Analysis
-
max time kernel
60s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2023 19:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://sarpindustries-dot-yamm-track.appspot.com/Redirect?ukey=10hlO-qJfZ8fk9-TotOzMVpyn-9SCEnOMvetYK0LwaNA-855456830&key=YAMMID-92038873&link=https%3A%2F%2Fvaneilitextile.com%2Fcss%2Fadmin%2Fbehwj7%2F%2F%2F%2FcGF2ZWwuc291Y2VrQGN6LmFiYi5jb20=
Resource
win10v2004-20230703-en
General
-
Target
https://sarpindustries-dot-yamm-track.appspot.com/Redirect?ukey=10hlO-qJfZ8fk9-TotOzMVpyn-9SCEnOMvetYK0LwaNA-855456830&key=YAMMID-92038873&link=https%3A%2F%2Fvaneilitextile.com%2Fcss%2Fadmin%2Fbehwj7%2F%2F%2F%2FcGF2ZWwuc291Y2VrQGN6LmFiYi5jb20=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133335780556009162" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4616 chrome.exe 4616 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4616 wrote to memory of 4092 4616 chrome.exe 69 PID 4616 wrote to memory of 4092 4616 chrome.exe 69 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 2584 4616 chrome.exe 91 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3908 4616 chrome.exe 89 PID 4616 wrote to memory of 3332 4616 chrome.exe 90 PID 4616 wrote to memory of 3332 4616 chrome.exe 90 PID 4616 wrote to memory of 3332 4616 chrome.exe 90 PID 4616 wrote to memory of 3332 4616 chrome.exe 90 PID 4616 wrote to memory of 3332 4616 chrome.exe 90 PID 4616 wrote to memory of 3332 4616 chrome.exe 90 PID 4616 wrote to memory of 3332 4616 chrome.exe 90 PID 4616 wrote to memory of 3332 4616 chrome.exe 90 PID 4616 wrote to memory of 3332 4616 chrome.exe 90 PID 4616 wrote to memory of 3332 4616 chrome.exe 90 PID 4616 wrote to memory of 3332 4616 chrome.exe 90 PID 4616 wrote to memory of 3332 4616 chrome.exe 90 PID 4616 wrote to memory of 3332 4616 chrome.exe 90 PID 4616 wrote to memory of 3332 4616 chrome.exe 90 PID 4616 wrote to memory of 3332 4616 chrome.exe 90 PID 4616 wrote to memory of 3332 4616 chrome.exe 90 PID 4616 wrote to memory of 3332 4616 chrome.exe 90 PID 4616 wrote to memory of 3332 4616 chrome.exe 90 PID 4616 wrote to memory of 3332 4616 chrome.exe 90 PID 4616 wrote to memory of 3332 4616 chrome.exe 90 PID 4616 wrote to memory of 3332 4616 chrome.exe 90 PID 4616 wrote to memory of 3332 4616 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://sarpindustries-dot-yamm-track.appspot.com/Redirect?ukey=10hlO-qJfZ8fk9-TotOzMVpyn-9SCEnOMvetYK0LwaNA-855456830&key=YAMMID-92038873&link=https%3A%2F%2Fvaneilitextile.com%2Fcss%2Fadmin%2Fbehwj7%2F%2F%2F%2FcGF2ZWwuc291Y2VrQGN6LmFiYi5jb20=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffb0b699758,0x7ffb0b699768,0x7ffb0b6997782⤵PID:4092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1896,i,6500922928542972815,4999388130004937653,131072 /prefetch:82⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1896,i,6500922928542972815,4999388130004937653,131072 /prefetch:82⤵PID:3332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1896,i,6500922928542972815,4999388130004937653,131072 /prefetch:22⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3292 --field-trial-handle=1896,i,6500922928542972815,4999388130004937653,131072 /prefetch:12⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3168 --field-trial-handle=1896,i,6500922928542972815,4999388130004937653,131072 /prefetch:12⤵PID:4028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3752 --field-trial-handle=1896,i,6500922928542972815,4999388130004937653,131072 /prefetch:12⤵PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3320 --field-trial-handle=1896,i,6500922928542972815,4999388130004937653,131072 /prefetch:12⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 --field-trial-handle=1896,i,6500922928542972815,4999388130004937653,131072 /prefetch:82⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5000 --field-trial-handle=1896,i,6500922928542972815,4999388130004937653,131072 /prefetch:82⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4652 --field-trial-handle=1896,i,6500922928542972815,4999388130004937653,131072 /prefetch:12⤵PID:696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2300 --field-trial-handle=1896,i,6500922928542972815,4999388130004937653,131072 /prefetch:12⤵PID:2732
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1100
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD50adb10693e1d1a2b91d2676de58e1e5f
SHA1d94c3487f256f704fcd34c2e98854448ab12f36f
SHA2564761f3770977c4810c0ff65fea9b7215b6ccd64c1a640357e7ef3c8017f04cb4
SHA512d75d2c5455925402bfc93f6964a4c1f4ebd0850896540f56ce52393c88fd8eb2f10a04482f9138057e821fcc280f697af0814478774ee39a2a6b878232dd932e
-
Filesize
5KB
MD5a907ab82864ee25d0ed6f7bdbc75f0ca
SHA1fe57c95a02f5485102f11f8333cbb86c458316ca
SHA256d6a29f7f4e9b93173b5f8270fd23fe57e52bb88d330c7063ecfe3a089ee3d89e
SHA512a9d753551184f2f1254dfdcec797d477ddf5d3d29f762fc3cad3e55503c437f965fc47d9c7f6a4d6da75ba36b861e52d10d49ad59fecd408c346bbe6bc55b6ae
-
Filesize
172KB
MD5d4e6e707836c5dc95ab169c041fed289
SHA1997c7d058d61fd28032f92bf3fcf644331014ca4
SHA2567aaf1492c4e5a9557c7efd2773c85ec1add173fe12eaaef67da1951ce6b9e16a
SHA512ecc87b1b21f1232bcd4b10e8e17703985aa6bd0166892444ccb626a63f47268f6fb8163a54cfaf8938062292ab9c5a60601fbfd24fb653d0e2141f2a7fdd6dd3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd