Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2023, 04:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://secureato.top/MyGov/
Resource
win10v2004-20230703-en
General
-
Target
https://secureato.top/MyGov/
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133368073620433090" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2824 chrome.exe 2824 chrome.exe 5092 chrome.exe 5092 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe Token: SeShutdownPrivilege 2824 chrome.exe Token: SeCreatePagefilePrivilege 2824 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe 2824 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2140 2824 chrome.exe 80 PID 2824 wrote to memory of 2140 2824 chrome.exe 80 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3192 2824 chrome.exe 82 PID 2824 wrote to memory of 3128 2824 chrome.exe 83 PID 2824 wrote to memory of 3128 2824 chrome.exe 83 PID 2824 wrote to memory of 3684 2824 chrome.exe 84 PID 2824 wrote to memory of 3684 2824 chrome.exe 84 PID 2824 wrote to memory of 3684 2824 chrome.exe 84 PID 2824 wrote to memory of 3684 2824 chrome.exe 84 PID 2824 wrote to memory of 3684 2824 chrome.exe 84 PID 2824 wrote to memory of 3684 2824 chrome.exe 84 PID 2824 wrote to memory of 3684 2824 chrome.exe 84 PID 2824 wrote to memory of 3684 2824 chrome.exe 84 PID 2824 wrote to memory of 3684 2824 chrome.exe 84 PID 2824 wrote to memory of 3684 2824 chrome.exe 84 PID 2824 wrote to memory of 3684 2824 chrome.exe 84 PID 2824 wrote to memory of 3684 2824 chrome.exe 84 PID 2824 wrote to memory of 3684 2824 chrome.exe 84 PID 2824 wrote to memory of 3684 2824 chrome.exe 84 PID 2824 wrote to memory of 3684 2824 chrome.exe 84 PID 2824 wrote to memory of 3684 2824 chrome.exe 84 PID 2824 wrote to memory of 3684 2824 chrome.exe 84 PID 2824 wrote to memory of 3684 2824 chrome.exe 84 PID 2824 wrote to memory of 3684 2824 chrome.exe 84 PID 2824 wrote to memory of 3684 2824 chrome.exe 84 PID 2824 wrote to memory of 3684 2824 chrome.exe 84 PID 2824 wrote to memory of 3684 2824 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://secureato.top/MyGov/1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8158d9758,0x7ff8158d9768,0x7ff8158d97782⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1864,i,6615213642838299029,8541423165185240125,131072 /prefetch:22⤵PID:3192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1864,i,6615213642838299029,8541423165185240125,131072 /prefetch:82⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1864,i,6615213642838299029,8541423165185240125,131072 /prefetch:82⤵PID:3684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3092 --field-trial-handle=1864,i,6615213642838299029,8541423165185240125,131072 /prefetch:12⤵PID:4396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3124 --field-trial-handle=1864,i,6615213642838299029,8541423165185240125,131072 /prefetch:12⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4568 --field-trial-handle=1864,i,6615213642838299029,8541423165185240125,131072 /prefetch:12⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4876 --field-trial-handle=1864,i,6615213642838299029,8541423165185240125,131072 /prefetch:12⤵PID:1320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3832 --field-trial-handle=1864,i,6615213642838299029,8541423165185240125,131072 /prefetch:12⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 --field-trial-handle=1864,i,6615213642838299029,8541423165185240125,131072 /prefetch:82⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 --field-trial-handle=1864,i,6615213642838299029,8541423165185240125,131072 /prefetch:82⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5336 --field-trial-handle=1864,i,6615213642838299029,8541423165185240125,131072 /prefetch:12⤵PID:3896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4900 --field-trial-handle=1864,i,6615213642838299029,8541423165185240125,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4924
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5ee6442278923ca9b84a5f095b36a924b
SHA11ad6dff19b3273ac53b920bd56195277827aac32
SHA25670f9f10ce847b1661e6c6c5caff1e56460d1cabc036d1e7f9c2871cda23d6d9e
SHA512d22391b1e1a6bd9830843a783f37a5c7a159f8f806b4466d4da3d9906735a6c5700532cf74e55bca61c1e901bdf2889f0ad8fd9325cfa3b18e1661b98061fe14
-
Filesize
1KB
MD5a4f1b1f0e542949466248cd5fd448f90
SHA188764db8f945950ca1a28d9046d712597e9736a4
SHA25638d763aa1667b60a4f60b46c2e951cd9587de5914a2029823b93201f812a0c6b
SHA5122c27653e223f7842d316b1b3677fc631d634676052c14bad6cc1be5d5033dffeb7bdfc377af05b4d2bc00ca7fd424060ac8f613aec8f843716517132fba0667c
-
Filesize
539B
MD5f586298f5bb5863c6ed5445a4c8abbb5
SHA172f182f1feda916f19264d2520c3f615ac1fa623
SHA256ff7c94c4e0c94264b025136eb3a24ce65cbd13040d29754273f2c5152b80eb43
SHA5122ff56f4f44bf94409f42b6966997734692670b2b4bab4559002c145456b87f7b4d99060191bf13fa18f18530c82de385241386f04233c17495e7ab8f0bbe71b4
-
Filesize
6KB
MD5c3766eff9b512b7a170c304a807c0e4b
SHA119ab1a949f41e55bd1ae37a3de5aa10647b58baa
SHA2568df3c09759523bf7709ad694df19ff53e132665df86ffc271aa4effa3c4627ba
SHA5123a037c4af815e90c85caecb21a4f2e061f6cf6c2e3cbdc5ca23fd763b5e11602c4e6ae0484b7ae7daa03e9aa238481842d447f463b472c6ed7b353297c427f3b
-
Filesize
6KB
MD54ef09a6b6f9403125ae4f18b4addf4ff
SHA135e1faf89ccf813ea06db43caa6a85203842404c
SHA256f7f8edaae740cad1413e9b2a2e51cf84d6c34bfdbab5cf2035b1ac0628187834
SHA51204bb0db353ea61802b18d21874baeb67a2b704c3ff7f99e9bb77b8fae9f721c629712d87cbe999fcc465bd512e28fa87ada286dbdd28a7a48abc38b6c6c8a608
-
Filesize
6KB
MD59fd4c71c480eb0cedcf44f8f9cb7a627
SHA13eeddf08538a91c8796b8c7cf6e20ad187f8059d
SHA256c98b5438129f0f899df4b5e3114ff8c33ac37615a7f38b668650bf96e04219cc
SHA51253304e82fefa5ba908239a89f0cbf09cf0d78d587797c5030b48abc226f8b0ad9cd966367fa598dd8613b80462f4206dc479358c5eb200dd0adfb1e9fd88487f
-
Filesize
87KB
MD56ed10ca0f8181110f3bade410a34e771
SHA1c6273be4a708a9843f8d66cd3dde51584e800eb1
SHA25651f5c5606614ceb1e0233cfe7e7c4734a8acb9234271133a6348fb121f7c9c2a
SHA512d79de57509d2a45bd0231eef679f1c4ee8d280754424abd01f5c44c181834e0ab51b5f0fa166d20ef175eeb32e859862703925d034d0fa020faa3d2b2abd0b4b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd