Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2023, 09:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://mail.cadhiraj.com/interface/root
Resource
win10v2004-20230220-en
General
-
Target
http://mail.cadhiraj.com/interface/root
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133294026667209302" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3524 chrome.exe 3524 chrome.exe 1860 chrome.exe 1860 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3524 chrome.exe 3524 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3524 wrote to memory of 2832 3524 chrome.exe 85 PID 3524 wrote to memory of 2832 3524 chrome.exe 85 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 2164 3524 chrome.exe 86 PID 3524 wrote to memory of 1344 3524 chrome.exe 87 PID 3524 wrote to memory of 1344 3524 chrome.exe 87 PID 3524 wrote to memory of 2064 3524 chrome.exe 88 PID 3524 wrote to memory of 2064 3524 chrome.exe 88 PID 3524 wrote to memory of 2064 3524 chrome.exe 88 PID 3524 wrote to memory of 2064 3524 chrome.exe 88 PID 3524 wrote to memory of 2064 3524 chrome.exe 88 PID 3524 wrote to memory of 2064 3524 chrome.exe 88 PID 3524 wrote to memory of 2064 3524 chrome.exe 88 PID 3524 wrote to memory of 2064 3524 chrome.exe 88 PID 3524 wrote to memory of 2064 3524 chrome.exe 88 PID 3524 wrote to memory of 2064 3524 chrome.exe 88 PID 3524 wrote to memory of 2064 3524 chrome.exe 88 PID 3524 wrote to memory of 2064 3524 chrome.exe 88 PID 3524 wrote to memory of 2064 3524 chrome.exe 88 PID 3524 wrote to memory of 2064 3524 chrome.exe 88 PID 3524 wrote to memory of 2064 3524 chrome.exe 88 PID 3524 wrote to memory of 2064 3524 chrome.exe 88 PID 3524 wrote to memory of 2064 3524 chrome.exe 88 PID 3524 wrote to memory of 2064 3524 chrome.exe 88 PID 3524 wrote to memory of 2064 3524 chrome.exe 88 PID 3524 wrote to memory of 2064 3524 chrome.exe 88 PID 3524 wrote to memory of 2064 3524 chrome.exe 88 PID 3524 wrote to memory of 2064 3524 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://mail.cadhiraj.com/interface/root1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff30df9758,0x7fff30df9768,0x7fff30df97782⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1812,i,14647662002492025885,3885019044873627918,131072 /prefetch:22⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1812,i,14647662002492025885,3885019044873627918,131072 /prefetch:82⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1812,i,14647662002492025885,3885019044873627918,131072 /prefetch:82⤵PID:2064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3128 --field-trial-handle=1812,i,14647662002492025885,3885019044873627918,131072 /prefetch:12⤵PID:3744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3144 --field-trial-handle=1812,i,14647662002492025885,3885019044873627918,131072 /prefetch:12⤵PID:3120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 --field-trial-handle=1812,i,14647662002492025885,3885019044873627918,131072 /prefetch:82⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5088 --field-trial-handle=1812,i,14647662002492025885,3885019044873627918,131072 /prefetch:82⤵PID:1888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 --field-trial-handle=1812,i,14647662002492025885,3885019044873627918,131072 /prefetch:82⤵PID:1816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1812,i,14647662002492025885,3885019044873627918,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1860
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4688
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5e6c1a59bb8f704275da215b795cad98c
SHA175ace3b7074227f4274441786fc034fa42b3e767
SHA256d2be1cb521b579586b3a99cd96406d8b84f97578c4bfacdbdb88b7ab7baebb77
SHA512fbfedaed05c7ef65a53874fa3aee11a036aad31fd2d34271e8b96097083a8505d78bc79b5578bfbe7ef53525a4d053373dbed40eaaed8b116ab3a00ce0b75295
-
Filesize
1KB
MD57be7e4b679ab5f29f2e4ed72a55d1929
SHA17ebe87990a9af1f04fa2257469f508b0dba72090
SHA2563d6b8da5b58e3f01dda7e3d31d9037d1d81695e9084f8da2cecd4db679b69ecb
SHA51233129cd722531b518cec85d0e0bc79c570b6c75448d3c9cdb9864a5ee76b4d07cf443cfd19d659dfe4cc8dfd6f831d60644ddb86db481f2bac8eb9c586f4d8de
-
Filesize
6KB
MD54187d9db8ea5f7a999c5dbee6eecfb94
SHA18c595a99056cd5e2631edf998c6a6d191bf39c1f
SHA256c35f4ea0e2ec0153bce057a95eb8528d8d2a2697758d47f70e30660ad4f74a96
SHA512f83335511bb7453885ec10c211b2d2c7ed0ca7eec91ea91500eeb6a935934a5b2d8ad90cc57c55834b29ade6f762513ea968dfd71f29097c2e9544f99943f5a2
-
Filesize
15KB
MD50f17b002543d7cc6405d45fe9b5706bb
SHA1297b0cd5d2859f7e8ab87b4279aab9f245378770
SHA256586934719dbcd0a883516106e05b09bafa9aa5f2772f9a28aa4ee84588de909e
SHA5121bb8fd07bd98f48bf5032c377046e5c2dde8d5cffce562a2791a3ac24314ec668011af9c78e1325ed70776e044124691ecda3e3a3f7d4c36391fe7778bdba4af
-
Filesize
152KB
MD51edec86cc7b5d1e90ebb370e1572ca30
SHA1f5abfcf9c31ed3ab8751b12d8ef2cc3c570c8215
SHA256d049eddeb43101375471bf2bb89da71b399de7a9d1fe99b2117242e44d327e45
SHA51223d1e7d327987e8cfbef4fe5d246e97d12a783230ef898c8ce64fe9f6c0fe50550e375b45371a9a1d4051af22a05fdc31704d05df0e3708cce9034208219e158
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd