Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2023, 13:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://yougotagift.com/saudi/gifts/barcode/generate/4198477394169/
Resource
win10-20230703-en
Behavioral task
behavioral2
Sample
https://yougotagift.com/saudi/gifts/barcode/generate/4198477394169/
Resource
win10v2004-20230703-en
General
-
Target
https://yougotagift.com/saudi/gifts/barcode/generate/4198477394169/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133337286692304658" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2508 chrome.exe 2508 chrome.exe 4188 chrome.exe 4188 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2508 chrome.exe 2508 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeCreatePagefilePrivilege 2508 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2508 wrote to memory of 4184 2508 chrome.exe 52 PID 2508 wrote to memory of 4184 2508 chrome.exe 52 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4460 2508 chrome.exe 87 PID 2508 wrote to memory of 4844 2508 chrome.exe 88 PID 2508 wrote to memory of 4844 2508 chrome.exe 88 PID 2508 wrote to memory of 3660 2508 chrome.exe 89 PID 2508 wrote to memory of 3660 2508 chrome.exe 89 PID 2508 wrote to memory of 3660 2508 chrome.exe 89 PID 2508 wrote to memory of 3660 2508 chrome.exe 89 PID 2508 wrote to memory of 3660 2508 chrome.exe 89 PID 2508 wrote to memory of 3660 2508 chrome.exe 89 PID 2508 wrote to memory of 3660 2508 chrome.exe 89 PID 2508 wrote to memory of 3660 2508 chrome.exe 89 PID 2508 wrote to memory of 3660 2508 chrome.exe 89 PID 2508 wrote to memory of 3660 2508 chrome.exe 89 PID 2508 wrote to memory of 3660 2508 chrome.exe 89 PID 2508 wrote to memory of 3660 2508 chrome.exe 89 PID 2508 wrote to memory of 3660 2508 chrome.exe 89 PID 2508 wrote to memory of 3660 2508 chrome.exe 89 PID 2508 wrote to memory of 3660 2508 chrome.exe 89 PID 2508 wrote to memory of 3660 2508 chrome.exe 89 PID 2508 wrote to memory of 3660 2508 chrome.exe 89 PID 2508 wrote to memory of 3660 2508 chrome.exe 89 PID 2508 wrote to memory of 3660 2508 chrome.exe 89 PID 2508 wrote to memory of 3660 2508 chrome.exe 89 PID 2508 wrote to memory of 3660 2508 chrome.exe 89 PID 2508 wrote to memory of 3660 2508 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://yougotagift.com/saudi/gifts/barcode/generate/4198477394169/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1d109758,0x7ffa1d109768,0x7ffa1d1097782⤵PID:4184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1804,i,5980919552038374303,429364977613917718,131072 /prefetch:22⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1804,i,5980919552038374303,429364977613917718,131072 /prefetch:82⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1804,i,5980919552038374303,429364977613917718,131072 /prefetch:82⤵PID:3660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3004 --field-trial-handle=1804,i,5980919552038374303,429364977613917718,131072 /prefetch:12⤵PID:932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3076 --field-trial-handle=1804,i,5980919552038374303,429364977613917718,131072 /prefetch:12⤵PID:3376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 --field-trial-handle=1804,i,5980919552038374303,429364977613917718,131072 /prefetch:82⤵PID:3588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5096 --field-trial-handle=1804,i,5980919552038374303,429364977613917718,131072 /prefetch:82⤵PID:1236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 --field-trial-handle=1804,i,5980919552038374303,429364977613917718,131072 /prefetch:82⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3940 --field-trial-handle=1804,i,5980919552038374303,429364977613917718,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4188
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5116
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4504
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:1700
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD545db337937b14d1465b76c94d4041cab
SHA1c78f52ef32bfc43cf3e8a415f34125ad67876c4f
SHA25668aa28d0ee8210d0df1c3693f283df8378478163a75a3ba9d900da9e34e2182f
SHA512737f1321d5d2e168eeca5555bb9a21b0b9c19caf5909583a9ae76a7d33e6eecee89c6067a05a346ed9b2a1c682d5f37c36ec21a5e7d7b8cb7c45f57dbdf717eb
-
Filesize
1KB
MD52e216b4cd00fe9ef985f78fb708ec9a4
SHA17af82e3dd5192f6382ae6115f3d5c934db7fa273
SHA2569ff6ca07d899027e1138a9ab6de9bd6676c3bfc8a684db26c49a2d3c30d124c4
SHA512caf9da79c3a3335c4e3cf3b2f473003f415b72249f388ee5f84ffe3f1959242306d62fadd495ecefd6f2e81598487220759871168a386b1e361fd914d79ca261
-
Filesize
371B
MD57c0f88ee7313fb825bb7dd02a026931a
SHA1658bf05696bc64bd5430be59cc1a7925fe5fc9e8
SHA2566ebe773e271779e4770d711a7d42d3a3cec629971e4ff2da3618633543f28e9e
SHA5123ebdc26300328074a71a707deb46eb62636d16ddc06737f2adc4401b348010da1c651622ed94b832d25108229e80d5ed15e9cde145012d1f98f1f7d56437c71f
-
Filesize
6KB
MD574286e73e49de18a89ce1bc9fad96ac4
SHA1796950a5421ad86073c23df52bce3b0f851a5c1c
SHA2561ece2c387228ff5d13aed44a56814629766d25160ab36096297e9a04a6041324
SHA512e3ebe0d2aa61966a463b71168ea3ced89f46988e378730a56604a3d0571b8e15611fbb40e58c3c90c907aaac9c381eaa822dc523cb8f345669ace732e6bb1c39
-
Filesize
15KB
MD50a68293bcc6a2dae404285ef89bb3eab
SHA17a28b6e8b92470969ec78fbff0e09e7af828e1db
SHA2568e29102f5ea283a28bf1bf7f2e06b753557ef1610f5db564c25222d0ad2d61d9
SHA5126fa7b5d99a4261d78f0014c3711326b4c9f0c5822cc4a5965b40c205d89a1ada160a74a42ff0d6caa4c0f4427e1e8fda596adc51ec9a943c28f89f248e17e3dc
-
Filesize
173KB
MD515fb976909c85cdf27d0b05402343be8
SHA1937a858d308ca532df8b320e61f3ac13a841bae6
SHA256c6d7b580c972498a9711689fc5a3fe5ad3891bfa76468861ef396b86fac2ee97
SHA51203d2629efe5b1e602acf08709c695bf2c773f9547f894e52b3ed4733a60e02f76bd7560c27501e404b8d695c5d745ece64867db6cb8d620659457347dcaf9f19
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd