Analysis
-
max time kernel
20s -
max time network
23s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30/06/2023, 13:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://registration.experientevent.com/ShowAFP232/Flow/EXH#!/registrant//ExhibitingCompanySearch/
Resource
win10v2004-20230621-en
General
-
Target
https://registration.experientevent.com/ShowAFP232/Flow/EXH#!/registrant//ExhibitingCompanySearch/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133326062886027119" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3904 chrome.exe 3904 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeShutdownPrivilege 3904 chrome.exe Token: SeCreatePagefilePrivilege 3904 chrome.exe Token: SeShutdownPrivilege 3904 chrome.exe Token: SeCreatePagefilePrivilege 3904 chrome.exe Token: SeShutdownPrivilege 3904 chrome.exe Token: SeCreatePagefilePrivilege 3904 chrome.exe Token: SeShutdownPrivilege 3904 chrome.exe Token: SeCreatePagefilePrivilege 3904 chrome.exe Token: SeShutdownPrivilege 3904 chrome.exe Token: SeCreatePagefilePrivilege 3904 chrome.exe Token: SeShutdownPrivilege 3904 chrome.exe Token: SeCreatePagefilePrivilege 3904 chrome.exe Token: SeShutdownPrivilege 3904 chrome.exe Token: SeCreatePagefilePrivilege 3904 chrome.exe Token: SeShutdownPrivilege 3904 chrome.exe Token: SeCreatePagefilePrivilege 3904 chrome.exe Token: SeShutdownPrivilege 3904 chrome.exe Token: SeCreatePagefilePrivilege 3904 chrome.exe Token: SeShutdownPrivilege 3904 chrome.exe Token: SeCreatePagefilePrivilege 3904 chrome.exe Token: SeShutdownPrivilege 3904 chrome.exe Token: SeCreatePagefilePrivilege 3904 chrome.exe Token: SeShutdownPrivilege 3904 chrome.exe Token: SeCreatePagefilePrivilege 3904 chrome.exe Token: SeShutdownPrivilege 3904 chrome.exe Token: SeCreatePagefilePrivilege 3904 chrome.exe Token: SeShutdownPrivilege 3904 chrome.exe Token: SeCreatePagefilePrivilege 3904 chrome.exe Token: SeShutdownPrivilege 3904 chrome.exe Token: SeCreatePagefilePrivilege 3904 chrome.exe Token: SeShutdownPrivilege 3904 chrome.exe Token: SeCreatePagefilePrivilege 3904 chrome.exe Token: SeShutdownPrivilege 3904 chrome.exe Token: SeCreatePagefilePrivilege 3904 chrome.exe Token: SeShutdownPrivilege 3904 chrome.exe Token: SeCreatePagefilePrivilege 3904 chrome.exe Token: SeShutdownPrivilege 3904 chrome.exe Token: SeCreatePagefilePrivilege 3904 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe 3904 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3904 wrote to memory of 3784 3904 chrome.exe 86 PID 3904 wrote to memory of 3784 3904 chrome.exe 86 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4036 3904 chrome.exe 87 PID 3904 wrote to memory of 4920 3904 chrome.exe 88 PID 3904 wrote to memory of 4920 3904 chrome.exe 88 PID 3904 wrote to memory of 3816 3904 chrome.exe 89 PID 3904 wrote to memory of 3816 3904 chrome.exe 89 PID 3904 wrote to memory of 3816 3904 chrome.exe 89 PID 3904 wrote to memory of 3816 3904 chrome.exe 89 PID 3904 wrote to memory of 3816 3904 chrome.exe 89 PID 3904 wrote to memory of 3816 3904 chrome.exe 89 PID 3904 wrote to memory of 3816 3904 chrome.exe 89 PID 3904 wrote to memory of 3816 3904 chrome.exe 89 PID 3904 wrote to memory of 3816 3904 chrome.exe 89 PID 3904 wrote to memory of 3816 3904 chrome.exe 89 PID 3904 wrote to memory of 3816 3904 chrome.exe 89 PID 3904 wrote to memory of 3816 3904 chrome.exe 89 PID 3904 wrote to memory of 3816 3904 chrome.exe 89 PID 3904 wrote to memory of 3816 3904 chrome.exe 89 PID 3904 wrote to memory of 3816 3904 chrome.exe 89 PID 3904 wrote to memory of 3816 3904 chrome.exe 89 PID 3904 wrote to memory of 3816 3904 chrome.exe 89 PID 3904 wrote to memory of 3816 3904 chrome.exe 89 PID 3904 wrote to memory of 3816 3904 chrome.exe 89 PID 3904 wrote to memory of 3816 3904 chrome.exe 89 PID 3904 wrote to memory of 3816 3904 chrome.exe 89 PID 3904 wrote to memory of 3816 3904 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://registration.experientevent.com/ShowAFP232/Flow/EXH#!/registrant//ExhibitingCompanySearch/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc82589758,0x7ffc82589768,0x7ffc825897782⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1820,i,5604218736755535766,1699497409586482706,131072 /prefetch:22⤵PID:4036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1820,i,5604218736755535766,1699497409586482706,131072 /prefetch:82⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2164 --field-trial-handle=1820,i,5604218736755535766,1699497409586482706,131072 /prefetch:82⤵PID:3816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3216 --field-trial-handle=1820,i,5604218736755535766,1699497409586482706,131072 /prefetch:12⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3204 --field-trial-handle=1820,i,5604218736755535766,1699497409586482706,131072 /prefetch:12⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4576 --field-trial-handle=1820,i,5604218736755535766,1699497409586482706,131072 /prefetch:12⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5488 --field-trial-handle=1820,i,5604218736755535766,1699497409586482706,131072 /prefetch:82⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5564 --field-trial-handle=1820,i,5604218736755535766,1699497409586482706,131072 /prefetch:82⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 --field-trial-handle=1820,i,5604218736755535766,1699497409586482706,131072 /prefetch:82⤵PID:2524
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4104
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5433f3e9d6486a36f8f9be75a9809a9d4
SHA10c6b6ce1103031d168c0827a06cedba3029db0e7
SHA2565dccb3b90d17a1dea85342171e9b90df4db7084f1ad200a301be3d1c5a6a95ae
SHA51275d00b8b6e9c047987d205fe54e7f2e05a4107b7acf7e8cb2166f96137552669024accd3832b5daa2bf6dd1584253c2f6057ac281748d4e51d04793870704655
-
Filesize
6KB
MD502b34ff478f07398a8ab4385e5ccad24
SHA113db65e9abc4f73de0b8360d5dc7602221df50b5
SHA256b8e934416dbe418366b0f437449c971c80dd04f502c50c6a7eeb493e9149aba0
SHA5124107a65903a0dc887adde722ccbe18c99b3a5e25501c4ee3ffb0cc86a73967e8965357f2cc1cbb38e153c63c366223ba155c5d087df5a34e5f54d8845723e5db
-
Filesize
15KB
MD55acfce471a38c3d45f07e7e4f76e60a2
SHA1e89733782d42adef4db0da5e5050145414880bd2
SHA2566d8ecbbc2557d53fcc2b66240615db92f10a44746fa7164beb22775be070b180
SHA512abc38c2cb817ae624d27279453a907d98fb7550d42a65f8759d1464623f5f3b7d42c4cead6d886bd6a09425a6211a6d8b2bf618900a601a3a478ffc90e1454d5
-
Filesize
172KB
MD548920670727819180176eceb847ba0d2
SHA1cbf035339e08fafc91aa5c64248da69ed539bf03
SHA2563dea1cb9503a4dc9d941f74f361cc895891900f5e8a1555e53c05bb43e0e754a
SHA5129f0ee86d05e4b5b2c277c4fe136c483529fe8326ae5f730ec03aa2d276d3cc156968e672560fc14a47408d26fe49c11dfaa54692e31f344643c6ea9a477ecde9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd