Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2023, 02:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ministryensuetribute.com/myuqbwdz?key=d21a1d8f82984fd3144435c46ffc3dc1
Resource
win10v2004-20230703-en
General
-
Target
http://ministryensuetribute.com/myuqbwdz?key=d21a1d8f82984fd3144435c46ffc3dc1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133331688730127762" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4044 chrome.exe 4044 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4044 wrote to memory of 1448 4044 chrome.exe 30 PID 4044 wrote to memory of 1448 4044 chrome.exe 30 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 4936 4044 chrome.exe 86 PID 4044 wrote to memory of 2144 4044 chrome.exe 87 PID 4044 wrote to memory of 2144 4044 chrome.exe 87 PID 4044 wrote to memory of 1548 4044 chrome.exe 88 PID 4044 wrote to memory of 1548 4044 chrome.exe 88 PID 4044 wrote to memory of 1548 4044 chrome.exe 88 PID 4044 wrote to memory of 1548 4044 chrome.exe 88 PID 4044 wrote to memory of 1548 4044 chrome.exe 88 PID 4044 wrote to memory of 1548 4044 chrome.exe 88 PID 4044 wrote to memory of 1548 4044 chrome.exe 88 PID 4044 wrote to memory of 1548 4044 chrome.exe 88 PID 4044 wrote to memory of 1548 4044 chrome.exe 88 PID 4044 wrote to memory of 1548 4044 chrome.exe 88 PID 4044 wrote to memory of 1548 4044 chrome.exe 88 PID 4044 wrote to memory of 1548 4044 chrome.exe 88 PID 4044 wrote to memory of 1548 4044 chrome.exe 88 PID 4044 wrote to memory of 1548 4044 chrome.exe 88 PID 4044 wrote to memory of 1548 4044 chrome.exe 88 PID 4044 wrote to memory of 1548 4044 chrome.exe 88 PID 4044 wrote to memory of 1548 4044 chrome.exe 88 PID 4044 wrote to memory of 1548 4044 chrome.exe 88 PID 4044 wrote to memory of 1548 4044 chrome.exe 88 PID 4044 wrote to memory of 1548 4044 chrome.exe 88 PID 4044 wrote to memory of 1548 4044 chrome.exe 88 PID 4044 wrote to memory of 1548 4044 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://ministryensuetribute.com/myuqbwdz?key=d21a1d8f82984fd3144435c46ffc3dc11⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffca5779758,0x7ffca5779768,0x7ffca57797782⤵PID:1448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1872,i,15296979455081256808,13133931076049749808,131072 /prefetch:22⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 --field-trial-handle=1872,i,15296979455081256808,13133931076049749808,131072 /prefetch:82⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 --field-trial-handle=1872,i,15296979455081256808,13133931076049749808,131072 /prefetch:82⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2884 --field-trial-handle=1872,i,15296979455081256808,13133931076049749808,131072 /prefetch:12⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2888 --field-trial-handle=1872,i,15296979455081256808,13133931076049749808,131072 /prefetch:12⤵PID:4732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3220 --field-trial-handle=1872,i,15296979455081256808,13133931076049749808,131072 /prefetch:12⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 --field-trial-handle=1872,i,15296979455081256808,13133931076049749808,131072 /prefetch:82⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5396 --field-trial-handle=1872,i,15296979455081256808,13133931076049749808,131072 /prefetch:82⤵PID:4556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 --field-trial-handle=1872,i,15296979455081256808,13133931076049749808,131072 /prefetch:82⤵PID:1772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 --field-trial-handle=1872,i,15296979455081256808,13133931076049749808,131072 /prefetch:82⤵PID:3828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 --field-trial-handle=1872,i,15296979455081256808,13133931076049749808,131072 /prefetch:82⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2968
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD548a7b6fbea20e2ee579ad3df7296bdf2
SHA11c21e69b02840d75bdb876bdc46d315047f093e8
SHA256238ebbcdd51d6edaddda4ecfeb5f4c51c1e3caa44e70d1b325447e3bd07c3041
SHA5121c6e38ffb8a48e4df501a717fe432d085d87095f7c42e71622a904e6ef188e7b02e990e7a1698c3d39a9aa50ea169b2267929af04376248533864a0164de74ad
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\69376823-2817-4f6a-bb9e-f7908fd37b73.tmp
Filesize539B
MD5032bec0fc83988aedc224a53397b97ee
SHA193c28895665f4e2fe42ca004401b0be562dd66bc
SHA256ab6a268eeaec2152e20e51374cd02cefa86f6ae363815b365be8be6126631fc2
SHA51261c648a693d79fabaa02458f71df471f08641ce933c952a39c5f88a667cf5ba3a6e3fe695cda4c30a203a5c2fc6d07a794a41901643a7a549af1b68fa424518e
-
Filesize
6KB
MD5995a53ef0a65b5a898530ac2e5a81ed5
SHA10ecea10b65ffc31c2400a7d151e082e96c3ec7ed
SHA256c7926e8e8bfb0bd02fc021954a381df398a520a52afb25020c18b63397f65cc1
SHA5121164e8a4830b91bf753e7c451730dc975da292274620ab11a396e4d7a8a11d348937a6d628f7a6efe978da1ea257261954a26b577dd1accc5c42f6666fd44ebe
-
Filesize
15KB
MD5c1707690a24c6490a54696a549d632ed
SHA15482009b98bb6a10a3971440720c231f83ce6f31
SHA256844eafbb9cef4301368da53d8bfbe17b202b06df121608f21392096fd41e76f2
SHA512f46a8affc1c2a036d8517d2e6c2004f0c819b4b9dac295f543c5a9350a1ac2531b1fe8e50c90498e9e8edcbb0d23dee83a387739275414e2af08493e05ecd60b
-
Filesize
174KB
MD5c9499fbe53b8374715de222d1b8a2b2e
SHA14c498d784e6cf418aab209084e3ee39fe5d72059
SHA2568a0854996f3fde341a5f757a065539a21e73cf27398a7ee6b0174090df1accb9
SHA512a7ea666528cfea69a385da543d37dc6cc3e3478c3bc209a4d58681d2532bad95f9547c23c8e970dbfff3238a3f0b506438fbcf865b9559dcd90b60e0b47dff83
-
Filesize
89KB
MD56dd5b107eaba23c5161aea431e65346b
SHA11ab2d1ba13269da5b522e800e7238eb6a750d47f
SHA25659190d7a387a22ae26243604dfd7a75d7e88b4c9b0afe6acd4eb3dd09c9e4f3a
SHA512e1a127069cbd3707b390506c5d1ca212fda1d00728aa482111e995280585d94aeafe1de17772e20d94f97d0211b223af35026698e1db3deca2f99a2f151df690
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd