Analysis
-
max time kernel
46s -
max time network
47s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08/06/2023, 17:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://tn-fyi.mckw.ru/c/AvsPAAAAAlgA9IAF/3KsjAw/t7ft5pC5YLIv9Kb6/?u=https%3A%2F%2Fwww.litres.ru%2F%3Futm_source%3Demail_manual%26utm_medium%3Deml_%26utm_campaign%3D05-06-2023_Omer2
Resource
win10v2004-20230220-en
General
-
Target
https://tn-fyi.mckw.ru/c/AvsPAAAAAlgA9IAF/3KsjAw/t7ft5pC5YLIv9Kb6/?u=https%3A%2F%2Fwww.litres.ru%2F%3Futm_source%3Demail_manual%26utm_medium%3Deml_%26utm_campaign%3D05-06-2023_Omer2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5032 chrome.exe 5032 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe Token: SeShutdownPrivilege 5032 chrome.exe Token: SeCreatePagefilePrivilege 5032 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe 5032 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5032 wrote to memory of 1152 5032 chrome.exe 84 PID 5032 wrote to memory of 1152 5032 chrome.exe 84 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 316 5032 chrome.exe 85 PID 5032 wrote to memory of 3880 5032 chrome.exe 86 PID 5032 wrote to memory of 3880 5032 chrome.exe 86 PID 5032 wrote to memory of 4748 5032 chrome.exe 87 PID 5032 wrote to memory of 4748 5032 chrome.exe 87 PID 5032 wrote to memory of 4748 5032 chrome.exe 87 PID 5032 wrote to memory of 4748 5032 chrome.exe 87 PID 5032 wrote to memory of 4748 5032 chrome.exe 87 PID 5032 wrote to memory of 4748 5032 chrome.exe 87 PID 5032 wrote to memory of 4748 5032 chrome.exe 87 PID 5032 wrote to memory of 4748 5032 chrome.exe 87 PID 5032 wrote to memory of 4748 5032 chrome.exe 87 PID 5032 wrote to memory of 4748 5032 chrome.exe 87 PID 5032 wrote to memory of 4748 5032 chrome.exe 87 PID 5032 wrote to memory of 4748 5032 chrome.exe 87 PID 5032 wrote to memory of 4748 5032 chrome.exe 87 PID 5032 wrote to memory of 4748 5032 chrome.exe 87 PID 5032 wrote to memory of 4748 5032 chrome.exe 87 PID 5032 wrote to memory of 4748 5032 chrome.exe 87 PID 5032 wrote to memory of 4748 5032 chrome.exe 87 PID 5032 wrote to memory of 4748 5032 chrome.exe 87 PID 5032 wrote to memory of 4748 5032 chrome.exe 87 PID 5032 wrote to memory of 4748 5032 chrome.exe 87 PID 5032 wrote to memory of 4748 5032 chrome.exe 87 PID 5032 wrote to memory of 4748 5032 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://tn-fyi.mckw.ru/c/AvsPAAAAAlgA9IAF/3KsjAw/t7ft5pC5YLIv9Kb6/?u=https%3A%2F%2Fwww.litres.ru%2F%3Futm_source%3Demail_manual%26utm_medium%3Deml_%26utm_campaign%3D05-06-2023_Omer21⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd44349758,0x7ffd44349768,0x7ffd443497782⤵PID:1152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 --field-trial-handle=1820,i,2069479791884903681,8076961050066866528,131072 /prefetch:22⤵PID:316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1820,i,2069479791884903681,8076961050066866528,131072 /prefetch:82⤵PID:3880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2176 --field-trial-handle=1820,i,2069479791884903681,8076961050066866528,131072 /prefetch:82⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3208 --field-trial-handle=1820,i,2069479791884903681,8076961050066866528,131072 /prefetch:12⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3232 --field-trial-handle=1820,i,2069479791884903681,8076961050066866528,131072 /prefetch:12⤵PID:3224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4524 --field-trial-handle=1820,i,2069479791884903681,8076961050066866528,131072 /prefetch:12⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5388 --field-trial-handle=1820,i,2069479791884903681,8076961050066866528,131072 /prefetch:12⤵PID:1788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5412 --field-trial-handle=1820,i,2069479791884903681,8076961050066866528,131072 /prefetch:12⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5840 --field-trial-handle=1820,i,2069479791884903681,8076961050066866528,131072 /prefetch:82⤵PID:3392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5828 --field-trial-handle=1820,i,2069479791884903681,8076961050066866528,131072 /prefetch:82⤵PID:880
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4460
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5b5fcc55cffd66f38d548e8b63206c5e6
SHA179db08ababfa33a4f644fa8fe337195b5aba44c7
SHA2567730df1165195dd5bb6b40d6e519b4ce07aceb03601a77bca6535d31698d4ca1
SHA512aaa17175e90dbca04f0fa753084731313e70119fef7d408b41ff4170116ab24eaee0bd05dca2cc43464b1ee920819e5ce6f6e750d97e3c4fc605f01e7ff9c649
-
Filesize
600B
MD5c782c6aa90a78307dfafb36c68411a1f
SHA170a1e361168b7dabe555b8db718953d2b0e4b628
SHA25604d3d31dc0dcc3924230360d79a54c1cd6250d674f04559ba2215d9873e0b627
SHA5127d4c333bbf0f018645498ab5119e712e033f8d6622b4e95fe17f7dc68cb1f86db24de5a1db8b343dc3fc78eba595cffa65f3651525f21cee0ca890e89dcaaac7
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
3KB
MD5ca018270b42af080334f49bec0ba13da
SHA15fe40d3999257b05c13f63186f8b4cb250a3572b
SHA256a4b74450ba1d209dc97e8e4340005db6584f147f632fc372029d8b194555242e
SHA5121760fa70522ad249d312d02427d69b02ceb60e3103b18dadb1dfe07f20d40c068226399c942eec0466045239c87ae387e6f66033b6c0e7e2a5b97f487a8ddec0
-
Filesize
3KB
MD5cf7e366d7b51db1ffcb8d6a0c88f9485
SHA1461ee6aba68180e452f95e8eacc57c1119f67890
SHA256279eb6af5939981dcae893471292f29e2a72d73cf7d1f4f26de0a142826b62bb
SHA512062ebedb0f9d663d46b4f8487ccd76fff3f1b0ed8fe8cbb8bd018fc377ca26701a0473c2c168d298c1b808c16667bfae2f42f397ea4167c755aea30b10674223
-
Filesize
3KB
MD56a027e805a1aed91a084a819cc35da88
SHA10832d295ec1f2eead637a3f52cb0a4f4883d9252
SHA2563222bad6b06ed68c3d426d7489c75c611c566ab3ec072e85b5894501f0482dc0
SHA5125f2df5ed039daac30a7ce1f1d5ebddcf5b25f843e1b8133e2bdcae7a8f98e4fcbb3f07fa7a2a3b0397d5f0bae4a86096fcf59963a8ce6a04aa8b96a4dc28cb97
-
Filesize
6KB
MD5ba585911d3832a0d30da75b91cc231ed
SHA1a74101e7fc5b8df2c46a00504b329b858c3dce0f
SHA256231f784f34cf0f33350eef8522f25dee90f137afc5677305af141f92d909b8dd
SHA512d88f848c65f9ced04e3be64691e0f6429414e325b848491d848af526f3726f024c5a5defc88bbf1602ba01496f52b66e008027dd7cb6e2f285d3c49e5c985d63
-
Filesize
6KB
MD553027bac16da2b374d724858c1ab9f2f
SHA12bff4388e1abf59b2887f0bec611c8a18603acb4
SHA256e76fd5f1c4157cbb1faf140c0c7c89f4474a5bebcd2b82a75419401b16f288b2
SHA5126563f64bc2e1238b5dad1f74537ae0d1763c63b4db3f847cc57e05b51ce72b8d6e7baf4fd52737cbb2b2ad574820f71aec6c948c513e6a7f83c39f52f7de1120
-
Filesize
15KB
MD5163313bb8fc3f0679005f0a0926da75f
SHA14dd986d1c6ed83a6b46f0fe29ec7bf27d7b86f80
SHA256e50837d52b861c95f7f0c38ea410bf0f330b6353d152f64d7306b4e28f1c8ef4
SHA512192a25d48d2bd98ec0df92eb90cdff1b244697f07e1726656186046c89b76b545a1a8cfddd51b5fb68193b7905574c9c73d962e2cb2d997a13bfb5c5d232beac
-
Filesize
159KB
MD57e86adff3d57612b9f4160e679cb3670
SHA12d2a112fd7ca91620188054a18440488b28ac4df
SHA256d623907fefbc3fe4a3fcd221698cce9c07e7084eb116d4f340d083f024832185
SHA51257ce3bfbc641b4526821d6d3e5e71e50076e9538d60ca6c181b62b04c9ffa79d3c2f9a219381c82c23867886f67cb402c259a2441d2ce6e8e97c1e2ebca6fbb1
-
Filesize
72KB
MD58782bf1ed14eb3d354b8d253da3b4708
SHA108ff0bdeb8dcee7148c38937f519ba7d6c02aeee
SHA25653fe476efc26ca2bf17758cdd4f9f16a2de70de87d916e4fe4179fdef9b96986
SHA512e2ff3d15b90aa9685eb16ee292a55bd04f4bfef93d75b73da81a77c06ee10ace5f6f47a1391f94ae827bc77e9ed761523ff156b9a9c5ea6ed7f17dd121aabc74