Analysis
-
max time kernel
121s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2023 03:02
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://atstechoman.com/wp-includes/pomo/name/ZuHmX/[email protected]
Resource
win10v2004-20230703-en
General
-
Target
https://atstechoman.com/wp-includes/pomo/name/ZuHmX/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133337774272795129" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1748 chrome.exe 1748 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1748 chrome.exe 1748 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe Token: SeShutdownPrivilege 1748 chrome.exe Token: SeCreatePagefilePrivilege 1748 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe 1748 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1748 wrote to memory of 4400 1748 chrome.exe 37 PID 1748 wrote to memory of 4400 1748 chrome.exe 37 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 1008 1748 chrome.exe 87 PID 1748 wrote to memory of 564 1748 chrome.exe 86 PID 1748 wrote to memory of 564 1748 chrome.exe 86 PID 1748 wrote to memory of 2604 1748 chrome.exe 88 PID 1748 wrote to memory of 2604 1748 chrome.exe 88 PID 1748 wrote to memory of 2604 1748 chrome.exe 88 PID 1748 wrote to memory of 2604 1748 chrome.exe 88 PID 1748 wrote to memory of 2604 1748 chrome.exe 88 PID 1748 wrote to memory of 2604 1748 chrome.exe 88 PID 1748 wrote to memory of 2604 1748 chrome.exe 88 PID 1748 wrote to memory of 2604 1748 chrome.exe 88 PID 1748 wrote to memory of 2604 1748 chrome.exe 88 PID 1748 wrote to memory of 2604 1748 chrome.exe 88 PID 1748 wrote to memory of 2604 1748 chrome.exe 88 PID 1748 wrote to memory of 2604 1748 chrome.exe 88 PID 1748 wrote to memory of 2604 1748 chrome.exe 88 PID 1748 wrote to memory of 2604 1748 chrome.exe 88 PID 1748 wrote to memory of 2604 1748 chrome.exe 88 PID 1748 wrote to memory of 2604 1748 chrome.exe 88 PID 1748 wrote to memory of 2604 1748 chrome.exe 88 PID 1748 wrote to memory of 2604 1748 chrome.exe 88 PID 1748 wrote to memory of 2604 1748 chrome.exe 88 PID 1748 wrote to memory of 2604 1748 chrome.exe 88 PID 1748 wrote to memory of 2604 1748 chrome.exe 88 PID 1748 wrote to memory of 2604 1748 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://atstechoman.com/wp-includes/pomo/name/ZuHmX/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffde4119758,0x7ffde4119768,0x7ffde41197782⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1912 --field-trial-handle=2036,i,6411782229159877089,4934121493432834668,131072 /prefetch:82⤵PID:564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1692 --field-trial-handle=2036,i,6411782229159877089,4934121493432834668,131072 /prefetch:22⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=2036,i,6411782229159877089,4934121493432834668,131072 /prefetch:82⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3016 --field-trial-handle=2036,i,6411782229159877089,4934121493432834668,131072 /prefetch:12⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=2036,i,6411782229159877089,4934121493432834668,131072 /prefetch:12⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4608 --field-trial-handle=2036,i,6411782229159877089,4934121493432834668,131072 /prefetch:82⤵PID:1072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 --field-trial-handle=2036,i,6411782229159877089,4934121493432834668,131072 /prefetch:82⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5048 --field-trial-handle=2036,i,6411782229159877089,4934121493432834668,131072 /prefetch:22⤵PID:1684
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3852
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e4c73005a3a69619e7a2bd978353b3ef
SHA1209f70fc0ab78bafbec68e1f88cd51636271c317
SHA25613bc25e66e3abd2fe29e462851149a2f4b0f755da7c48d8a3cff189980f3bcaf
SHA5127fccb4873ee511575c16604ec2393c56072a989468e105b585d65f7c6b359ff043e38ec3acabb175e52643ef38bf1d2f249118142dfd628ff689c4c6f492897d
-
Filesize
5KB
MD53840f08ebfd62ed09ca01253705610b8
SHA18a3c26ed769eba32afaac681e05950cb943ab845
SHA256304023885906beb62e0217fb7c9f90bdb91138f572f829089838d4afd7a99439
SHA512d71acbf33eec3714b0486af51c673c95823d2be0c4725c8eb3dcb265a7246e59ac915269f91c2e1a3b78833d960ea00b1dfd8700070615dbfb0bdea2691d6fd9
-
Filesize
5KB
MD515f4b5279d954492ea021a1e54b27323
SHA10d534d74b745b3512262889001fb806ba67ddf65
SHA2565ef37d2aef3d5e9b16836932bb863acb6deb92f065ea7d8b9060f54ed6b08159
SHA512c3e5346d409934d85a5197725244591a55994450b1dc047d1f8fa111c3d7e1147daa2176361cbcc00e81ba083f94e9b2e51c8b565c4c26dfa0a9eac2b182ad21
-
Filesize
5KB
MD528f158aec04eaa105b809845b449d9fa
SHA15ea987742b980bc2a0e8145f065353c62bdf1361
SHA2562dc0a0b112a349f40edfe692473fe33b10dc633e5241cd72ee31118971c2df88
SHA5122bc97832f8111797b4cfe6e64fa8394367296f6228fe7b99f84db83cbbf1ddc5a462384c93c1459a295204cf5057e1a2f8b296593e7e2761a4aba47bc9fb2847
-
Filesize
6KB
MD563144fa51eab04510b7381b7c363c478
SHA11bd9c0718b3613f6697ba3e17dcfd1641e180feb
SHA25659a74acb4752a3299c103fe9c522b2d39dcec2a483c4d630e1ea8d24230ed790
SHA51260b05310763ba036119173baa189a0b1a2e7a98a442c8179216e4e41cf6a104436db9ef4879c7a55fce5ce8eb1f3e6073c59d28ebac58985b3c6d568694b2444
-
Filesize
87KB
MD560ffc2564197c696885c3a377f33114e
SHA18b84c3eaba89e3fc824c85086cc5716b78aa7737
SHA256dacee18c63db21cd1ad2afb1b5ddb71aef2d956aaf33aa7d5ecd7fcfa5dbab1e
SHA5129462906860404dd8ce2f133233a70cba647877c3373fbc93008178c1584afccadeadc6806c39289496dc12f01dea29fc956ea1f9995cb97a1a1a83a78452be82
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd