA5122eb0c0e6a9789048da3fbcbe959595ca38dba1b86dcea61183e0bb530e9878384a5a208c9295d62bad29a3fa9b251c2d086a5ab09ddb64cd2e04a3b506515a2f
-
Filesize
15KB
MD523a1fc0a9c941c643796904b51920147
SHA181e35aa5ec090a9dc10e142047a54a0cf7d609ea
SHA25691fccee5e6ff46b627a58daad47e1f25a2eb9cfb53fcf82a0f93762c2a1c469e
SHA512b612a0ebf30152b198aabf75ac8afd67fb6e050320ce17c1d71ac86e6af8a1d6816240120cf769e8f924065b65a5a9efa022096528abe8392dbbe8914e8adcee
-
Filesize
151KB
MD5bc4dd31919d4cd0bd11bc9a02745f2a9
SHA18c5bd56cd3ff5c1239e7687765c41a8ac6014393
SHA2564a9c6a3b00cd29f4027e1c872cb26ed5386f2c29b570f71b46ec6ed64486eccd
SHA512dcb195c680df676f78f6ad7000c2e3042bd3b9a8d86ade634cf401d5f3681ccb93b99b899301268ee12a493fdb3134e1db9714dd05fd13ed7499d1032839ed21
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd