Analysis
-
max time kernel
128s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17/07/2023, 18:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://lomando.com/heven.html
Resource
win10v2004-20230703-en
General
-
Target
https://lomando.com/heven.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133340920410779872" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 680 chrome.exe 680 chrome.exe 4488 chrome.exe 4488 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe Token: SeShutdownPrivilege 680 chrome.exe Token: SeCreatePagefilePrivilege 680 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe 680 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 680 wrote to memory of 4024 680 chrome.exe 84 PID 680 wrote to memory of 4024 680 chrome.exe 84 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 2036 680 chrome.exe 86 PID 680 wrote to memory of 1520 680 chrome.exe 87 PID 680 wrote to memory of 1520 680 chrome.exe 87 PID 680 wrote to memory of 1208 680 chrome.exe 88 PID 680 wrote to memory of 1208 680 chrome.exe 88 PID 680 wrote to memory of 1208 680 chrome.exe 88 PID 680 wrote to memory of 1208 680 chrome.exe 88 PID 680 wrote to memory of 1208 680 chrome.exe 88 PID 680 wrote to memory of 1208 680 chrome.exe 88 PID 680 wrote to memory of 1208 680 chrome.exe 88 PID 680 wrote to memory of 1208 680 chrome.exe 88 PID 680 wrote to memory of 1208 680 chrome.exe 88 PID 680 wrote to memory of 1208 680 chrome.exe 88 PID 680 wrote to memory of 1208 680 chrome.exe 88 PID 680 wrote to memory of 1208 680 chrome.exe 88 PID 680 wrote to memory of 1208 680 chrome.exe 88 PID 680 wrote to memory of 1208 680 chrome.exe 88 PID 680 wrote to memory of 1208 680 chrome.exe 88 PID 680 wrote to memory of 1208 680 chrome.exe 88 PID 680 wrote to memory of 1208 680 chrome.exe 88 PID 680 wrote to memory of 1208 680 chrome.exe 88 PID 680 wrote to memory of 1208 680 chrome.exe 88 PID 680 wrote to memory of 1208 680 chrome.exe 88 PID 680 wrote to memory of 1208 680 chrome.exe 88 PID 680 wrote to memory of 1208 680 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://lomando.com/heven.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x9c,0x108,0x7ffc3c499758,0x7ffc3c499768,0x7ffc3c4997782⤵PID:4024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1908,i,2369830484562077940,17565438563002704815,131072 /prefetch:22⤵PID:2036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1908,i,2369830484562077940,17565438563002704815,131072 /prefetch:82⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1908,i,2369830484562077940,17565438563002704815,131072 /prefetch:82⤵PID:1208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3136 --field-trial-handle=1908,i,2369830484562077940,17565438563002704815,131072 /prefetch:12⤵PID:3420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3168 --field-trial-handle=1908,i,2369830484562077940,17565438563002704815,131072 /prefetch:12⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5028 --field-trial-handle=1908,i,2369830484562077940,17565438563002704815,131072 /prefetch:82⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 --field-trial-handle=1908,i,2369830484562077940,17565438563002704815,131072 /prefetch:82⤵PID:1280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5292 --field-trial-handle=1908,i,2369830484562077940,17565438563002704815,131072 /prefetch:12⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5356 --field-trial-handle=1908,i,2369830484562077940,17565438563002704815,131072 /prefetch:12⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5548 --field-trial-handle=1908,i,2369830484562077940,17565438563002704815,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4488
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2240
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e7c26d6011c2a5397cbc809da9560759
SHA1e17c12a0816558549a27aff255ef442ae5288826
SHA256d2972724e7900b769b4703dfdabf72d89005510ec9c141224e065e47f9dbb12f
SHA512751c6aea7f8584e8f29aeb6f995f88438be46e6973d999c7a79fa86eb5a0befe7f19ad18583653d064d0c0978b32f46e37a35ce1298c80bc9e136fdbbac42a6f
-
Filesize
1KB
MD5856c1ab6abbecb2857bb6d0f04176b41
SHA1f2c9c659342ad7b53bbb2a50218192e8e9678b2c
SHA2560dacd2e712dc59597b8c825826909d581703473a119dd7cb50be008136a1d0bd
SHA51230d90ab2e69fec85dc5a1c8d6c6031c5edb6e516549854f8e2e77fbb618944b430c2f56c367e0d2e450eee32dccad66df9e7d01bee3dc3c5256108d90d54a7f0
-
Filesize
5KB
MD500507dda587e73274277eae78db6510f
SHA12a2e3373aed42e6611a055057d1031cf0d03420c
SHA25639d1f83956aed3caf21eecdfad7f1e6393c3009841d3189d86ad08adcdf0ff01
SHA5129923210e28d2f92ea87f9836079fabbc503b71e22093dd33df500791933727d0338441c81da0924795156bfbd3df95ef54ab2ba0d7adf529ccb7dddf2c41fc76
-
Filesize
8KB
MD52f7d1f7c45e86bda5bb9ccffe0a67c36
SHA1a8f9fe111e4dd1c9caab7064f95358c92fd005d5
SHA256a00d8124a731bb0f4f194678c629f365ed2851d436a522a9a4f260c8ddbf8f19
SHA512ecb537dfd1db5cfa06ec5556ca80a3e9096c33c43629295044e85dc8ed4afc71550afb76d6372b39f16f3784c59c93cc2057b676e9051d531c0d828255a15b22
-
Filesize
87KB
MD55efaa074ee74478ccdc469c6def3e6d8
SHA1dcd364f301aba4600b845a7ba163d765c2ff4203
SHA2564f8a88682eb08f981104d6d23d6d29791250943cf7619f88289d7f94f414627f
SHA512645ae178e6204e9883b3fe87efdee2a1af5b1927f9c798eefb0c469a6f08296ea9314550bc2430b8dacd04fc69c469b2902529045d64015e3c86712406cb9e0f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd