Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2023, 18:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://id.wikipedia.org/wiki/Berkas:Logo_Microsoft_Office_365_(2013-2019).svg
Resource
win10v2004-20230703-en
General
-
Target
https://id.wikipedia.org/wiki/Berkas:Logo_Microsoft_Office_365_(2013-2019).svg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133331431523882857" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2108 chrome.exe 2108 chrome.exe 3956 chrome.exe 3956 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2108 chrome.exe 2108 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2108 wrote to memory of 4460 2108 chrome.exe 73 PID 2108 wrote to memory of 4460 2108 chrome.exe 73 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1524 2108 chrome.exe 88 PID 2108 wrote to memory of 1004 2108 chrome.exe 90 PID 2108 wrote to memory of 1004 2108 chrome.exe 90 PID 2108 wrote to memory of 1848 2108 chrome.exe 89 PID 2108 wrote to memory of 1848 2108 chrome.exe 89 PID 2108 wrote to memory of 1848 2108 chrome.exe 89 PID 2108 wrote to memory of 1848 2108 chrome.exe 89 PID 2108 wrote to memory of 1848 2108 chrome.exe 89 PID 2108 wrote to memory of 1848 2108 chrome.exe 89 PID 2108 wrote to memory of 1848 2108 chrome.exe 89 PID 2108 wrote to memory of 1848 2108 chrome.exe 89 PID 2108 wrote to memory of 1848 2108 chrome.exe 89 PID 2108 wrote to memory of 1848 2108 chrome.exe 89 PID 2108 wrote to memory of 1848 2108 chrome.exe 89 PID 2108 wrote to memory of 1848 2108 chrome.exe 89 PID 2108 wrote to memory of 1848 2108 chrome.exe 89 PID 2108 wrote to memory of 1848 2108 chrome.exe 89 PID 2108 wrote to memory of 1848 2108 chrome.exe 89 PID 2108 wrote to memory of 1848 2108 chrome.exe 89 PID 2108 wrote to memory of 1848 2108 chrome.exe 89 PID 2108 wrote to memory of 1848 2108 chrome.exe 89 PID 2108 wrote to memory of 1848 2108 chrome.exe 89 PID 2108 wrote to memory of 1848 2108 chrome.exe 89 PID 2108 wrote to memory of 1848 2108 chrome.exe 89 PID 2108 wrote to memory of 1848 2108 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://id.wikipedia.org/wiki/Berkas:Logo_Microsoft_Office_365_(2013-2019).svg1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb3ef09758,0x7ffb3ef09768,0x7ffb3ef097782⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1880,i,5919555936891205505,13298763181301791744,131072 /prefetch:22⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1880,i,5919555936891205505,13298763181301791744,131072 /prefetch:82⤵PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1880,i,5919555936891205505,13298763181301791744,131072 /prefetch:82⤵PID:1004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3192 --field-trial-handle=1880,i,5919555936891205505,13298763181301791744,131072 /prefetch:12⤵PID:3312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3208 --field-trial-handle=1880,i,5919555936891205505,13298763181301791744,131072 /prefetch:12⤵PID:3716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4964 --field-trial-handle=1880,i,5919555936891205505,13298763181301791744,131072 /prefetch:82⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 --field-trial-handle=1880,i,5919555936891205505,13298763181301791744,131072 /prefetch:82⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1880,i,5919555936891205505,13298763181301791744,131072 /prefetch:82⤵PID:3968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3784 --field-trial-handle=1880,i,5919555936891205505,13298763181301791744,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3956
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:452
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5568837df42122ac53af93c01320e02ab
SHA1bc2ef194a4d79eeb0fbf0c94fe6daeba82917b55
SHA256c8550fd0f2bb864044374453804d58f0ae0dab882e5105176da030b2bb6bcc5a
SHA512a66eb71b36df86f756468b00c2b361a3eba6677ee6e85696ea93439638934331c949f8630e7db9f1d22af18e9f821322eb601a33a63ee5fb06c4347726ed04c9
-
Filesize
1KB
MD5cea1900ee5ba615720b060276c6924ad
SHA155acc0766bd1339055e3b2d613574b13969b39d6
SHA256aa0e25d5e59a187fefab84a7cd2763c469c9c97a001640935772aa43db32bbb5
SHA512be467c8daa8cd8142729602d78faba18c068cc24b86ec4b4413805f714bf05b5d6e09c68df7fc347e37ffc5c06970ed8ac75f2edbce1215a760e8a89643a5b3c
-
Filesize
1KB
MD56689311490158c3b0eb3cb1d969fe7a0
SHA1e57ff86dd67bb973f33a0f670f0de8d67d119e96
SHA2569e3804e6b323ad551e639b36f0e75312f2bd9c1430c57ca88231dfe2db95081c
SHA51248c7c8330933166fcc47b573b41bfb3fdcc7fc70aa4d6333f2205aec3cf7780fdd50fa58bb56852b439e5adff032f5f33709885178ac64acf3d71a9e6e021736
-
Filesize
6KB
MD5a80c4c47c6c7a44782212951a3023d59
SHA155c7a6c90fe54b1b7f140a2902c65da26ad88a98
SHA256bae4af67f1031bb987215359179c72f79d0329a475fa874672eda8016437a502
SHA512149e2bcfa1dfa450f4e507a7504b36c3fe0d55a2f76d8db0cd55e1d90a006d20a9cd85186e2d7c59bdcbb30d76b84ae3cb16dbeb8406086091fe76eb8b0738fd
-
Filesize
15KB
MD5b78ae582eb39e685909adf6a6832e986
SHA1b120a7f3b0d2520f649ffb99345924fb2d86cb04
SHA256af1cab893a18169a884de2764a13d55e9145734ae7aadd826e45074acf8f7c34
SHA5120951b576282c96a51e2c5ff801c53f38e7da9db06e6508a82bf8917d4f39b1fd447d4b06fff858ccafc7638097072076ea038418ca61288b2cf27afa31b8b3c3
-
Filesize
171KB
MD5de83df37d244696982318650af791b10
SHA1009459ec8fb1a6798bd2df5e65bc00a9b600693a
SHA256b793e6fe2a5e2ab57400b367e6ec815c5a7781dead1536d1961c982d445c3ea7
SHA51222577cdbb2272eeb1ee017df61f9033a3298f2c6b9c556d3a78909530ebba9d0b5c4a77cac828789c5710c24abdc0726474a057dfa9f79998a5b7127740bcbf0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd