Analysis
-
max time kernel
300s -
max time network
272s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2023, 16:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.sokoloffart.com/wp-admin/no/canada/
Resource
win10v2004-20230703-en
General
-
Target
https://www.sokoloffart.com/wp-admin/no/canada/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133333083289658651" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2624 chrome.exe 2624 chrome.exe 4960 chrome.exe 4960 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2624 chrome.exe 2624 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2624 wrote to memory of 3220 2624 chrome.exe 83 PID 2624 wrote to memory of 3220 2624 chrome.exe 83 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 1752 2624 chrome.exe 86 PID 2624 wrote to memory of 4956 2624 chrome.exe 87 PID 2624 wrote to memory of 4956 2624 chrome.exe 87 PID 2624 wrote to memory of 2732 2624 chrome.exe 88 PID 2624 wrote to memory of 2732 2624 chrome.exe 88 PID 2624 wrote to memory of 2732 2624 chrome.exe 88 PID 2624 wrote to memory of 2732 2624 chrome.exe 88 PID 2624 wrote to memory of 2732 2624 chrome.exe 88 PID 2624 wrote to memory of 2732 2624 chrome.exe 88 PID 2624 wrote to memory of 2732 2624 chrome.exe 88 PID 2624 wrote to memory of 2732 2624 chrome.exe 88 PID 2624 wrote to memory of 2732 2624 chrome.exe 88 PID 2624 wrote to memory of 2732 2624 chrome.exe 88 PID 2624 wrote to memory of 2732 2624 chrome.exe 88 PID 2624 wrote to memory of 2732 2624 chrome.exe 88 PID 2624 wrote to memory of 2732 2624 chrome.exe 88 PID 2624 wrote to memory of 2732 2624 chrome.exe 88 PID 2624 wrote to memory of 2732 2624 chrome.exe 88 PID 2624 wrote to memory of 2732 2624 chrome.exe 88 PID 2624 wrote to memory of 2732 2624 chrome.exe 88 PID 2624 wrote to memory of 2732 2624 chrome.exe 88 PID 2624 wrote to memory of 2732 2624 chrome.exe 88 PID 2624 wrote to memory of 2732 2624 chrome.exe 88 PID 2624 wrote to memory of 2732 2624 chrome.exe 88 PID 2624 wrote to memory of 2732 2624 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://www.sokoloffart.com/wp-admin/no/canada/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff929f29758,0x7ff929f29768,0x7ff929f297782⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1888,i,2007886395276677121,7862419795259166545,131072 /prefetch:22⤵PID:1752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2024 --field-trial-handle=1888,i,2007886395276677121,7862419795259166545,131072 /prefetch:82⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1888,i,2007886395276677121,7862419795259166545,131072 /prefetch:82⤵PID:2732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3092 --field-trial-handle=1888,i,2007886395276677121,7862419795259166545,131072 /prefetch:12⤵PID:3160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3100 --field-trial-handle=1888,i,2007886395276677121,7862419795259166545,131072 /prefetch:12⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 --field-trial-handle=1888,i,2007886395276677121,7862419795259166545,131072 /prefetch:82⤵PID:3888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4940 --field-trial-handle=1888,i,2007886395276677121,7862419795259166545,131072 /prefetch:82⤵PID:1816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 --field-trial-handle=1888,i,2007886395276677121,7862419795259166545,131072 /prefetch:82⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2020 --field-trial-handle=1888,i,2007886395276677121,7862419795259166545,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52a2bdf76b44627b9798b256932bd69f0
SHA1fdf17ece693d9bd9b154f3fa08b66cbcf0f8fd43
SHA256b6fef5a04db2614fc2b4b7f8b626f779835053aec2c291a7151871424ee91287
SHA512b5dbe3d369d7583291f9c5726e67f6d32fe1e951204c4d5844066fcc3ba425b7f8232a7a9ca145b3c80fdebe1594cd9251d912987dc85b522e8b6b684d0de0b3
-
Filesize
539B
MD59e717c25cde4134ad26e7372bfd56a63
SHA181a6ff8bb251007b1b92d4fb9f6b6f00d36e04c0
SHA2566a6e7dc3d23ccce16fa7d66ea2cd06f8b255218fcbd8a9c1633befc587051032
SHA512bff889d86b1ff556335fe194297df97c77fa38cc894c801438c776b01707dc2ca9ce387930578ba6dcaa1b49478e53c5c17e2a36b744c9c2319a940299ec331e
-
Filesize
6KB
MD5d12525ffcee5d454e7b08fb83831c71a
SHA1d1f0a665990e06df9054130ed26d4e6402c84a6f
SHA2567a491863e65c048bb5dae316ece957be7c66bcec8c793973bec82dea9b4fbaa9
SHA5126984ec87be1613741112b911a99ee8840e6a2684ae535b22236c55107f0a5ff9636133f07ba4bacf4ff1b021add8a1c9f9af416de35ae1eaaa2ecd8c3e4c580f
-
Filesize
6KB
MD5c0957ad8e96fcbf22234ee441b5d2b32
SHA1fa669d2581e4baeec2ca464341aaf25fa4c7654e
SHA256a7e317568fdaa4aea00fbe7b34f4809c4be0aa2a160b971e1649e587aaeb4606
SHA512ce6a07a3faa1d2389a7a750735edf97dad3566d65331bc2c28693c2447413b7685a138eb46d46e644095e1efb03abc47cd7379e7e08d268dbd17fbec960cba3d
-
Filesize
15KB
MD5efcb69246c081859591e285cffe5129c
SHA187b2d79dc3caa28e9a8f1af0be07d7fe67966585
SHA2561f8913c59cf13dbc9a1309d6389918f7e9663901fb75900e2675f637c06da57d
SHA512f2153f66cb34eb75f018f8261a6a6a8e6ecc388ba4f82e3518ce86f2314a0762333ec85547bc8cf001e1b9d689faf37f87812373a2b8eedd52e6d58ebfc79fe0
-
Filesize
172KB
MD5e22ab7e20b39fecf35a3fc4cb73f3d79
SHA1ef85de36174379ec92a3110f7f030df2710625f7
SHA256015f03f514d7dfd4bf2a0f644f280b7df62852aafb228a970006abc6c0c0ec92
SHA512ff1d79770fb44db525287971a8c59c40a7c103b5074736186c3413ccda053b3bef74bfb2e3909637144e9a9b345f2cd38c8c80d8b6a00fc3f2f8a4f0a1e24576
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd