Analysis
-
max time kernel
26s -
max time network
24s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-es -
resource tags
arch:x64arch:x86image:win10v2004-20230703-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
17-07-2023 21:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mediamonitors.online:3000/docs/notes/2023/07/17/886336/texts
Resource
win10v2004-20230703-es
General
-
Target
https://mediamonitors.online:3000/docs/notes/2023/07/17/886336/texts
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133341019825778187" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3528 chrome.exe 3528 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3528 chrome.exe 3528 chrome.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe Token: SeShutdownPrivilege 3528 chrome.exe Token: SeCreatePagefilePrivilege 3528 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe 3528 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3528 wrote to memory of 1200 3528 chrome.exe 65 PID 3528 wrote to memory of 1200 3528 chrome.exe 65 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 5104 3528 chrome.exe 87 PID 3528 wrote to memory of 4856 3528 chrome.exe 88 PID 3528 wrote to memory of 4856 3528 chrome.exe 88 PID 3528 wrote to memory of 2464 3528 chrome.exe 89 PID 3528 wrote to memory of 2464 3528 chrome.exe 89 PID 3528 wrote to memory of 2464 3528 chrome.exe 89 PID 3528 wrote to memory of 2464 3528 chrome.exe 89 PID 3528 wrote to memory of 2464 3528 chrome.exe 89 PID 3528 wrote to memory of 2464 3528 chrome.exe 89 PID 3528 wrote to memory of 2464 3528 chrome.exe 89 PID 3528 wrote to memory of 2464 3528 chrome.exe 89 PID 3528 wrote to memory of 2464 3528 chrome.exe 89 PID 3528 wrote to memory of 2464 3528 chrome.exe 89 PID 3528 wrote to memory of 2464 3528 chrome.exe 89 PID 3528 wrote to memory of 2464 3528 chrome.exe 89 PID 3528 wrote to memory of 2464 3528 chrome.exe 89 PID 3528 wrote to memory of 2464 3528 chrome.exe 89 PID 3528 wrote to memory of 2464 3528 chrome.exe 89 PID 3528 wrote to memory of 2464 3528 chrome.exe 89 PID 3528 wrote to memory of 2464 3528 chrome.exe 89 PID 3528 wrote to memory of 2464 3528 chrome.exe 89 PID 3528 wrote to memory of 2464 3528 chrome.exe 89 PID 3528 wrote to memory of 2464 3528 chrome.exe 89 PID 3528 wrote to memory of 2464 3528 chrome.exe 89 PID 3528 wrote to memory of 2464 3528 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mediamonitors.online:3000/docs/notes/2023/07/17/886336/texts1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce7469758,0x7ffce7469768,0x7ffce74697782⤵PID:1200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=1916,i,15729244876629167824,5724606935083811867,131072 /prefetch:22⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 --field-trial-handle=1916,i,15729244876629167824,5724606935083811867,131072 /prefetch:82⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2148 --field-trial-handle=1916,i,15729244876629167824,5724606935083811867,131072 /prefetch:82⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1916,i,15729244876629167824,5724606935083811867,131072 /prefetch:12⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3092 --field-trial-handle=1916,i,15729244876629167824,5724606935083811867,131072 /prefetch:12⤵PID:324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 --field-trial-handle=1916,i,15729244876629167824,5724606935083811867,131072 /prefetch:82⤵PID:1052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 --field-trial-handle=1916,i,15729244876629167824,5724606935083811867,131072 /prefetch:82⤵PID:2732
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4132
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD57faf0b7c5dde30976571598d500601d1
SHA13e3f071c64a6c78df1e02e9bb9afe8a44f20edee
SHA256f8e72bdda870b39d3a98d8b82643b275b436638ed1ccb43dbba5e27c05357c3b
SHA51221a3361e3fde6f5a1eb7c56aa0c83d9cd44e7c41cf30cf9337b9b495dd8398ff9ab61b722353def33422c584dc9293d9d0196cd2aeac0497e657368342c030c4
-
Filesize
87KB
MD5b3b8b1e9dfbcea42a45310585f50c93c
SHA18ebc2472ea68d9d03c5f968b712de5c4bc72800e
SHA25679a62bd57fb0b7b4e0bcc80d707b897e16bf5a5aae41dc5ec5919f9846c519c7
SHA512509a8ec084a9e6fadc089211ec3f262ed478caa17648267c6ffb537d6084a8f7b62c7fbc56c6830588d51cfacc098a1b3cb5390a1d7c100eb2418805f261e1dd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd