Analysis
-
max time kernel
11s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2023, 15:10
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://JD2K3MBUMS.safecheck.digital/9E05284BFK/[email protected]/Q0P8541SHP
Resource
win10v2004-20230703-en
General
-
Target
https://JD2K3MBUMS.safecheck.digital/9E05284BFK/[email protected]/Q0P8541SHP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3796 chrome.exe 3796 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe Token: SeShutdownPrivilege 3796 chrome.exe Token: SeCreatePagefilePrivilege 3796 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe 3796 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3796 wrote to memory of 2576 3796 chrome.exe 81 PID 3796 wrote to memory of 2576 3796 chrome.exe 81 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1268 3796 chrome.exe 83 PID 3796 wrote to memory of 1992 3796 chrome.exe 84 PID 3796 wrote to memory of 1992 3796 chrome.exe 84 PID 3796 wrote to memory of 3424 3796 chrome.exe 85 PID 3796 wrote to memory of 3424 3796 chrome.exe 85 PID 3796 wrote to memory of 3424 3796 chrome.exe 85 PID 3796 wrote to memory of 3424 3796 chrome.exe 85 PID 3796 wrote to memory of 3424 3796 chrome.exe 85 PID 3796 wrote to memory of 3424 3796 chrome.exe 85 PID 3796 wrote to memory of 3424 3796 chrome.exe 85 PID 3796 wrote to memory of 3424 3796 chrome.exe 85 PID 3796 wrote to memory of 3424 3796 chrome.exe 85 PID 3796 wrote to memory of 3424 3796 chrome.exe 85 PID 3796 wrote to memory of 3424 3796 chrome.exe 85 PID 3796 wrote to memory of 3424 3796 chrome.exe 85 PID 3796 wrote to memory of 3424 3796 chrome.exe 85 PID 3796 wrote to memory of 3424 3796 chrome.exe 85 PID 3796 wrote to memory of 3424 3796 chrome.exe 85 PID 3796 wrote to memory of 3424 3796 chrome.exe 85 PID 3796 wrote to memory of 3424 3796 chrome.exe 85 PID 3796 wrote to memory of 3424 3796 chrome.exe 85 PID 3796 wrote to memory of 3424 3796 chrome.exe 85 PID 3796 wrote to memory of 3424 3796 chrome.exe 85 PID 3796 wrote to memory of 3424 3796 chrome.exe 85 PID 3796 wrote to memory of 3424 3796 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://JD2K3MBUMS.safecheck.digital/9E05284BFK/[email protected]/Q0P8541SHP1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffc05479758,0x7ffc05479768,0x7ffc054797782⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1852,i,7185382329169890229,9895841227474698764,131072 /prefetch:22⤵PID:1268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1852,i,7185382329169890229,9895841227474698764,131072 /prefetch:82⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2268 --field-trial-handle=1852,i,7185382329169890229,9895841227474698764,131072 /prefetch:82⤵PID:3424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3124 --field-trial-handle=1852,i,7185382329169890229,9895841227474698764,131072 /prefetch:12⤵PID:764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3096 --field-trial-handle=1852,i,7185382329169890229,9895841227474698764,131072 /prefetch:12⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4708 --field-trial-handle=1852,i,7185382329169890229,9895841227474698764,131072 /prefetch:12⤵PID:1544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3308 --field-trial-handle=1852,i,7185382329169890229,9895841227474698764,131072 /prefetch:12⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 --field-trial-handle=1852,i,7185382329169890229,9895841227474698764,131072 /prefetch:82⤵PID:1112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5620 --field-trial-handle=1852,i,7185382329169890229,9895841227474698764,131072 /prefetch:82⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2112
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5907d469911abd260c6f7802709fdaa13
SHA10fea2916b76373fb92199dde263d9afd235f4f51
SHA2567c010360a6444afef494c2bed6b3630c0b2b64159082615a97232e8b6618cf26
SHA512010b2b3de99e650c3f631f715defa01f2bc6ac88b766733c5f0c1ef38404abc2fe4d9b672094724d0928dcafd79c5cb1675c76338448a8326d4e85c69adfbbeb
-
Filesize
173KB
MD586692065fb6b758332857a4a03d0ece4
SHA1daf75d5a7fdbc8065d3a28dfca1095398780e4f7
SHA256d8ec3e42062263894d6f08926e283b3a26efe9d56f883f1e8be7202572dd45fb
SHA51216ea6a97386a40835da4847ab8023e042cd034924aa5a4cdbf1a6b5e1c9fb04538947d551d7f4c8658bd7c425ec2c70480ff328431431cb0646bc9413d531bbd
-
Filesize
88KB
MD55f464e038f6da52a940d9835465febb0
SHA1649aef8fffa36a81a23a6d9284b64a2716739ec8
SHA2562ee14d4f439714422fd697180b2abff3a5e501e52265d36b65d3b7a112a4702f
SHA512f18bf6aa3235f309ea292bd20bda21f3ccdbf8cb8fa813e60c41fb8a5b18bce34a2a005a86cf5f15b097ef578cc431d56c84ad4e15a9c67f6b79db9688c38124
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd