Analysis
-
max time kernel
1801s -
max time network
1691s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2023, 19:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://pakk-omniva.com
Resource
win10v2004-20230220-en
General
-
Target
http://pakk-omniva.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133296038533315098" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2072 chrome.exe 2072 chrome.exe 4340 chrome.exe 4340 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2072 wrote to memory of 4988 2072 chrome.exe 83 PID 2072 wrote to memory of 4988 2072 chrome.exe 83 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 3348 2072 chrome.exe 84 PID 2072 wrote to memory of 4716 2072 chrome.exe 85 PID 2072 wrote to memory of 4716 2072 chrome.exe 85 PID 2072 wrote to memory of 3616 2072 chrome.exe 86 PID 2072 wrote to memory of 3616 2072 chrome.exe 86 PID 2072 wrote to memory of 3616 2072 chrome.exe 86 PID 2072 wrote to memory of 3616 2072 chrome.exe 86 PID 2072 wrote to memory of 3616 2072 chrome.exe 86 PID 2072 wrote to memory of 3616 2072 chrome.exe 86 PID 2072 wrote to memory of 3616 2072 chrome.exe 86 PID 2072 wrote to memory of 3616 2072 chrome.exe 86 PID 2072 wrote to memory of 3616 2072 chrome.exe 86 PID 2072 wrote to memory of 3616 2072 chrome.exe 86 PID 2072 wrote to memory of 3616 2072 chrome.exe 86 PID 2072 wrote to memory of 3616 2072 chrome.exe 86 PID 2072 wrote to memory of 3616 2072 chrome.exe 86 PID 2072 wrote to memory of 3616 2072 chrome.exe 86 PID 2072 wrote to memory of 3616 2072 chrome.exe 86 PID 2072 wrote to memory of 3616 2072 chrome.exe 86 PID 2072 wrote to memory of 3616 2072 chrome.exe 86 PID 2072 wrote to memory of 3616 2072 chrome.exe 86 PID 2072 wrote to memory of 3616 2072 chrome.exe 86 PID 2072 wrote to memory of 3616 2072 chrome.exe 86 PID 2072 wrote to memory of 3616 2072 chrome.exe 86 PID 2072 wrote to memory of 3616 2072 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://pakk-omniva.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffc29de9758,0x7ffc29de9768,0x7ffc29de97782⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1812,i,3981239820290835527,9636728683457762585,131072 /prefetch:22⤵PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1812,i,3981239820290835527,9636728683457762585,131072 /prefetch:82⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1812,i,3981239820290835527,9636728683457762585,131072 /prefetch:82⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1812,i,3981239820290835527,9636728683457762585,131072 /prefetch:12⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1812,i,3981239820290835527,9636728683457762585,131072 /prefetch:12⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4816 --field-trial-handle=1812,i,3981239820290835527,9636728683457762585,131072 /prefetch:12⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 --field-trial-handle=1812,i,3981239820290835527,9636728683457762585,131072 /prefetch:82⤵PID:436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 --field-trial-handle=1812,i,3981239820290835527,9636728683457762585,131072 /prefetch:82⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5200 --field-trial-handle=1812,i,3981239820290835527,9636728683457762585,131072 /prefetch:12⤵PID:2580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5232 --field-trial-handle=1812,i,3981239820290835527,9636728683457762585,131072 /prefetch:12⤵PID:3700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3616 --field-trial-handle=1812,i,3981239820290835527,9636728683457762585,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4340
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2188
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
702B
MD53701e0923431d85ebf18e8e250bf1b54
SHA17fcff702b2855ff39503a372d9d887293195c83c
SHA256093fec07cf21af6a4951473c75989b893461b99034076af253d7efeef2175d10
SHA5127088b545b105901467b40e9e010c031fb3f44a2df4d48821ba9366eb6ceeb0e810806f0abe97ddec8f5ef89a8ca695456b87d1d69fcd8f38f9729a9513186c9c
-
Filesize
8KB
MD556be5b4799d55e613d9de7c86bce7a8a
SHA1a884983b4de5149a12482efc5131cf556b8b381a
SHA2568c4df728a8444801ff5d4a31e26d1847db4751da08f270c3590ab3f06d102af8
SHA512896a0cc94383bd42fab6201f4d965e991048cdb40721ab2d2d8072977c2be68b8d7d3665d054feab096d8a62559331124ee3ae5398dddb19e4a547ce6a5e66cb
-
Filesize
9KB
MD5c690085f392fba0cd6d68ca447e92206
SHA177f59f7572a5722da8fc7a54606fc2aa8c20ad29
SHA2569cb4b5bd2e20b7906c9e8ec00434bad32d6469d2413e2e59420e5138032cd9b0
SHA512e633f89a1cbb14ab3d3409a77057f39ae9243d824012ac310dc9b69479e1f3fdf65478f2ea08b60079589d5b92b17e1eff3cb7c7c07e058817b7ed94446827bd
-
Filesize
5KB
MD5e261bf1489224669798e0da313a2b8e0
SHA1cae2bc6f7cfdc9728d5e16d2336d413e96f48147
SHA256ec57db34fdc4daf26bf2d97d7a821cefa2d57e82fbe17c425c79dc6d46055b7c
SHA512a8e83aea46b02bc7b8169497bbe034d308ed3dce9534fc89317f171c6d1021971c2479677b165049f9e0c6a41be8e6e5d726a64f97622ffa3221b1454699e7e8
-
Filesize
154KB
MD512eb654d0cd66c8e53d9d6cf9360931a
SHA1bf5aaaa6afa446fb1371a4173463623e27b02cd7
SHA2563d77c07a228a4da9d7cc3b497cfb82379d31c1343a9af9a3afe3e1f9845a3290
SHA5127002f934807a3f68c2762c9c1d2af5e43f8c9c5cc2da21bcd06d0b7c3dd15002bbc81707c3fe456019ebcc033b3231876f4f6f1b97893477d1d7f2616a95029d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd