Analysis
-
max time kernel
60s -
max time network
62s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2023, 15:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.foreigncurrencyandcoin.com/
Resource
win10v2004-20230703-en
General
-
Target
https://www.foreigncurrencyandcoin.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4292 chrome.exe 4292 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4292 wrote to memory of 564 4292 chrome.exe 80 PID 4292 wrote to memory of 564 4292 chrome.exe 80 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 4648 4292 chrome.exe 82 PID 4292 wrote to memory of 1124 4292 chrome.exe 83 PID 4292 wrote to memory of 1124 4292 chrome.exe 83 PID 4292 wrote to memory of 3808 4292 chrome.exe 84 PID 4292 wrote to memory of 3808 4292 chrome.exe 84 PID 4292 wrote to memory of 3808 4292 chrome.exe 84 PID 4292 wrote to memory of 3808 4292 chrome.exe 84 PID 4292 wrote to memory of 3808 4292 chrome.exe 84 PID 4292 wrote to memory of 3808 4292 chrome.exe 84 PID 4292 wrote to memory of 3808 4292 chrome.exe 84 PID 4292 wrote to memory of 3808 4292 chrome.exe 84 PID 4292 wrote to memory of 3808 4292 chrome.exe 84 PID 4292 wrote to memory of 3808 4292 chrome.exe 84 PID 4292 wrote to memory of 3808 4292 chrome.exe 84 PID 4292 wrote to memory of 3808 4292 chrome.exe 84 PID 4292 wrote to memory of 3808 4292 chrome.exe 84 PID 4292 wrote to memory of 3808 4292 chrome.exe 84 PID 4292 wrote to memory of 3808 4292 chrome.exe 84 PID 4292 wrote to memory of 3808 4292 chrome.exe 84 PID 4292 wrote to memory of 3808 4292 chrome.exe 84 PID 4292 wrote to memory of 3808 4292 chrome.exe 84 PID 4292 wrote to memory of 3808 4292 chrome.exe 84 PID 4292 wrote to memory of 3808 4292 chrome.exe 84 PID 4292 wrote to memory of 3808 4292 chrome.exe 84 PID 4292 wrote to memory of 3808 4292 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://www.foreigncurrencyandcoin.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9119d9758,0x7ff9119d9768,0x7ff9119d97782⤵PID:564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=1904,i,9620669637098555164,17588005527405703521,131072 /prefetch:22⤵PID:4648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1904,i,9620669637098555164,17588005527405703521,131072 /prefetch:82⤵PID:1124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1904,i,9620669637098555164,17588005527405703521,131072 /prefetch:82⤵PID:3808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3112 --field-trial-handle=1904,i,9620669637098555164,17588005527405703521,131072 /prefetch:12⤵PID:2836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3096 --field-trial-handle=1904,i,9620669637098555164,17588005527405703521,131072 /prefetch:12⤵PID:64
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 --field-trial-handle=1904,i,9620669637098555164,17588005527405703521,131072 /prefetch:82⤵PID:524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 --field-trial-handle=1904,i,9620669637098555164,17588005527405703521,131072 /prefetch:82⤵PID:3464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4992 --field-trial-handle=1904,i,9620669637098555164,17588005527405703521,131072 /prefetch:12⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3120 --field-trial-handle=1904,i,9620669637098555164,17588005527405703521,131072 /prefetch:12⤵PID:3772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4980 --field-trial-handle=1904,i,9620669637098555164,17588005527405703521,131072 /prefetch:12⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3100
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD583fb60fb58477531b06279fac3dc28c2
SHA12387d23d6081c8df64df536b045869458f7d365c
SHA25614c28588e13ee1073f9383777ea416da1d9a753cfe8d85a75e56fcfc8065262d
SHA512713946fd40b969ddede16e5c3b99ebd7bd16c6a1143e3cb5049398eed0b3c1f884633ee13c32aab6dbee7211bf2f55b252d6baa3bc5b8ea14d86842e9ec7c427
-
Filesize
5KB
MD570d3d6b8c9879ffe30a95d71161d9544
SHA102c9aa663864eaddf4b95cc140df602767724dfb
SHA25622c9d4aff4e5d382eb8d08410fb7dc176c2e8ca7ecb8c1994bc49caa8624d136
SHA512c577f1d47ae64041f4e8b586f0082e524f509cfc7ebe184ede231d9c59b137f182516c8f757b9494e38d29866b7e38386bd61b86e684469f77cfd8c72fa8f6d6
-
Filesize
171KB
MD5b172c8265b9521cd8c77956d3cfd97e2
SHA1368efa34b3de230108bfb300434c146a778acc68
SHA25620765889f15567a095f6d83cafd3f8a137dd78967b8896feca00f478f2fd9a1b
SHA5124266f81625c9fa56d291fe245419e16b95e1609b391b34c771a7c598f08daff3fbbef7757c93c1c118ebd80b07700a6957b410e55415e92df9665219046b0ab4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd