Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
01-06-2023 18:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://buckscountyalive.com/abnrs/countguideclicks.cfm?businessid=22689&targeturl=https%3A%2F%2Faibqb.com%2Fapp%2F
Resource
win10-20230220-en
General
-
Target
https://buckscountyalive.com/abnrs/countguideclicks.cfm?businessid=22689&targeturl=https%3A%2F%2Faibqb.com%2Fapp%2F
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133301175573904158" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1620 chrome.exe 1620 chrome.exe 4876 chrome.exe 4876 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe Token: SeShutdownPrivilege 1620 chrome.exe Token: SeCreatePagefilePrivilege 1620 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe 1620 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2192 1620 chrome.exe 66 PID 1620 wrote to memory of 2192 1620 chrome.exe 66 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4372 1620 chrome.exe 69 PID 1620 wrote to memory of 4480 1620 chrome.exe 68 PID 1620 wrote to memory of 4480 1620 chrome.exe 68 PID 1620 wrote to memory of 2008 1620 chrome.exe 70 PID 1620 wrote to memory of 2008 1620 chrome.exe 70 PID 1620 wrote to memory of 2008 1620 chrome.exe 70 PID 1620 wrote to memory of 2008 1620 chrome.exe 70 PID 1620 wrote to memory of 2008 1620 chrome.exe 70 PID 1620 wrote to memory of 2008 1620 chrome.exe 70 PID 1620 wrote to memory of 2008 1620 chrome.exe 70 PID 1620 wrote to memory of 2008 1620 chrome.exe 70 PID 1620 wrote to memory of 2008 1620 chrome.exe 70 PID 1620 wrote to memory of 2008 1620 chrome.exe 70 PID 1620 wrote to memory of 2008 1620 chrome.exe 70 PID 1620 wrote to memory of 2008 1620 chrome.exe 70 PID 1620 wrote to memory of 2008 1620 chrome.exe 70 PID 1620 wrote to memory of 2008 1620 chrome.exe 70 PID 1620 wrote to memory of 2008 1620 chrome.exe 70 PID 1620 wrote to memory of 2008 1620 chrome.exe 70 PID 1620 wrote to memory of 2008 1620 chrome.exe 70 PID 1620 wrote to memory of 2008 1620 chrome.exe 70 PID 1620 wrote to memory of 2008 1620 chrome.exe 70 PID 1620 wrote to memory of 2008 1620 chrome.exe 70 PID 1620 wrote to memory of 2008 1620 chrome.exe 70 PID 1620 wrote to memory of 2008 1620 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://buckscountyalive.com/abnrs/countguideclicks.cfm?businessid=22689&targeturl=https%3A%2F%2Faibqb.com%2Fapp%2F1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff978b19758,0x7ff978b19768,0x7ff978b197782⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1956 --field-trial-handle=1744,i,16129052908660073528,18357192105945497973,131072 /prefetch:82⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1580 --field-trial-handle=1744,i,16129052908660073528,18357192105945497973,131072 /prefetch:22⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2112 --field-trial-handle=1744,i,16129052908660073528,18357192105945497973,131072 /prefetch:82⤵PID:2008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3116 --field-trial-handle=1744,i,16129052908660073528,18357192105945497973,131072 /prefetch:12⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3092 --field-trial-handle=1744,i,16129052908660073528,18357192105945497973,131072 /prefetch:12⤵PID:4792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4704 --field-trial-handle=1744,i,16129052908660073528,18357192105945497973,131072 /prefetch:12⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=1744,i,16129052908660073528,18357192105945497973,131072 /prefetch:82⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 --field-trial-handle=1744,i,16129052908660073528,18357192105945497973,131072 /prefetch:82⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3320 --field-trial-handle=1744,i,16129052908660073528,18357192105945497973,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4876
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3620
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
774B
MD5e6721cc265b9a6231dac03a26c41071f
SHA1dbdd163c2b94305855c175721919a8448ab50184
SHA256df610e9227e2e57ff95bebb4bf7faa24f9b57abf20737b90f63be019e30e01c8
SHA51240c36de9adf4b3c428a5dea7a5264f6e2e2ad625e079e8be4c4bc9da84f66871cdd5c66eddbf834d2734ab76b742a8fbec0f2331a79725c228551f1829fb8e31
-
Filesize
5KB
MD53b8dbf5b9c9812d6cbefd0ca1ec6ed34
SHA19cfa9c21fd349415b1c4c2cc5e4f0d8a53b75523
SHA256a740ab2f342e65639c109aca0b8c1f33ce58c5d735df604cb9efedea5430066e
SHA512135d016864caa4cdccfc0fe69974b315e652c5287656150ec45f78f6422a33919718b71f913837ff49cb57d634c6317f622c1f38a1ceef16293175db756832e5
-
Filesize
5KB
MD58723eca18bda890fa43eb20ac58139ea
SHA13a9146dd595a7ae0d0f5addb32b2770a76127a89
SHA2564703d448d7dcded3bd454c3f2682338bed585795f39235f514e4bb4e2cf1299e
SHA51254deddeba0a07f424de4bc808602e7c5b8c75b561b05ff29dea15e89ce2a64c0c10540d8959e7b7847f7fe4d407d60552579cdb36b02a5fe69e12a5e8d42c06b
-
Filesize
5KB
MD5fc63a31a1260e7b64289862f3ce75d0e
SHA1212f4d7ed137d16fe92130ce056b01aacc7cf7a4
SHA256c86c24afabd0f41b58e4123455e854130719d9c0e13e9331c8a859855c395c5a
SHA5124dee278d1daf45f15e403b467d12df74232bb5ccdd8021af25e58d5952c5a191ba8f66fee3a22575d57e1a3de33f60d0920daf39a4e531b45ca16ff6697bfe80
-
Filesize
157KB
MD508f9fb9168fe4765cc872348c92f1471
SHA1dfbdc99ff2312a92dd1b4c423a5da86ce52aa55f
SHA2562268751e44439bdeacc9b364e16ce561887a8c0ce07463140cf6bfa2b7fb3022
SHA51245ce1d5e2d3d3f69942b07cbe77b1670609d211fc333d7436f3faa97eb72c5f5011ea5f89038de6ccaf2ff0f87071e9b8211489c8c2bcdf37700a117991050de
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd