Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2023 00:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://d2international.co.uk/sbb/express.php
Resource
win10v2004-20230220-en
General
-
Target
https://d2international.co.uk/sbb/express.php
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133296299261422684" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 3820 chrome.exe 3820 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 3820 chrome.exe 3820 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe Token: SeShutdownPrivilege 3820 chrome.exe Token: SeCreatePagefilePrivilege 3820 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe 3820 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3820 wrote to memory of 444 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 444 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 404 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 4328 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 4328 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 4908 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 4908 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 4908 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 4908 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 4908 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 4908 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 4908 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 4908 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 4908 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 4908 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 4908 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 4908 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 4908 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 4908 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 4908 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 4908 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 4908 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 4908 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 4908 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 4908 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 4908 3820 chrome.exe chrome.exe PID 3820 wrote to memory of 4908 3820 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://d2international.co.uk/sbb/express.php1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdac869758,0x7ffdac869768,0x7ffdac8697782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1812,i,4561456594561677696,4859827292139801937,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,4561456594561677696,4859827292139801937,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1812,i,4561456594561677696,4859827292139801937,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3192 --field-trial-handle=1812,i,4561456594561677696,4859827292139801937,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3184 --field-trial-handle=1812,i,4561456594561677696,4859827292139801937,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4936 --field-trial-handle=1812,i,4561456594561677696,4859827292139801937,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 --field-trial-handle=1812,i,4561456594561677696,4859827292139801937,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 --field-trial-handle=1812,i,4561456594561677696,4859827292139801937,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000005Filesize
281KB
MD5d4ac92ae811ea9d8621bf1482639ce2f
SHA1b838239363664603b7b489433294693c3dbaa551
SHA25647d8f97cde8ae802685f2595b23ee4539c258afb13cf0014c430e99bc9aa10b8
SHA512dca2288051a6fbacd6515ddbba522ffe39eb0ff32921492c88b90dbccb5cfba2b8aba6cf0ef137f8cee67f32307c6bc81d6e87c296ccc05fad5be0080cd4873f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
120B
MD50668cccb5b9444cd207f493197619075
SHA13f9cf22818a0ebb1a4bee792305ccf223fa242a3
SHA256d6e76210c86d7e03f18c9af6770de50c9474278575a56a0b6fcd4108b5a1dd3f
SHA512f971fada63ebc595e64af8624a18621125ed56b2cc62ed177b7d8fb4d400ba4526b59e7a8b737dd394eddf4d93798e0446befbb6a99d5ae6939887dc7486e283
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
144B
MD51b5f7504afdc64b85a6420aecf306052
SHA155fc051e3cbdf1be21e6992b35df580a062cc4ac
SHA25650506e6715e4a5d2cd62022911b9d3983e8c7252b434f93f34d3ae058502f9ff
SHA512052d4f352a5ead44d21f2b33ea6acc49e3063dcbdc8d2fac0c9ca59ecb88accec6cefd675208bdc6c516a1acfd19a828acfff11c64ef4a5cba8090d3355d17d6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD523900c4e68be8235be465b11e6e0457e
SHA1b1f4df311251b2961e1784da49186b0ed62562a8
SHA256b97595ad5b83acaa9fa3a96cbb3d22373ff9f52496a3d8a99603845b665d4b62
SHA512eee96803c0f73d52f8d0da64d09a0f59fc5ab7af75aa563ca9e98eae6d55fb469d1d83f99796b2a38e7b3d04702b77559ca7885e8126e0d96b4d78508d8a463f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD51ac63bd2ca0a32539e7bffd78e6aa2ae
SHA17391b76566fe3056777ecd699d33f4f15b6ca34c
SHA256fcc95a03c570821d214b43d283355e0812b1050a1b6bfbb7b1c267762183c48d
SHA5123dc990fa8e2cbb0f52956b64e954ad97e1aeb05af7b6a60f9f35631d23cf835a676a9638a128caaac6a77571cad9f1684381f2f720a17c00ef679621d0e8a9b5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5697ff8ffffde2a118ebe442b67d2989b
SHA1fb6649718c02fe0bbf6743db491277d3a03dcb47
SHA256aabba73cf0f21b2341d40088d34842341d9be0d90d7650686265b6dbb44387f3
SHA512fcdeed1ae24e3ee1d66aa4a04b67630984dd4588ac2e5ed64d74341aaf5656a82e7f8a172a292741b96e1c33662b38ba90289d0c62c63bfc452c3a7a4353656b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD548830ab4b29f14455d833360e2cf80c3
SHA1a9bdb3bed166399f21f76fdaa0cf302a640b339c
SHA256dba07e028626f6714b08329ea3465b8cfec0935c3c9e4c0d2076367a9a19eb7d
SHA512ebd187886bedcdb14a374eb1309dd38ac5aa00cf41df53ab7eb0b51de026e3ccb99f39daa581ec2ec46fdf428b87c1625d6b911151c1b5e220688b277a5eacb4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD58997772480f8bda84a0f6fad316d9384
SHA1c5ebb715bef19705636b4b763d6a299c9639bfad
SHA256b692d64a32ff6a477a3c3ac287d9c49852f322d661221068028702a7ceac063e
SHA512688aaa17ce3384bee8b03d90eeefa40092692f32aa630281ab749072165ee755b43f6fb0c795ec646613017f473e06bfaf721ba37036f58c625b46b19223c70a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
15KB
MD54ad7eba8edf9263912a258b7a148019c
SHA19ac9a0d5fa898e705e25b4bfcd772306ef321291
SHA256f2b26cd97453b597d934896a6c73f99113ac4c0cfedb1d01c9b33cf87ed6d95b
SHA5128ae66c90be0d3360ee3315a0f84d313b1f88e3796088529380d195a5d8ce972795bf1d8fc0767ac2e30c905910cb4a9e3f66e1af549ef2fd83408c5be028c60b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
153KB
MD5deb0bc1c3704f08e542f237a6def02ae
SHA167c3268ea30a8a93606a0d111c21d2645794f0bf
SHA2560559816fb41c7d802806f57d5e5551ab6f9706bf627bb855b87c2d66d1c387cd
SHA5122af4461774ca26e45637d091d82a439907e3ea8c9cceda39653e2fa444891f6b9d0d4c69467ef107116632181db9147d63096ef3fb337bcd63c962b7d3069685
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_3820_YIIYWEDAKJXJLJDHMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e