Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2023 13:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://vesofefinegold.info
Resource
win10v2004-20230621-en
General
-
Target
https://vesofefinegold.info
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133323468769091798" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4840 chrome.exe 4840 chrome.exe 1512 chrome.exe 1512 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4840 chrome.exe 4840 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe Token: SeShutdownPrivilege 4840 chrome.exe Token: SeCreatePagefilePrivilege 4840 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4840 wrote to memory of 3304 4840 chrome.exe 82 PID 4840 wrote to memory of 3304 4840 chrome.exe 82 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 3816 4840 chrome.exe 83 PID 4840 wrote to memory of 432 4840 chrome.exe 84 PID 4840 wrote to memory of 432 4840 chrome.exe 84 PID 4840 wrote to memory of 3724 4840 chrome.exe 85 PID 4840 wrote to memory of 3724 4840 chrome.exe 85 PID 4840 wrote to memory of 3724 4840 chrome.exe 85 PID 4840 wrote to memory of 3724 4840 chrome.exe 85 PID 4840 wrote to memory of 3724 4840 chrome.exe 85 PID 4840 wrote to memory of 3724 4840 chrome.exe 85 PID 4840 wrote to memory of 3724 4840 chrome.exe 85 PID 4840 wrote to memory of 3724 4840 chrome.exe 85 PID 4840 wrote to memory of 3724 4840 chrome.exe 85 PID 4840 wrote to memory of 3724 4840 chrome.exe 85 PID 4840 wrote to memory of 3724 4840 chrome.exe 85 PID 4840 wrote to memory of 3724 4840 chrome.exe 85 PID 4840 wrote to memory of 3724 4840 chrome.exe 85 PID 4840 wrote to memory of 3724 4840 chrome.exe 85 PID 4840 wrote to memory of 3724 4840 chrome.exe 85 PID 4840 wrote to memory of 3724 4840 chrome.exe 85 PID 4840 wrote to memory of 3724 4840 chrome.exe 85 PID 4840 wrote to memory of 3724 4840 chrome.exe 85 PID 4840 wrote to memory of 3724 4840 chrome.exe 85 PID 4840 wrote to memory of 3724 4840 chrome.exe 85 PID 4840 wrote to memory of 3724 4840 chrome.exe 85 PID 4840 wrote to memory of 3724 4840 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://vesofefinegold.info1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe78979758,0x7ffe78979768,0x7ffe789797782⤵PID:3304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1812,i,2782666822238207146,11494151629236744733,131072 /prefetch:22⤵PID:3816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1812,i,2782666822238207146,11494151629236744733,131072 /prefetch:82⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1812,i,2782666822238207146,11494151629236744733,131072 /prefetch:82⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3188 --field-trial-handle=1812,i,2782666822238207146,11494151629236744733,131072 /prefetch:12⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3196 --field-trial-handle=1812,i,2782666822238207146,11494151629236744733,131072 /prefetch:12⤵PID:1136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4760 --field-trial-handle=1812,i,2782666822238207146,11494151629236744733,131072 /prefetch:82⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4852 --field-trial-handle=1812,i,2782666822238207146,11494151629236744733,131072 /prefetch:82⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4868 --field-trial-handle=1812,i,2782666822238207146,11494151629236744733,131072 /prefetch:82⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2472 --field-trial-handle=1812,i,2782666822238207146,11494151629236744733,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1512
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1964
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59c36cd0a12729a8dc4f65a122a50f621
SHA17a5131e75235eba0e9d764db7910a6f184224822
SHA2561ad5d0df1402359dbf8df3a0093d7bc411df3ae08ca6ab126aefffb5de365281
SHA512d8f0f720d96471d205681dbf62e9b84beab7cac137e90c86497635728e158e4fbf9e78bfb90129edc61857bd2344d2c4958162094b6ef21198d8fd4800b7f50b
-
Filesize
1KB
MD5301955793e27943fc9f10a42da1113ec
SHA11b175806e6e360aa5d08d48d4f3e4d51afbad3b2
SHA2565a61b2492a39ce5f16957b7db11eface9003d6d60dbcac716db0f5ec8f1f7420
SHA5121f0c81d9ff76418332159f752227ca86219048f2b42ade669f69b6ef40c1f60c8dcdd681080159f433b59799deb396d673e52b5a342cfc076c5ae8646c1940e5
-
Filesize
6KB
MD550d9b74a30280748a3f3632b9d7f6b63
SHA1f631acfb08cca240bc5345394c2bb4141c963381
SHA2563120f5e7b957abadd7465096e36d992d23581a6bb0c30202b87ddd24c6f94c5b
SHA51275659f8642668b83635e62e5b8c0e0d8c29ee8432ea20bab70a560fa821907dba52baef91206e9c086ceda6482da5a53c90f776f310ffd289c07b90947731f5c
-
Filesize
6KB
MD50fa5caf2f50c622dd3b34cd376a9972c
SHA1ea629f518681aa6db4e8847f8a190200a5608fdf
SHA256fc0d87bdf0600cacff40e4fb1eed3b3f7d34842dc0542f8f14f625237ebd4d00
SHA5124bad5074f1f2488fb875ac384f08359de322c647e52d2cba26cb1c679f7130e5457b08f7e2e89209c90d824bb3b46b95f29e9e8f4523c315018eb72b354f1a2d
-
Filesize
15KB
MD51fb72e36834ce2abc47f6e439ceede33
SHA139ea65fefb35c8160ff3edb54eed0c15ce27c08c
SHA2569b061d52e7c2ee628c088d7ff07d12d2a3214e39df38770c1b3fd6cc970edad8
SHA512e4d46fdd1db013fe85366d6aa0938f50e5fa769dd7263a7d1d08153375b215dd9da4a980c9aaa144691eac09e9f06a4a0988a7eb0b9bb29e8f719c4ef71f9605
-
Filesize
174KB
MD59da92d6de1d03c82af2afc7eafe919b4
SHA1273a3d078d688a926fd7a3a31c596b13ef2b1f41
SHA25617764e2509c53b05d77af60539872a10c85cbe2a85a81cb62f83df38768c9944
SHA512d1aa1949649f2709c698cd3c931615e1084c1593c86cb62d67ae2b75b85a82d2ce8e7c718af2c37b88dbdbd7e214d014f9208a952381709b33ce27db39412063
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd