Analysis
-
max time kernel
88s -
max time network
88s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2023 14:10
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.reviewsonline.top/Slesinger-relevantly/cf65u2q395j8L6N10il13z2P5by20lHsvbx_xDiDvbfxbEGsi9adTnnmoFe5g1xG08Q@O1WcYd
Resource
win10v2004-20230220-en
General
-
Target
http://www.reviewsonline.top/Slesinger-relevantly/cf65u2q395j8L6N10il13z2P5by20lHsvbx_xDiDvbfxbEGsi9adTnnmoFe5g1xG08Q@O1WcYd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133309662341991225" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2084 chrome.exe 2084 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe Token: SeShutdownPrivilege 2084 chrome.exe Token: SeCreatePagefilePrivilege 2084 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe 2084 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2084 wrote to memory of 180 2084 chrome.exe 83 PID 2084 wrote to memory of 180 2084 chrome.exe 83 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 4000 2084 chrome.exe 84 PID 2084 wrote to memory of 3316 2084 chrome.exe 85 PID 2084 wrote to memory of 3316 2084 chrome.exe 85 PID 2084 wrote to memory of 4172 2084 chrome.exe 86 PID 2084 wrote to memory of 4172 2084 chrome.exe 86 PID 2084 wrote to memory of 4172 2084 chrome.exe 86 PID 2084 wrote to memory of 4172 2084 chrome.exe 86 PID 2084 wrote to memory of 4172 2084 chrome.exe 86 PID 2084 wrote to memory of 4172 2084 chrome.exe 86 PID 2084 wrote to memory of 4172 2084 chrome.exe 86 PID 2084 wrote to memory of 4172 2084 chrome.exe 86 PID 2084 wrote to memory of 4172 2084 chrome.exe 86 PID 2084 wrote to memory of 4172 2084 chrome.exe 86 PID 2084 wrote to memory of 4172 2084 chrome.exe 86 PID 2084 wrote to memory of 4172 2084 chrome.exe 86 PID 2084 wrote to memory of 4172 2084 chrome.exe 86 PID 2084 wrote to memory of 4172 2084 chrome.exe 86 PID 2084 wrote to memory of 4172 2084 chrome.exe 86 PID 2084 wrote to memory of 4172 2084 chrome.exe 86 PID 2084 wrote to memory of 4172 2084 chrome.exe 86 PID 2084 wrote to memory of 4172 2084 chrome.exe 86 PID 2084 wrote to memory of 4172 2084 chrome.exe 86 PID 2084 wrote to memory of 4172 2084 chrome.exe 86 PID 2084 wrote to memory of 4172 2084 chrome.exe 86 PID 2084 wrote to memory of 4172 2084 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://www.reviewsonline.top/Slesinger-relevantly/cf65u2q395j8L6N10il13z2P5by20lHsvbx_xDiDvbfxbEGsi9adTnnmoFe5g1xG08Q@O1WcYd1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff92b009758,0x7ff92b009768,0x7ff92b0097782⤵PID:180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1836,i,7796071765249898928,12489302565338351564,131072 /prefetch:22⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1836,i,7796071765249898928,12489302565338351564,131072 /prefetch:82⤵PID:3316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2156 --field-trial-handle=1836,i,7796071765249898928,12489302565338351564,131072 /prefetch:82⤵PID:4172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2968 --field-trial-handle=1836,i,7796071765249898928,12489302565338351564,131072 /prefetch:12⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2988 --field-trial-handle=1836,i,7796071765249898928,12489302565338351564,131072 /prefetch:12⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4444 --field-trial-handle=1836,i,7796071765249898928,12489302565338351564,131072 /prefetch:12⤵PID:3116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 --field-trial-handle=1836,i,7796071765249898928,12489302565338351564,131072 /prefetch:82⤵PID:2748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 --field-trial-handle=1836,i,7796071765249898928,12489302565338351564,131072 /prefetch:82⤵PID:3888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=956 --field-trial-handle=1836,i,7796071765249898928,12489302565338351564,131072 /prefetch:12⤵PID:3496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5132 --field-trial-handle=1836,i,7796071765249898928,12489302565338351564,131072 /prefetch:12⤵PID:3860
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3228
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\0dd58012-1833-47d6-8acb-f1a2619d0a1e.tmp
Filesize4KB
MD54c87db4661baffce0883403dc919b887
SHA1c38f20547f0ea14928497d702954b23bacd1741c
SHA2565a4c26741dd84091752f999f784303055ccfd3584ff68ced49729df4a37fd080
SHA512011616a0cbb9225f3db8eecbaca47b9b07bd4fddd1e9e87d132653e09e8f107d291f76b0298d1b7a710e515882a0d965261ef71580f2e69cfd63586461479aff
-
Filesize
120B
MD5e8c3ae712b07d58bf9b00f202f751355
SHA1b208199195a32a14487b79e9ea75fc1ed1bbc72b
SHA256a6469420afcbdf6923c7878450bf6d204afa0199a97733ffc0eb922616b57828
SHA51254286b1339baa103b8bbc8974d082821fbb5005be6d501127242c489d282848026c069da9c21fb2adfd102883ae8608aa36e34dadea893a2cbb5d3d96dcfee18
-
Filesize
1KB
MD547a9d9db3b2a4a6965216aa78504810e
SHA1f8002d50d38b38f51bbb0d7b39e6017a17505046
SHA2562a9015f26b576425b96866b77976c16953a5ab88f50a9aa1bb5e14f86907dd01
SHA51277be89d39458f4d21929766f618fc880d0898abb76f1b00601d033a17c44358e2e32272e8ece3f91e311803d48c3d972cc1036953bdfaf9e707e894b29cd7f21
-
Filesize
5KB
MD559f25b76e6670e9dea1c9bd67b4214f2
SHA185a17db5883330092579995de76734d99defd764
SHA2569d2e4437330d1ed0ecd99feee70698bcc71ffa0df260725e61a4e20c6265385c
SHA5125461e187d7f4bb58140a47e45766c37771dc7046733f3020a6fd1723b6c56cf865c9d137831dc947577fdec813eb9df2ef4398a311075eb478a7c5050aee5b16
-
Filesize
4KB
MD5c4b32d4d019b80104ec06f2548254241
SHA18c3f47ab35edf8abf1f4fba8d17b61fbf5afe2e1
SHA256a5d37237425b6afbcae9f84a76e6bc4ac3b82b0313241ffba199e05a78a53c6c
SHA5127ac630aa22643dfce27a4b9fad50e4ad63b624a3e61f0766c28629ace91ad81c1c9ce45178af6a51bd15b256ead895b31a90f6f933252b426dacf925801b426f
-
Filesize
158KB
MD54e3f5bde5ac22e3eb6f053d184c8506b
SHA1f63e4619767f60eff678f7d4a5bf1c185eea56f4
SHA256c7bc4e2d3cdce1fd1783dda665f65deccd315440d26955b87b07fb3a2601ae3e
SHA5122a392d334459e911e781ca590ff83cbb6d38d99f075cfa0fc4e926e3429bdcfd7a6e967212e6bd855459efceaa46f4e4ea3d8343ebebdeac206c94b8f619e489