Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2023 08:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://dhlparcel.sps-ocs.co.uk
Resource
win10v2004-20230703-en
General
-
Target
http://dhlparcel.sps-ocs.co.uk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133342297808831495" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 4016 chrome.exe 4016 chrome.exe 4852 chrome.exe 4852 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe Token: SeShutdownPrivilege 4016 chrome.exe Token: SeCreatePagefilePrivilege 4016 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe 4016 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4016 wrote to memory of 4764 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 4764 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2296 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 4856 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 4856 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2756 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2756 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2756 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2756 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2756 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2756 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2756 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2756 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2756 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2756 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2756 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2756 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2756 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2756 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2756 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2756 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2756 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2756 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2756 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2756 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2756 4016 chrome.exe chrome.exe PID 4016 wrote to memory of 2756 4016 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://dhlparcel.sps-ocs.co.uk1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff936a59758,0x7ff936a59768,0x7ff936a597782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1872,i,617133477041114223,12870748453783117401,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1872,i,617133477041114223,12870748453783117401,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1872,i,617133477041114223,12870748453783117401,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2896 --field-trial-handle=1872,i,617133477041114223,12870748453783117401,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2912 --field-trial-handle=1872,i,617133477041114223,12870748453783117401,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4424 --field-trial-handle=1872,i,617133477041114223,12870748453783117401,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4752 --field-trial-handle=1872,i,617133477041114223,12870748453783117401,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=1872,i,617133477041114223,12870748453783117401,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2440 --field-trial-handle=1872,i,617133477041114223,12870748453783117401,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
504B
MD5b3029cd9cc07318df92e740eb2863c44
SHA1da75d5fb948719efd9f3039d8e2e5128448dee00
SHA256435efac5a722af38f76fa2693bc3160e8ed645cc321246e6c480a219244f754b
SHA51207a08ef4177ddeefca37971d4a12f606a59d0f81ffcdc6a92f684ec9070bba88e57836fae61bde3ef1d514eeda3d1bf725abaf87a50bb1d2c440aae0fb087f9e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD53592d3a0d971fde064c87b2f5aec5716
SHA11a4e248ad296df815fc7f19a84e396c7f76a8c30
SHA256d077d14de6c8b1618100633172daa1914c95631d7bf032a9df1556e2c4f9a78c
SHA512599883a9fa1941e77a62f159cca10e9e7c06f4a5a9900eae13b0e22cbf0bf42b316a1b5d25a9a3ea73275c1d7b1f2c58378357b1068de6ebf0c1de22f625bebc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
707B
MD5d448551772924a7ad68c529ae34b8837
SHA13d4b5e33979e618b3caad90831cc8cb81b1eeae5
SHA2561c867183377c6977b2d619e4236980cca94b997ab69b6cd1721ce9cb261cf5ad
SHA512f006cad85d4504a3a0aea90e91d065f214622e9e2157f7f5ddb0daa16332120104362f6e71d92ecc8f85dc21c46d04c027885b3f113e11819a64c47f9030a3d9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD582dc5d475111ba5f6bd75246f550adb7
SHA1a0146872a1693bdda5692e8eb0b82255032a21e5
SHA2566e64d3e5505335c05d0d1d552b5a43649686edc19338b32619fbad8c3fb7bb25
SHA5125960e7da58b9e228a8ffdbec8fa239d79069c72d5cbb64a4b2667e4d05c41e1834c1be14fa2cedb05c0b9bfdd956cf7d7c537e6f2aa953e3a86f91eea37af729
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5b5f20ad1fdecb9db9414e6d61d5c61a7
SHA13af54b5c4e63d7574110401808955ba8f835fde5
SHA2561b8081e1dcb26e7370c565eead3c91f002bb659b493bac9829ba4a382e01fcba
SHA5128b851f05ef3d2908d589c5bb0124345525da85f508da6ab1471d7f1d710f308dd4c58d57ffd20567d95f6cb265a8102837ad60285a6818f876aec0532c99e9aa
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD55758bec5e72a187202c84f6dec8d1d59
SHA15f214b70bc031788e5867791d9c30512239c1f0d
SHA256908d917b2834cdeec91871a6e5b8dfe9b00f89707aeaf1ece1e147a1f5136966
SHA5127728beed00eaf3dfdaf10bf7392bb70a449737fbd0855a38dc1ec1e189718544b280618dd106ed2e56b758ac08e246b922dca11f46a0499a7ff886b5eeeb66f3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
87KB
MD5bb855a001a1456a89ae00a923f830b99
SHA1dee17ec2a19f587d32373e7d38ec83dbfe77aab9
SHA256da495364c29936b739a67aa72ff0b7b894e70ce35661eb1c7fe5b891f79db8ff
SHA51221fb21271351a42bdd0b07f96bda97fd88817d7132945ece66af803f0c7e204c308beee07993a029fef4e87a4bfec1eaaada24a2f19ce673ce9c4672cc6a9ac9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_4016_TPLEPELWIXSEWPOAMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e