Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2023, 08:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://url27.ctaima.com/wf/open?upn=XjfUWe2VwDCl5QacmVDH3gmMN2-2FvqQpbopHR-2FRbXr4lBn1aukJ2T-2FaNIblsVovdiQ1uCr0A5Hfy-2Br-2F8HPdLrJez5QnxarKzW6OF1jSjFzkTdTLnV2B-2Faz37mLB4RJOL7YAzogCOkd0CK87cxRxQYBHhm-2F74SGqC1OUsVPXznYoP-2B129oqtY1US2p1wPAAYF895OqFxqwlTdXu78SgEZbiSDzjF-2FdzFNaUvcnj0Wua-2F6f6KZr6mjPxI3ERAMjrKI5QsQ-2BHZCquhjBXV0tITpyhB1yABzBadgiqqv9na8mNeYVnffn7lrK6-2FFjziYWk1x3rRJDZ3yKtgeLo9INIpxtD-2FISN-2BAyzoGDCA3s0DJzVoU5OAKOLQylBdwnGj9HOo074vrOasGR22L0g-2FWby1yA3vGLWjNZCJySONP-2FlhvUYAA-3D
Resource
win10v2004-20230703-en
General
-
Target
http://url27.ctaima.com/wf/open?upn=XjfUWe2VwDCl5QacmVDH3gmMN2-2FvqQpbopHR-2FRbXr4lBn1aukJ2T-2FaNIblsVovdiQ1uCr0A5Hfy-2Br-2F8HPdLrJez5QnxarKzW6OF1jSjFzkTdTLnV2B-2Faz37mLB4RJOL7YAzogCOkd0CK87cxRxQYBHhm-2F74SGqC1OUsVPXznYoP-2B129oqtY1US2p1wPAAYF895OqFxqwlTdXu78SgEZbiSDzjF-2FdzFNaUvcnj0Wua-2F6f6KZr6mjPxI3ERAMjrKI5QsQ-2BHZCquhjBXV0tITpyhB1yABzBadgiqqv9na8mNeYVnffn7lrK6-2FFjziYWk1x3rRJDZ3yKtgeLo9INIpxtD-2FISN-2BAyzoGDCA3s0DJzVoU5OAKOLQylBdwnGj9HOo074vrOasGR22L0g-2FWby1yA3vGLWjNZCJySONP-2FlhvUYAA-3D
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133359566333413582" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1044 chrome.exe 1044 chrome.exe 4472 chrome.exe 4472 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1044 chrome.exe 1044 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe Token: SeShutdownPrivilege 1044 chrome.exe Token: SeCreatePagefilePrivilege 1044 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe 1044 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2880 1044 chrome.exe 67 PID 1044 wrote to memory of 2880 1044 chrome.exe 67 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 3608 1044 chrome.exe 83 PID 1044 wrote to memory of 4936 1044 chrome.exe 85 PID 1044 wrote to memory of 4936 1044 chrome.exe 85 PID 1044 wrote to memory of 2392 1044 chrome.exe 84 PID 1044 wrote to memory of 2392 1044 chrome.exe 84 PID 1044 wrote to memory of 2392 1044 chrome.exe 84 PID 1044 wrote to memory of 2392 1044 chrome.exe 84 PID 1044 wrote to memory of 2392 1044 chrome.exe 84 PID 1044 wrote to memory of 2392 1044 chrome.exe 84 PID 1044 wrote to memory of 2392 1044 chrome.exe 84 PID 1044 wrote to memory of 2392 1044 chrome.exe 84 PID 1044 wrote to memory of 2392 1044 chrome.exe 84 PID 1044 wrote to memory of 2392 1044 chrome.exe 84 PID 1044 wrote to memory of 2392 1044 chrome.exe 84 PID 1044 wrote to memory of 2392 1044 chrome.exe 84 PID 1044 wrote to memory of 2392 1044 chrome.exe 84 PID 1044 wrote to memory of 2392 1044 chrome.exe 84 PID 1044 wrote to memory of 2392 1044 chrome.exe 84 PID 1044 wrote to memory of 2392 1044 chrome.exe 84 PID 1044 wrote to memory of 2392 1044 chrome.exe 84 PID 1044 wrote to memory of 2392 1044 chrome.exe 84 PID 1044 wrote to memory of 2392 1044 chrome.exe 84 PID 1044 wrote to memory of 2392 1044 chrome.exe 84 PID 1044 wrote to memory of 2392 1044 chrome.exe 84 PID 1044 wrote to memory of 2392 1044 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://url27.ctaima.com/wf/open?upn=XjfUWe2VwDCl5QacmVDH3gmMN2-2FvqQpbopHR-2FRbXr4lBn1aukJ2T-2FaNIblsVovdiQ1uCr0A5Hfy-2Br-2F8HPdLrJez5QnxarKzW6OF1jSjFzkTdTLnV2B-2Faz37mLB4RJOL7YAzogCOkd0CK87cxRxQYBHhm-2F74SGqC1OUsVPXznYoP-2B129oqtY1US2p1wPAAYF895OqFxqwlTdXu78SgEZbiSDzjF-2FdzFNaUvcnj0Wua-2F6f6KZr6mjPxI3ERAMjrKI5QsQ-2BHZCquhjBXV0tITpyhB1yABzBadgiqqv9na8mNeYVnffn7lrK6-2FFjziYWk1x3rRJDZ3yKtgeLo9INIpxtD-2FISN-2BAyzoGDCA3s0DJzVoU5OAKOLQylBdwnGj9HOo074vrOasGR22L0g-2FWby1yA3vGLWjNZCJySONP-2FlhvUYAA-3D1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd61e09758,0x7ffd61e09768,0x7ffd61e097782⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1876,i,1940142665331747122,12948284027956451071,131072 /prefetch:22⤵PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1876,i,1940142665331747122,12948284027956451071,131072 /prefetch:82⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1876,i,1940142665331747122,12948284027956451071,131072 /prefetch:82⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2796 --field-trial-handle=1876,i,1940142665331747122,12948284027956451071,131072 /prefetch:12⤵PID:4328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2788 --field-trial-handle=1876,i,1940142665331747122,12948284027956451071,131072 /prefetch:12⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=1876,i,1940142665331747122,12948284027956451071,131072 /prefetch:82⤵PID:456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 --field-trial-handle=1876,i,1940142665331747122,12948284027956451071,131072 /prefetch:82⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 --field-trial-handle=1876,i,1940142665331747122,12948284027956451071,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4472
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4956
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824B
MD5eb2892d534bf2a31a4e451e18c9f03e5
SHA15a94f9a9ac8f39d19fa25a7f1d55a5739aa934e1
SHA2562f9ca95e16267e49460d1748a8c9bc3726f578e16bedd9cb89b81970430f095b
SHA5124f48af4bdf441cf70715a4b87abf6da73607bb87f00f63e4d9a2de4101d4755fda2a53973bb5c2627ebe2277431ca74b9810b7c05ca0f38996a3b638a31f3323
-
Filesize
6KB
MD5d7a7fc208364a58ca6d6d1b9e92b2b17
SHA1b96a831d83e329dae9f307b9aeb45384b43c70b0
SHA2569e4ad718018f781db67d5677b43dbc275345c024a293213a0be0c4d362dd054c
SHA512e9ab67241cc56a17335fbafb4076e1318c35bca35893d438b076dc636b74ee143f2abec89b4a90b083334a6233d80350a3c142e7c309a69f5ec3e8c210f21bf6
-
Filesize
87KB
MD51a120a6397ef9dc6c3cc83760594fe2a
SHA128109eda1fd1ddc25dea5dd4a143fe163d031741
SHA256c600e8ed6b1bee8cc523ee28ffbf8323d748be0a627a1023d4d16182697a42d4
SHA51279da878a17152dde0547cd50232ca11805c66fd1e7f5405a3b8d839c442e4eec8e6bfd7d3df13e3eb127ff1b29c59f50dce13f8f214e9d7bca9b545f9b1cdcd6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd