Analysis
-
max time kernel
602s -
max time network
597s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
01/06/2023, 23:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://buckscountyalive.com/abnrs/countguideclicks.cfm
Resource
win10-20230220-en
General
-
Target
http://buckscountyalive.com/abnrs/countguideclicks.cfm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133301422013172992" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4176 chrome.exe 4176 chrome.exe 1308 chrome.exe 1308 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe Token: SeShutdownPrivilege 4176 chrome.exe Token: SeCreatePagefilePrivilege 4176 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe 4176 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4176 wrote to memory of 3648 4176 chrome.exe 66 PID 4176 wrote to memory of 3648 4176 chrome.exe 66 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 3996 4176 chrome.exe 68 PID 4176 wrote to memory of 4304 4176 chrome.exe 69 PID 4176 wrote to memory of 4304 4176 chrome.exe 69 PID 4176 wrote to memory of 1004 4176 chrome.exe 70 PID 4176 wrote to memory of 1004 4176 chrome.exe 70 PID 4176 wrote to memory of 1004 4176 chrome.exe 70 PID 4176 wrote to memory of 1004 4176 chrome.exe 70 PID 4176 wrote to memory of 1004 4176 chrome.exe 70 PID 4176 wrote to memory of 1004 4176 chrome.exe 70 PID 4176 wrote to memory of 1004 4176 chrome.exe 70 PID 4176 wrote to memory of 1004 4176 chrome.exe 70 PID 4176 wrote to memory of 1004 4176 chrome.exe 70 PID 4176 wrote to memory of 1004 4176 chrome.exe 70 PID 4176 wrote to memory of 1004 4176 chrome.exe 70 PID 4176 wrote to memory of 1004 4176 chrome.exe 70 PID 4176 wrote to memory of 1004 4176 chrome.exe 70 PID 4176 wrote to memory of 1004 4176 chrome.exe 70 PID 4176 wrote to memory of 1004 4176 chrome.exe 70 PID 4176 wrote to memory of 1004 4176 chrome.exe 70 PID 4176 wrote to memory of 1004 4176 chrome.exe 70 PID 4176 wrote to memory of 1004 4176 chrome.exe 70 PID 4176 wrote to memory of 1004 4176 chrome.exe 70 PID 4176 wrote to memory of 1004 4176 chrome.exe 70 PID 4176 wrote to memory of 1004 4176 chrome.exe 70 PID 4176 wrote to memory of 1004 4176 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://buckscountyalive.com/abnrs/countguideclicks.cfm1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffee4459758,0x7ffee4459768,0x7ffee44597782⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1600 --field-trial-handle=1680,i,1899949296085812735,7512557776808449020,131072 /prefetch:22⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1956 --field-trial-handle=1680,i,1899949296085812735,7512557776808449020,131072 /prefetch:82⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1836 --field-trial-handle=1680,i,1899949296085812735,7512557776808449020,131072 /prefetch:82⤵PID:1004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2728 --field-trial-handle=1680,i,1899949296085812735,7512557776808449020,131072 /prefetch:12⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2688 --field-trial-handle=1680,i,1899949296085812735,7512557776808449020,131072 /prefetch:12⤵PID:2628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4436 --field-trial-handle=1680,i,1899949296085812735,7512557776808449020,131072 /prefetch:12⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4768 --field-trial-handle=1680,i,1899949296085812735,7512557776808449020,131072 /prefetch:82⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4992 --field-trial-handle=1680,i,1899949296085812735,7512557776808449020,131072 /prefetch:82⤵PID:4792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3080 --field-trial-handle=1680,i,1899949296085812735,7512557776808449020,131072 /prefetch:82⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3128 --field-trial-handle=1680,i,1899949296085812735,7512557776808449020,131072 /prefetch:12⤵PID:532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3180 --field-trial-handle=1680,i,1899949296085812735,7512557776808449020,131072 /prefetch:12⤵PID:528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4792 --field-trial-handle=1680,i,1899949296085812735,7512557776808449020,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1308
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1132
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
766B
MD525cf4e168d42cbb4c15e398d2df55188
SHA11621ced32bbc0ed91ad01c718abf5dba1950cbff
SHA2568854578b17933d1c73b38c11375bd2a984c20ce44f8fa60f40cbbce3ad3aa453
SHA5128e9b3ce9b00d18d208865806a329a45a9e905d0c5133ec50c5c17ca7d4130178ba46ccc1bb1b631e45a4bb0efecdb3b6cc5bf3657d15e40a685c37d0012081c1
-
Filesize
5KB
MD5f2756b8c6826849a8991495b76084f97
SHA1ed509831427e532f6b970fab110d4c8bc622b5a4
SHA256ccdd1edb4988b15dec3feebe793b01275388baf2d46ce3d0307dc6935a58b681
SHA512389ac3eddddfc148333ba749d99916cd89193f00051cec3b5a3a59be4be72c4961845dcda868d702b1a0eee6ada95e87afc98ae42534b4728f4edc6e218ebffc
-
Filesize
6KB
MD5491a8f07e501dcdc2f03b6b506a84647
SHA19583696605174bcfe956e29688a5c5cfd66e18c2
SHA256b8b5021f872ddb596bfa26d59dc3c05fafcbfa31652777ca1b7faa327475c172
SHA5127546a4d27bb715889eb9dffa305ce901bceb11574ecb8171304be4461391caead2c6afe04d75de80cb76996bf6284ddda3b26e7a8674598dbe0bb9570a282059
-
Filesize
5KB
MD58927e8cbc396716ea1b927121122e0db
SHA1122be4821e770361329132aa410735d04dec3917
SHA2566e8bf86e70f941c3bd02b7bd24c625afa4cf59196e24dbb7d39130d065fa9078
SHA51212c29df46964497d9b90a642f66d8b8b1f22937ac3b8ab1e710d2bac2e27d4687a53ca711825706eed7ace1112a95df99fe0d53a529d5d42f62f4fbec3d9d948
-
Filesize
12KB
MD568ac77883b8a74c4b13a9c45412d30f9
SHA1719706867f3c04d1e47d5f1d981c9591d1491eba
SHA256681cf225f8cbfbb863dfe79a69232f3367544ac9a4fc51d0a9042696534d58c4
SHA5125a3279a3dbfa5409ba0f21bac4dc26260c5e0cfbba78566d06b9f312d11a32aac880e046102188065c2c704dcd161aaac6f2a6770f3e665f699b70164be7a932
-
Filesize
157KB
MD5690ca1bb4cd787a1accdec0309b93795
SHA1162cb7de6a47160619afe57128af07f7263b229d
SHA2562f929bdebecc5349378114a2e3e2318178bb2121c8b02c8f357fc73fcce5ed06
SHA512b6d1e66a8e80c92b1497bf2359f9487d5987dba5758b8bb8e05c9d24ac0483b36d71b69b263a4bb7dd82dbe3b7b18e66a75b5d8f3974e349e59896728b712ed3
-
Filesize
157KB
MD5b9d75f83a378457e9b6f04f07b156864
SHA126b31cf43c7b1458f01ded461a628c5434fda9d2
SHA256dd39ef4eb24271bfb950feb5c10033c00036ed45919ffca51b581ce1173a2944
SHA51258a094f791af1b17a7c44fc50a85c6be4063e8e5c1867cfdf45059c976574a1c74e8a18ff11f01c624c79760e5dd48fafe121f4994a03cf055fbd74111d51150
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd