Analysis
-
max time kernel
1800s -
max time network
1690s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2023 13:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://database.emfasandbox.com
Resource
win10v2004-20230220-en
General
-
Target
http://database.emfasandbox.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133308776992231431" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2156 chrome.exe 2156 chrome.exe 1960 chrome.exe 1960 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1440 2156 chrome.exe 90 PID 2156 wrote to memory of 1440 2156 chrome.exe 90 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 4592 2156 chrome.exe 92 PID 2156 wrote to memory of 1516 2156 chrome.exe 93 PID 2156 wrote to memory of 1516 2156 chrome.exe 93 PID 2156 wrote to memory of 1320 2156 chrome.exe 94 PID 2156 wrote to memory of 1320 2156 chrome.exe 94 PID 2156 wrote to memory of 1320 2156 chrome.exe 94 PID 2156 wrote to memory of 1320 2156 chrome.exe 94 PID 2156 wrote to memory of 1320 2156 chrome.exe 94 PID 2156 wrote to memory of 1320 2156 chrome.exe 94 PID 2156 wrote to memory of 1320 2156 chrome.exe 94 PID 2156 wrote to memory of 1320 2156 chrome.exe 94 PID 2156 wrote to memory of 1320 2156 chrome.exe 94 PID 2156 wrote to memory of 1320 2156 chrome.exe 94 PID 2156 wrote to memory of 1320 2156 chrome.exe 94 PID 2156 wrote to memory of 1320 2156 chrome.exe 94 PID 2156 wrote to memory of 1320 2156 chrome.exe 94 PID 2156 wrote to memory of 1320 2156 chrome.exe 94 PID 2156 wrote to memory of 1320 2156 chrome.exe 94 PID 2156 wrote to memory of 1320 2156 chrome.exe 94 PID 2156 wrote to memory of 1320 2156 chrome.exe 94 PID 2156 wrote to memory of 1320 2156 chrome.exe 94 PID 2156 wrote to memory of 1320 2156 chrome.exe 94 PID 2156 wrote to memory of 1320 2156 chrome.exe 94 PID 2156 wrote to memory of 1320 2156 chrome.exe 94 PID 2156 wrote to memory of 1320 2156 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://database.emfasandbox.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffddc539758,0x7ffddc539768,0x7ffddc5397782⤵PID:1440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1776,i,6045321943749329654,14405891181707797129,131072 /prefetch:22⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1776,i,6045321943749329654,14405891181707797129,131072 /prefetch:82⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1776,i,6045321943749329654,14405891181707797129,131072 /prefetch:82⤵PID:1320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3092 --field-trial-handle=1776,i,6045321943749329654,14405891181707797129,131072 /prefetch:12⤵PID:3188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3100 --field-trial-handle=1776,i,6045321943749329654,14405891181707797129,131072 /prefetch:12⤵PID:3480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3868 --field-trial-handle=1776,i,6045321943749329654,14405891181707797129,131072 /prefetch:12⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 --field-trial-handle=1776,i,6045321943749329654,14405891181707797129,131072 /prefetch:82⤵PID:3080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=1776,i,6045321943749329654,14405891181707797129,131072 /prefetch:82⤵PID:1244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4420 --field-trial-handle=1776,i,6045321943749329654,14405891181707797129,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4424
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5ddb6a648aee7319c377a3b44f21b36a9
SHA11d728aa86a40a05254c4e36233349ec8cf3ce9d6
SHA256ea8861e0395ec8a2bc932cfbd45957ddcb5c90c0129796cfbf1bf3d38f45b91d
SHA512cb0d4deedc6230012b4ba9cc134911c26d50b16a13f672c747a70e2dbc0607fe2d7ecf5cd97e53397d01ed77fd0cdce0ef243589740a09aaccf64ddf76da100b
-
Filesize
288B
MD502930b85a2e8cd97cd0594f9d31a9118
SHA173de8e1c0f4f4df7e0a48f474c52317ce5a66159
SHA256f8738e80e5693677a6e2ebb4743a2d0a207e9ba8b84f56c5226284be212f3b79
SHA512097b683413114db3c7d5ed66ddb4c25a2626b7e57108362ecce8a7bb2b52bbbd1d9aca4225e168cfa256079874410a0388dabdd8486db69b63504a26c41c3666
-
Filesize
2KB
MD5032a60868f9234e6c8f5c4db174980f7
SHA18c440b6ad45d98257488057ee70e0f582939373a
SHA25660bdd3f2b7b2dd5051661df59018b566ecb78ae236d830d43d376f5356c83589
SHA512e7c1ac9eee81220139c51ae52bd52f99abda45b6f122b9783947a703f2c56fdbb50c9bd56fa17c1b8f401b5a65a483b379a213a65da7a29cdda74e8fe424190c
-
Filesize
1KB
MD5e074b359fd5fd1273df91880c9738f4d
SHA1a3c2273bb7a03892edde1b4d757df06bfaeccee4
SHA2569f60819949829bd5f65135a588d92394ee1835702e2c71f851939aa3ba9ba493
SHA512ce6f7698d17217dd24b2f2d8cec233e84780de736bc964ce99a5f3fcafd8f675fb44bfd2742c4da7cee897f81974e78e1c7e0c81c3d89da1eebf1a0b958fb83d
-
Filesize
5KB
MD50e711654c03e0487edd178d2f749e5e4
SHA1cb1fa42f8fd8c2b90d3a3689003da43a4c7db9bd
SHA2568ca28130ecf2ba71ec973ae8b059e0d72dc87e33da66f4edc5fb5e7703f0f587
SHA512ace420caf72b7fa5b50ad55df00f1b45d95797435f36e603dc37e1ebce649d84eb6ec8efb82570eb32afd0f90aba7177d0b2e9650286493d4b5464c83542537f
-
Filesize
6KB
MD5321571551ba781cdaf19f30a83c024da
SHA15bfee16b570d9663bcbd76294235b72ad39e06b9
SHA256b8d57dc18542b846396ff33b40d3883c43c9df9a3cc8d7a44ddd9b45423f682f
SHA512f23f895b636960b2aed6b110d999d286623419b1a8bcb38c7814a81fb99a3ddbd14c10d900ada67cc3f62c6ee4fb64bbf21c888dc6d0468ed511e0db1df628fc
-
Filesize
158KB
MD5ebc6d8f3924f5bb682a5ab3bc1a98e90
SHA19dfccb2ad23b72435d072aca35be3e7ed2b3e363
SHA2565f4127830de365e338ba49a5ef5248aabc70197fa7eb984d58650372bbe9344b
SHA51207a65067a92ecdb9b7f797a5a884cfd3e74c1d95c9dd36a7ac7f3c025578d26c026c27500e8d2696b3005c0086cb653841f4c9adb5cff94246ea1bf8d719c14d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd