Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2023, 12:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ww25.pointcareclick.com/?subid1=20230519-0619-05c5-9a9d-96e625e8fea3
Resource
win10v2004-20230221-en
General
-
Target
http://ww25.pointcareclick.com/?subid1=20230519-0619-05c5-9a9d-96e625e8fea3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133289798149068424" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1404 chrome.exe 1404 chrome.exe 4184 chrome.exe 4184 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe Token: SeShutdownPrivilege 1404 chrome.exe Token: SeCreatePagefilePrivilege 1404 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe 1404 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1404 wrote to memory of 2640 1404 chrome.exe 83 PID 1404 wrote to memory of 2640 1404 chrome.exe 83 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 3552 1404 chrome.exe 85 PID 1404 wrote to memory of 1384 1404 chrome.exe 86 PID 1404 wrote to memory of 1384 1404 chrome.exe 86 PID 1404 wrote to memory of 1124 1404 chrome.exe 87 PID 1404 wrote to memory of 1124 1404 chrome.exe 87 PID 1404 wrote to memory of 1124 1404 chrome.exe 87 PID 1404 wrote to memory of 1124 1404 chrome.exe 87 PID 1404 wrote to memory of 1124 1404 chrome.exe 87 PID 1404 wrote to memory of 1124 1404 chrome.exe 87 PID 1404 wrote to memory of 1124 1404 chrome.exe 87 PID 1404 wrote to memory of 1124 1404 chrome.exe 87 PID 1404 wrote to memory of 1124 1404 chrome.exe 87 PID 1404 wrote to memory of 1124 1404 chrome.exe 87 PID 1404 wrote to memory of 1124 1404 chrome.exe 87 PID 1404 wrote to memory of 1124 1404 chrome.exe 87 PID 1404 wrote to memory of 1124 1404 chrome.exe 87 PID 1404 wrote to memory of 1124 1404 chrome.exe 87 PID 1404 wrote to memory of 1124 1404 chrome.exe 87 PID 1404 wrote to memory of 1124 1404 chrome.exe 87 PID 1404 wrote to memory of 1124 1404 chrome.exe 87 PID 1404 wrote to memory of 1124 1404 chrome.exe 87 PID 1404 wrote to memory of 1124 1404 chrome.exe 87 PID 1404 wrote to memory of 1124 1404 chrome.exe 87 PID 1404 wrote to memory of 1124 1404 chrome.exe 87 PID 1404 wrote to memory of 1124 1404 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://ww25.pointcareclick.com/?subid1=20230519-0619-05c5-9a9d-96e625e8fea31⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff81c3e9758,0x7ff81c3e9768,0x7ff81c3e97782⤵PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1812,i,7672694687741640351,17554602299480851185,131072 /prefetch:22⤵PID:3552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1812,i,7672694687741640351,17554602299480851185,131072 /prefetch:82⤵PID:1384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1812,i,7672694687741640351,17554602299480851185,131072 /prefetch:82⤵PID:1124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3028 --field-trial-handle=1812,i,7672694687741640351,17554602299480851185,131072 /prefetch:12⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3040 --field-trial-handle=1812,i,7672694687741640351,17554602299480851185,131072 /prefetch:12⤵PID:3260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4448 --field-trial-handle=1812,i,7672694687741640351,17554602299480851185,131072 /prefetch:12⤵PID:772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 --field-trial-handle=1812,i,7672694687741640351,17554602299480851185,131072 /prefetch:82⤵PID:4040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4952 --field-trial-handle=1812,i,7672694687741640351,17554602299480851185,131072 /prefetch:82⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 --field-trial-handle=1812,i,7672694687741640351,17554602299480851185,131072 /prefetch:82⤵PID:3216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2316 --field-trial-handle=1812,i,7672694687741640351,17554602299480851185,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4184
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:888
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5e001382cc777bf6c14060378e726aef3
SHA1a9634684a479663a01d957254d36eee9be898f4e
SHA25621c92d30c83bdf2188998ca4f3e26e4d0c5437de11f0b94008e4347956462234
SHA512463059645e650d93741bf039b0e9d89229906bc3ff7f1b5aacc3d21e3c82f98761d444717ca5971e86cfc27807f8c7ff577223ab8b6a311f21e77e7a63552529
-
Filesize
1KB
MD5c52872f341ae0af59e549535b95c8e7a
SHA14b850360099026e0fca6b09a645e275f1504de19
SHA2561bbb92041a635631de4f706222f462c20f467750b0d8decceabafc524bc73cdb
SHA512f253018192d3e9b1f169b7a6b5833e80a527904dc4ef5f60e524c08ad7d7113d2ba8950eba201814646c3a5402a4fe6e3ca9f1ebad3af45b7a08fd63be8cf22b
-
Filesize
6KB
MD5c8bdd1ceb04824987beeba53528edb15
SHA1242fc9585dedb7907821c8ad8c4a667d08bf9e77
SHA25687a7b8a1b4143973aee921548bb5c6999b2d90c078c5ea78fa42a682650dda34
SHA51239b9c688174be283efd700b67ba4ef50e540171b595bd0e8020ecb7bce92b3ed119587aa98115e1a906b347cc3cf07a6b9b1a38d027b86bfd477777d9e459956
-
Filesize
15KB
MD52a44a27d5b950282c69465b5d2aac40f
SHA18f7008d23e700700e7a13f29a74e249ddd4141e0
SHA25611cd9ae090696220877eb13d4ca43133a39ea33b7f684bcd568f32e8347e6c2e
SHA512ff7fd0b2225694356d03c46d395c13c3b3abaca907a0c0e25c252c9f68f0025e7bee45ff6f2606838e7690966aabf549e3702ac04290e08988d827d2e326a701
-
Filesize
151KB
MD58ffed422176d4299af23565aba049cec
SHA10e117af2db5c5120856213430ced39113ee5ed5a
SHA256da4915132181cc29a02585f1738be7a2c8669404dd52ca562d76fa8316758a62
SHA51253174d7a243ac1b8482a67c4d5ce81e07a461edf4cdb2d7a088cb152b373dee088e21acb2a9e5edbb1fb480205ebcdf44f784fbece7a383624c2da40e034c6a6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd