Analysis
-
max time kernel
29s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-es -
resource tags
arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
22/05/2023, 20:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ac.ac-page.com/auto-enrollment-update-preferences
Resource
win10v2004-20230220-es
General
-
Target
https://ac.ac-page.com/auto-enrollment-update-preferences
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133292679736343172" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1112 chrome.exe 1112 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1112 chrome.exe 1112 chrome.exe -
Suspicious use of AdjustPrivilegeToken 56 IoCs
description pid Process Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1112 wrote to memory of 5116 1112 chrome.exe 83 PID 1112 wrote to memory of 5116 1112 chrome.exe 83 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 852 1112 chrome.exe 84 PID 1112 wrote to memory of 2836 1112 chrome.exe 85 PID 1112 wrote to memory of 2836 1112 chrome.exe 85 PID 1112 wrote to memory of 3840 1112 chrome.exe 86 PID 1112 wrote to memory of 3840 1112 chrome.exe 86 PID 1112 wrote to memory of 3840 1112 chrome.exe 86 PID 1112 wrote to memory of 3840 1112 chrome.exe 86 PID 1112 wrote to memory of 3840 1112 chrome.exe 86 PID 1112 wrote to memory of 3840 1112 chrome.exe 86 PID 1112 wrote to memory of 3840 1112 chrome.exe 86 PID 1112 wrote to memory of 3840 1112 chrome.exe 86 PID 1112 wrote to memory of 3840 1112 chrome.exe 86 PID 1112 wrote to memory of 3840 1112 chrome.exe 86 PID 1112 wrote to memory of 3840 1112 chrome.exe 86 PID 1112 wrote to memory of 3840 1112 chrome.exe 86 PID 1112 wrote to memory of 3840 1112 chrome.exe 86 PID 1112 wrote to memory of 3840 1112 chrome.exe 86 PID 1112 wrote to memory of 3840 1112 chrome.exe 86 PID 1112 wrote to memory of 3840 1112 chrome.exe 86 PID 1112 wrote to memory of 3840 1112 chrome.exe 86 PID 1112 wrote to memory of 3840 1112 chrome.exe 86 PID 1112 wrote to memory of 3840 1112 chrome.exe 86 PID 1112 wrote to memory of 3840 1112 chrome.exe 86 PID 1112 wrote to memory of 3840 1112 chrome.exe 86 PID 1112 wrote to memory of 3840 1112 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://ac.ac-page.com/auto-enrollment-update-preferences1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad9789758,0x7ffad9789768,0x7ffad97897782⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1816,i,836279900095315822,5682355578973374789,131072 /prefetch:22⤵PID:852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1816,i,836279900095315822,5682355578973374789,131072 /prefetch:82⤵PID:2836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1308 --field-trial-handle=1816,i,836279900095315822,5682355578973374789,131072 /prefetch:82⤵PID:3840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3204 --field-trial-handle=1816,i,836279900095315822,5682355578973374789,131072 /prefetch:12⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3216 --field-trial-handle=1816,i,836279900095315822,5682355578973374789,131072 /prefetch:12⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5332 --field-trial-handle=1816,i,836279900095315822,5682355578973374789,131072 /prefetch:82⤵PID:3316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 --field-trial-handle=1816,i,836279900095315822,5682355578973374789,131072 /prefetch:82⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4632 --field-trial-handle=1816,i,836279900095315822,5682355578973374789,131072 /prefetch:82⤵PID:1396
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3864
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5dbfab546999ca5cd0c759047727a312d
SHA14d9ddf03d91c53c40f6f525fd82f64d99aebe68f
SHA256d406de3862564ddb3e3d5a8a23e2bfdc1407ecf36a6473e11961bdd674f6e84e
SHA51280091e63ddbf2ffe937bb3abb3d0afa6d9ca0b4a609e1072235b93028e2489b0546db71b832d0c29b1123d185acaa4036f3f3f374b9b5cb1dcb943101b533a2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5bf4b2bbfe497cf1a5e9abe026c397be8
SHA1c7409c77bbd39b7d6f9434b404fbd796f518aeb0
SHA256006cc23e40a037889a7c0a81cc5f6a68dfcd2d976f25750fe036b4200e24d3ba
SHA512adc0cfced3ff636167b334a66e66d483950c48eeebb6c8aa6794e59715e61f3ebdc50231090aa04a1737d3c35f670fc66a816358909e0a374fcba315a8985027
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD54a1b91316ac94f36975d1a21ba6a875f
SHA1f97fcefee8df506532505ac7fcc77a79605d8cec
SHA256cd995258636dd87f56cc8e60381a2055097b5431c59ec94ab05670cdbe96a569
SHA512b37ad0c16f14a9ae34c0fc6bd368d4e97a915959822db61573214a798f16fef1eb561c5b66f7626a53d37debb6fb925a75d38c51aaf6b279772b664ed3bcf385
-
Filesize
576B
MD5860ef18174ec88d5e39d120404440ea4
SHA106eaafb065aa499eb3bf307bd5688e600b5907d2
SHA256c6031b1f195b6fe2fe22c3435970a1576e61a072ca479a36829da09997349db0
SHA5124f4522b6c90f280f04baf726921fce56b1a2b55ebb37612c5dfae08c4fd683cf3d8444d9792ac991fb60bd3d1ac353a5c306931eb4291ce6b12bb0b9aed6f043
-
Filesize
1KB
MD5dc15012da4d1c914c13048af9ee5b710
SHA1262f5b65654c4d6a096a57087018be51ef66ca2f
SHA2565a32f923f595b5db5cde211f076d4e3d31e21f4e3e28914fb66c61273ca68ffb
SHA512b764a7ef9d6f24465181cb8aaa3f9aff288785c66dcf6d614b74a6fcd7ce70c97b2ad8ef271e319b18e77794428e8d8186a2cafa21a9c5bd03371f1a16fd4d52
-
Filesize
6KB
MD5d30529f31a3ab9818ac3b20ec9aea918
SHA1d2a40cb3662a7e9de5a390d020b4c1e3c0266d21
SHA2568601bb54b7a740996d4e88bf61ddc90786bd204b285bee8c84225192098c466d
SHA512d82c492a0b816fc7821d4721b62fac58110876e4e85d81bd29b7f19e9782927fbb8e8151764d157ba784de03cdc75798d86cb5beae93f4717e3d6a8bf7e69088
-
Filesize
6KB
MD5df51d4d08afb3a443d932a0cefa31628
SHA1f3cae90ae8ae5f3b6850c471f46a9812e37fa84d
SHA2569e87d7db1f1a6beb364f1fdacd2a351876098daa78fd2f5064b1c165e0028c6f
SHA512ea79d0aa0f9a4f7bd38386eada5d34d77067422e22820f1edaca3743948c4c3239ee4b871e659a6ea171614c216cb88c076cc28386a671e3ff796d1494d3f214
-
Filesize
15KB
MD586811dc7b9bd2ab95a96129db28ba171
SHA132adb8900ac6ccfaa8ba9df4cacbfb47a8db7593
SHA2568af8175dd477a71692376b9512f2ddafe46772b71c722ba9c0eb51b1df289834
SHA5121a007483da052c43c3e2c5e8f542edcff6faf85336ad27fc65f9d5b453b344c14432bb2cff9e6024174b4b32c9e6c998d3a72f7fbbeedc9ddc4c527c80953403
-
Filesize
151KB
MD58fbdb7d0f2ffafd6a18a4dbe33824fdd
SHA100218056f3697aa993ffe396a6b023a3ab08c2c3
SHA25600e4af7e26bfb54a7c25f2e8114d9c2ab078bfc09a642414fc0958346b7bb45a
SHA5123304af2a0d47c3ee7270de9f7a0842a44574411e8cf8e7e0a39a3103d2c3635e52af13a548a552fdc64791a3a723587d5a0cf32da206a26672418fced3e5ff31
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84