Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
01/08/2023, 09:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.electrogroups.com.com/
Resource
win10-20230703-en
General
-
Target
http://www.electrogroups.com.com/
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133353547246025038" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3376 chrome.exe 3376 chrome.exe 4948 chrome.exe 4948 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3376 wrote to memory of 1548 3376 chrome.exe 47 PID 3376 wrote to memory of 1548 3376 chrome.exe 47 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 4360 3376 chrome.exe 73 PID 3376 wrote to memory of 2604 3376 chrome.exe 72 PID 3376 wrote to memory of 2604 3376 chrome.exe 72 PID 3376 wrote to memory of 3580 3376 chrome.exe 74 PID 3376 wrote to memory of 3580 3376 chrome.exe 74 PID 3376 wrote to memory of 3580 3376 chrome.exe 74 PID 3376 wrote to memory of 3580 3376 chrome.exe 74 PID 3376 wrote to memory of 3580 3376 chrome.exe 74 PID 3376 wrote to memory of 3580 3376 chrome.exe 74 PID 3376 wrote to memory of 3580 3376 chrome.exe 74 PID 3376 wrote to memory of 3580 3376 chrome.exe 74 PID 3376 wrote to memory of 3580 3376 chrome.exe 74 PID 3376 wrote to memory of 3580 3376 chrome.exe 74 PID 3376 wrote to memory of 3580 3376 chrome.exe 74 PID 3376 wrote to memory of 3580 3376 chrome.exe 74 PID 3376 wrote to memory of 3580 3376 chrome.exe 74 PID 3376 wrote to memory of 3580 3376 chrome.exe 74 PID 3376 wrote to memory of 3580 3376 chrome.exe 74 PID 3376 wrote to memory of 3580 3376 chrome.exe 74 PID 3376 wrote to memory of 3580 3376 chrome.exe 74 PID 3376 wrote to memory of 3580 3376 chrome.exe 74 PID 3376 wrote to memory of 3580 3376 chrome.exe 74 PID 3376 wrote to memory of 3580 3376 chrome.exe 74 PID 3376 wrote to memory of 3580 3376 chrome.exe 74 PID 3376 wrote to memory of 3580 3376 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.electrogroups.com.com/1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffd7e439758,0x7ffd7e439768,0x7ffd7e4397782⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1828 --field-trial-handle=1776,i,8706140571267422740,6864296663221244339,131072 /prefetch:82⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1548 --field-trial-handle=1776,i,8706140571267422740,6864296663221244339,131072 /prefetch:22⤵PID:4360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 --field-trial-handle=1776,i,8706140571267422740,6864296663221244339,131072 /prefetch:82⤵PID:3580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2656 --field-trial-handle=1776,i,8706140571267422740,6864296663221244339,131072 /prefetch:12⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2640 --field-trial-handle=1776,i,8706140571267422740,6864296663221244339,131072 /prefetch:12⤵PID:4160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4268 --field-trial-handle=1776,i,8706140571267422740,6864296663221244339,131072 /prefetch:12⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4360 --field-trial-handle=1776,i,8706140571267422740,6864296663221244339,131072 /prefetch:82⤵PID:1104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 --field-trial-handle=1776,i,8706140571267422740,6864296663221244339,131072 /prefetch:82⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4496 --field-trial-handle=1776,i,8706140571267422740,6864296663221244339,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4948
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:432
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD5939b8a964552c827cb76d3ee01d303dc
SHA17179c58d36bc5aafb8c0507bd5848d0a1719c70f
SHA25682c81bc692aeea43819908a5caff8963de05aacea229c4e066c2cc0a3beaee36
SHA51276e03078b14d5403fc0ee5e706c686f6d048c2e845f210a563405b53e2f097bcc5486eba5110214e99bcadb3d66a562e05bc929c006555b35f6c8b2b6144d8ae
-
Filesize
1KB
MD5cf2deea4d1aea72e334bd5135614b2eb
SHA1978c6527f4f00eb6e705f17555251eeedc77bf71
SHA256eefee80d9458cd9d0057a88e692e43d9f0b082962538cb387df6145ad7f3f57d
SHA5121d19c3b839bb8e75295180b3404fbd488e39f876815d9bbe120cf7da77e556407479808b57acc33791378d00d303071904ed676309872b7289115f29b75aa153
-
Filesize
6KB
MD572f1bb585d3d8c7eb76f95c715aa758c
SHA1538fac31238e60bf042dc641e79c0a9bddb08b4e
SHA2569735404b3fc1c6b5dbbcc790f342b37c8fde86a561a319e7c73f765345155c94
SHA512b70dacfdc0b000d12cfc86f1fabe526af3f5536655c7784f5dccc2cf9431c12185309d18ba9bc919eefc0329c4311461c82ac7150e1a654e1c9d4a91dfa990ce
-
Filesize
6KB
MD5827a96aa6fd810389edcc5ad45c1ef0d
SHA1482bedcac7df45ec6368a9c42b6c08803e4c1ceb
SHA256659d65fc58b33a05e5182d01dc51ddf529f0081a3ed4afed14298b29e697d693
SHA512640d5377f67e7ff30a479c50e9de98955c0b2b23b4e3c0f4dd79d50687ac441117e23e114b1069e373eccfeb340b9ea6836a814e12a284486b5cf1af1118b5fd
-
Filesize
6KB
MD5bc7040fa7177ec09ef4b920098c69140
SHA15e119311b5eb809612e7f32ce20242a976e6f988
SHA2562e1bb9c9e576c54aaef64f02b34460805aff1f9f2ad18228d8160889f1502266
SHA5121ded3a98b51af7b618d50bdcf9ac129e99ce8cfc60984ae6a8b0bf390d5547bb8df6bc6ab84ee0f67904ac20f95805da9f862f13e2c3b55e7e9288276fc0cd72
-
Filesize
87KB
MD586d252e97010022f789e56026c33bd1f
SHA18b761bd7d6e4e750287eeec48ca2843b31f4e914
SHA2566bd00d7038237789b3522aa6f23aacf7be93e7695fe45c9ab7de9dae9689b5ad
SHA512c0fcc12f7c098ff600a2cab9f0fd44ce71b89c64b3a08a6c61e2310ba7f92a6fa12ed99a5fba017ca6970f90ed71a7ab8a94f9af7a4fe5ac2256a8b9cb06a590
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd