Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2023, 11:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.thebluebook.com/wsnsa.dll/WService=wsbrk1/comm/redirect.p?account=4223432&seq=0&compno=1601231&userno=2&trackM=m:13_31%5Et:28_34&trackT=t:28_34&trackdt=01252021&reDirTo=https://infoforubd.com/magic/city/sf_rand_string_lowercase6////[email protected]
Resource
win10v2004-20230220-en
General
-
Target
http://www.thebluebook.com/wsnsa.dll/WService=wsbrk1/comm/redirect.p?account=4223432&seq=0&compno=1601231&userno=2&trackM=m:13_31%5Et:28_34&trackT=t:28_34&trackdt=01252021&reDirTo=https://infoforubd.com/magic/city/sf_rand_string_lowercase6////[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133302662492467453" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4384 chrome.exe 4384 chrome.exe 1448 chrome.exe 1448 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4384 chrome.exe 4384 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe Token: SeShutdownPrivilege 4384 chrome.exe Token: SeCreatePagefilePrivilege 4384 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4384 wrote to memory of 2028 4384 chrome.exe 84 PID 4384 wrote to memory of 2028 4384 chrome.exe 84 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 2476 4384 chrome.exe 85 PID 4384 wrote to memory of 1896 4384 chrome.exe 86 PID 4384 wrote to memory of 1896 4384 chrome.exe 86 PID 4384 wrote to memory of 4276 4384 chrome.exe 87 PID 4384 wrote to memory of 4276 4384 chrome.exe 87 PID 4384 wrote to memory of 4276 4384 chrome.exe 87 PID 4384 wrote to memory of 4276 4384 chrome.exe 87 PID 4384 wrote to memory of 4276 4384 chrome.exe 87 PID 4384 wrote to memory of 4276 4384 chrome.exe 87 PID 4384 wrote to memory of 4276 4384 chrome.exe 87 PID 4384 wrote to memory of 4276 4384 chrome.exe 87 PID 4384 wrote to memory of 4276 4384 chrome.exe 87 PID 4384 wrote to memory of 4276 4384 chrome.exe 87 PID 4384 wrote to memory of 4276 4384 chrome.exe 87 PID 4384 wrote to memory of 4276 4384 chrome.exe 87 PID 4384 wrote to memory of 4276 4384 chrome.exe 87 PID 4384 wrote to memory of 4276 4384 chrome.exe 87 PID 4384 wrote to memory of 4276 4384 chrome.exe 87 PID 4384 wrote to memory of 4276 4384 chrome.exe 87 PID 4384 wrote to memory of 4276 4384 chrome.exe 87 PID 4384 wrote to memory of 4276 4384 chrome.exe 87 PID 4384 wrote to memory of 4276 4384 chrome.exe 87 PID 4384 wrote to memory of 4276 4384 chrome.exe 87 PID 4384 wrote to memory of 4276 4384 chrome.exe 87 PID 4384 wrote to memory of 4276 4384 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://www.thebluebook.com/wsnsa.dll/WService=wsbrk1/comm/redirect.p?account=4223432&seq=0&compno=1601231&userno=2&trackM=m:13_31%5Et:28_34&trackT=t:28_34&trackdt=01252021&reDirTo=https://infoforubd.com/magic/city/sf_rand_string_lowercase6////[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd3f59758,0x7ffbd3f59768,0x7ffbd3f597782⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1812,i,14233676442140947395,6671932340351293492,131072 /prefetch:22⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,14233676442140947395,6671932340351293492,131072 /prefetch:82⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1812,i,14233676442140947395,6671932340351293492,131072 /prefetch:82⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3148 --field-trial-handle=1812,i,14233676442140947395,6671932340351293492,131072 /prefetch:12⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3164 --field-trial-handle=1812,i,14233676442140947395,6671932340351293492,131072 /prefetch:12⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 --field-trial-handle=1812,i,14233676442140947395,6671932340351293492,131072 /prefetch:82⤵PID:544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4904 --field-trial-handle=1812,i,14233676442140947395,6671932340351293492,131072 /prefetch:82⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2772 --field-trial-handle=1812,i,14233676442140947395,6671932340351293492,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1448
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2288
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD55eaf926aa4c9f3f7cfe336f6ca24b63a
SHA1fd7a489975b37db7585e240f6146cc3f04383f77
SHA2569316aee35833049d18f02561a5c26997c6b79693e59ef136393fc68b6c6c8856
SHA512e8fe9190b66f8b2d017355d20491a79ec289dc8fbf4ee14e4f95d8d726a89196841b6421e18f32359ad7efe1f70b992ce2ae4abe8d03b07ceae22ea3e4fbd9b5
-
Filesize
5KB
MD5958c6c6121cbcd5a6138ae55f8395dd7
SHA1bbe05703a23744dae34efc92bf49b2072cd1daf0
SHA2562e88c065defc65b33344cc1845aaebcbc525ef5ba48c56d153f233040b77795a
SHA512ea0fada968cf41e38f462c426d5af22888be7cc0de1e4ff64754ec7168696dcf7ebfb4366e50b00b1fe402932f53ef79084ea96ed1c3f9e011fc66ae7879442c
-
Filesize
5KB
MD5494f70980a0156a6701f44c924acd514
SHA1ad58b05aadac1f9479560103e8b70adc6a127296
SHA25686c6c7b9d67b9a891735b31a560c41ccaf1c277e685202eb82d02e63256d2059
SHA51274a0e6d040f0b765bb1263ea46bf987aa23a5c9c31cf3e95ca68090cf21c66ab638d9f499851639ed6f08bd23c0f5fc1f13c5c16f9c8484e8cbd46d22fb20059
-
Filesize
158KB
MD5ba3cf72e40a6ca8af276a97e9db0c125
SHA1a8d94b279dcd1c5dccc3146c4f23f7cf87d839fb
SHA25631fac924cbae23920637e294d1d49f61c57d6ce666537afb632efa627586be84
SHA512aec8c26a0d5c0596ed87edf54a071e385994a3270a36601a02730b2e0b5f670e9fc7825f56a9a93efe23f71bd2404164d16ed10f4114f34f93b144d98dcd4664
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd