Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2023 03:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://lawblogng-1319072254.cos.ap-mumbai.myqcloud.com/lawblogng.html
Resource
win10v2004-20230703-en
General
-
Target
https://lawblogng-1319072254.cos.ap-mumbai.myqcloud.com/lawblogng.html
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3508 564 WerFault.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133343836124357177" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 3772 chrome.exe 3772 chrome.exe 3336 chrome.exe 3336 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 3772 chrome.exe 3772 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe Token: SeShutdownPrivilege 3772 chrome.exe Token: SeCreatePagefilePrivilege 3772 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe 3772 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3772 wrote to memory of 916 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 916 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4452 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4212 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 4212 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 2708 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 2708 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 2708 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 2708 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 2708 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 2708 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 2708 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 2708 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 2708 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 2708 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 2708 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 2708 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 2708 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 2708 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 2708 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 2708 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 2708 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 2708 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 2708 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 2708 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 2708 3772 chrome.exe chrome.exe PID 3772 wrote to memory of 2708 3772 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://lawblogng-1319072254.cos.ap-mumbai.myqcloud.com/lawblogng.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc38cf9758,0x7ffc38cf9768,0x7ffc38cf97782⤵PID:916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1876,i,3142766761509356923,1605514127837509281,131072 /prefetch:22⤵PID:4452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1876,i,3142766761509356923,1605514127837509281,131072 /prefetch:82⤵PID:4212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1876,i,3142766761509356923,1605514127837509281,131072 /prefetch:82⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2912 --field-trial-handle=1876,i,3142766761509356923,1605514127837509281,131072 /prefetch:12⤵PID:1928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1876,i,3142766761509356923,1605514127837509281,131072 /prefetch:12⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 --field-trial-handle=1876,i,3142766761509356923,1605514127837509281,131072 /prefetch:82⤵PID:964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 --field-trial-handle=1876,i,3142766761509356923,1605514127837509281,131072 /prefetch:82⤵PID:2784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4708 --field-trial-handle=1876,i,3142766761509356923,1605514127837509281,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3336
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5068
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 440 -p 564 -ip 5641⤵PID:5088
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 564 -s 7721⤵
- Program crash
PID:3508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD52deacfa5aa399a68c312bc84ccc30bfa
SHA1ad36aba2ba4c1fe6cab8f8eba2f8f116b8a45b83
SHA2564ad435101122f8c89df964e61de626d8257a0e56eaa1ecc9a811b29f3c761b92
SHA5120feb142a78e55854b3d0ef18de28c067281b15373267b0830fd25977be6b4f34b811a8820ee411c13d448d01d284238ecaab7e311fa38fd93597b822b7c46d50
-
Filesize
2KB
MD51168e876714f15129ddcf048a3ae6df0
SHA11ae79b57f8fb87012ad12b81aba3cc72dc39e9c0
SHA256b015ecfaaa01f9429db01fb1cba814941e3ddbe42792383886b8fb315cedf17c
SHA5122529a7339098a6402e426e14db1a5635f363c1501cb821e271709cebae18d2c92f2522f1c2189355397e04ef4c02f9250f72c675c2a0259755e675d024a5e53d
-
Filesize
874B
MD588195d32e9e7a3c4affac5c96345e972
SHA14179f25b91056a27ac321d8fac9c3cd3beae981c
SHA256bd4c199c0049467e6252b18c68834fdd8b23478d7bea998ce2fc5f6ec7140df9
SHA512282cf0ec72d9024aaac6b1fe77e01c630ea43fc58057af85c52ad0c9ef62a437bec6941d5afdcfdec5e5d569de36c0db51e6d2cf0e524ad057520975732f1793
-
Filesize
6KB
MD59dee82f4de0aa589645a2f89bb977801
SHA1014afda9c480139ade3a3df667719193c318ce9a
SHA256b0d8aacc0d534be71f49e7b3867818f3fbd01bbbac86bd9b74ac7866b29873de
SHA512cad92cf2b72f565f0b2afd17a66883bca902f72ce8c149d696e8dfbddae3bbbd8b2b9467b896d712a992ac8e0072aced2950d02a38ed453f8f7dd749689319d5
-
Filesize
87KB
MD5584f45ae180f20a7af2c8b76578c2275
SHA15b95ff59fefcd76b8264faaad492b173059afb01
SHA2564d7776a2a3fa424b8e8434ea0dbb989695d083ed29f8e508048f43833659be59
SHA51293f9b6260a5d1280c291e1da543be9d9667f81d2f71b33ed78e37ee97f59fc99359fafe6a19c0fc7f1abf73e145c875c7944c83aeaf8c5b2529ac099bf7287e1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd