Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2023, 09:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://neomsa.careers
Resource
win10v2004-20230703-en
General
-
Target
http://neomsa.careers
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133346654108652668" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4596 chrome.exe 4596 chrome.exe 1164 chrome.exe 1164 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe Token: SeShutdownPrivilege 4596 chrome.exe Token: SeCreatePagefilePrivilege 4596 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe 4596 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4596 wrote to memory of 3440 4596 chrome.exe 69 PID 4596 wrote to memory of 3440 4596 chrome.exe 69 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 4316 4596 chrome.exe 89 PID 4596 wrote to memory of 2792 4596 chrome.exe 88 PID 4596 wrote to memory of 2792 4596 chrome.exe 88 PID 4596 wrote to memory of 1792 4596 chrome.exe 90 PID 4596 wrote to memory of 1792 4596 chrome.exe 90 PID 4596 wrote to memory of 1792 4596 chrome.exe 90 PID 4596 wrote to memory of 1792 4596 chrome.exe 90 PID 4596 wrote to memory of 1792 4596 chrome.exe 90 PID 4596 wrote to memory of 1792 4596 chrome.exe 90 PID 4596 wrote to memory of 1792 4596 chrome.exe 90 PID 4596 wrote to memory of 1792 4596 chrome.exe 90 PID 4596 wrote to memory of 1792 4596 chrome.exe 90 PID 4596 wrote to memory of 1792 4596 chrome.exe 90 PID 4596 wrote to memory of 1792 4596 chrome.exe 90 PID 4596 wrote to memory of 1792 4596 chrome.exe 90 PID 4596 wrote to memory of 1792 4596 chrome.exe 90 PID 4596 wrote to memory of 1792 4596 chrome.exe 90 PID 4596 wrote to memory of 1792 4596 chrome.exe 90 PID 4596 wrote to memory of 1792 4596 chrome.exe 90 PID 4596 wrote to memory of 1792 4596 chrome.exe 90 PID 4596 wrote to memory of 1792 4596 chrome.exe 90 PID 4596 wrote to memory of 1792 4596 chrome.exe 90 PID 4596 wrote to memory of 1792 4596 chrome.exe 90 PID 4596 wrote to memory of 1792 4596 chrome.exe 90 PID 4596 wrote to memory of 1792 4596 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://neomsa.careers1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b8689758,0x7ff9b8689768,0x7ff9b86897782⤵PID:3440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=1852,i,10655511956193680862,16702632095110509133,131072 /prefetch:82⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 --field-trial-handle=1852,i,10655511956193680862,16702632095110509133,131072 /prefetch:22⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1852,i,10655511956193680862,16702632095110509133,131072 /prefetch:82⤵PID:1792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3076 --field-trial-handle=1852,i,10655511956193680862,16702632095110509133,131072 /prefetch:12⤵PID:3736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3108 --field-trial-handle=1852,i,10655511956193680862,16702632095110509133,131072 /prefetch:12⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4672 --field-trial-handle=1852,i,10655511956193680862,16702632095110509133,131072 /prefetch:12⤵PID:1220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 --field-trial-handle=1852,i,10655511956193680862,16702632095110509133,131072 /prefetch:82⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3912 --field-trial-handle=1852,i,10655511956193680862,16702632095110509133,131072 /prefetch:82⤵PID:832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3668 --field-trial-handle=1852,i,10655511956193680862,16702632095110509133,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1164
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
864B
MD5fac155cfb82e7d46422cfd49a08031f9
SHA11c550962ad84ab08aabd2f72b165e064ad641ffd
SHA2563132ce43c7302d2590ed69e14bd6903dbd4fa1f7a171622a4932ec8a4e5357a6
SHA5125b73f48da564e11d20dbb07de559e26ed635b841e198dbc604ff56b646a8b960a2b0229ef358ac39c3cb59fb09e2a41e608641a5add2e2cff96feee6b2b07324
-
Filesize
2KB
MD5f099e08e0ad3e7695ad19c36e635e933
SHA1b91349ea24281b80010af2fcb908584fa7188de7
SHA2565dd6bf19e3b7a628974e036578a49031ffbf65393c36fa5b2cfc57a551141bc2
SHA512d58faf56bd2fc45811d2ea9eba1786bd2c0c6c836ab914b862a8a4010d5dcd695ca0edb68373e889c9109b38d3a79f3ca52be8bedecef32d1f1f34c54595600d
-
Filesize
1KB
MD5d313d780525cbe0c8f2a278d7e4dd0f2
SHA1fc6971b8560a9f2dfaf83edf6e3e28401c0c4800
SHA256dff2c88bac6202655602ab9eb6c171d5f1bdd7fdc43970906c6d137cd6b5a88a
SHA51245111fb1f028a13c57e87cb45f6c6a9a99eb13925e516deaed99e31a1ed5ce75841e9fc73ff3b89ff90c49c5c6e02299d0f030810bdb187b45b6a6771bd9127f
-
Filesize
539B
MD5c86b8f89569cf0cee880e7abe1090092
SHA190a0419c2cab5c4c0fe2df163032356e598b2b9a
SHA2565a6a93a97cbde3363486976af578608238c1a1bc0d2a7ea5b681b71f2f67a4e8
SHA512efe9ba760c41c3fb204c8e4bd004a6be7845e68a91bb77a49a84f48740a78ef849b22a7e50fd7c15311fa11ec50f52238e855255110ef2fb453c9f8a05d5e81d
-
Filesize
6KB
MD5d9a1e34d8b0d9a4f26da216827b263fe
SHA1c4a950aa075403c1520a7976849f3d7fcd3694ba
SHA256bc33799fdeab5fd6df8892de916c6630d4a5524723fa9e8b128f619db06e8992
SHA512f8f459161a9750cebc1891be3841bc2b959fd2a625ec1bf7da1724f9e4841e048caa1d084d463fcf83ecd149bc579d3f3ab77a0aa22bf7b0fb311d0a54218aac
-
Filesize
6KB
MD5f4f69f5d0c358fdac4c03f3536e9d4c4
SHA1cf8a6b32768f97949d24a60520378b886924e1a1
SHA2562b415986eb9f3053dcd3f81a018deb7d0649de75144292f23f85e325edae513b
SHA5123a0ec6da7c3af5491bb5640cce4b25e3441554fe4159e563b2a205802c3deb70e01479a9553561fc4370f5dd12f8e4caf883d18f752d6a240b450e4b269ff0d8
-
Filesize
87KB
MD58099ac344311a66ee840629f43cde6c0
SHA11f44380080be8f20bb5722aab10345ec031f408e
SHA2562e32a2803aee3287b85b887af7d1fbebb217b3b67d34074e11a0f3d2fc87c980
SHA512243cb5ac391119ba8848f1046849891c09d16b7568355fc8c11064cf56d0aee322111f92630c751fffd2476fc59648ac31da5d257604c7c34083b9ef13792969
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd