Analysis
-
max time kernel
600s -
max time network
488s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2023 19:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://jesttransport.com
Resource
win10v2004-20230703-en
General
-
Target
http://jesttransport.com
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133372939070063068" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5072 chrome.exe 5072 chrome.exe 2932 chrome.exe 2932 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5072 wrote to memory of 2844 5072 chrome.exe 43 PID 5072 wrote to memory of 2844 5072 chrome.exe 43 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3472 5072 chrome.exe 85 PID 5072 wrote to memory of 3660 5072 chrome.exe 86 PID 5072 wrote to memory of 3660 5072 chrome.exe 86 PID 5072 wrote to memory of 1228 5072 chrome.exe 89 PID 5072 wrote to memory of 1228 5072 chrome.exe 89 PID 5072 wrote to memory of 1228 5072 chrome.exe 89 PID 5072 wrote to memory of 1228 5072 chrome.exe 89 PID 5072 wrote to memory of 1228 5072 chrome.exe 89 PID 5072 wrote to memory of 1228 5072 chrome.exe 89 PID 5072 wrote to memory of 1228 5072 chrome.exe 89 PID 5072 wrote to memory of 1228 5072 chrome.exe 89 PID 5072 wrote to memory of 1228 5072 chrome.exe 89 PID 5072 wrote to memory of 1228 5072 chrome.exe 89 PID 5072 wrote to memory of 1228 5072 chrome.exe 89 PID 5072 wrote to memory of 1228 5072 chrome.exe 89 PID 5072 wrote to memory of 1228 5072 chrome.exe 89 PID 5072 wrote to memory of 1228 5072 chrome.exe 89 PID 5072 wrote to memory of 1228 5072 chrome.exe 89 PID 5072 wrote to memory of 1228 5072 chrome.exe 89 PID 5072 wrote to memory of 1228 5072 chrome.exe 89 PID 5072 wrote to memory of 1228 5072 chrome.exe 89 PID 5072 wrote to memory of 1228 5072 chrome.exe 89 PID 5072 wrote to memory of 1228 5072 chrome.exe 89 PID 5072 wrote to memory of 1228 5072 chrome.exe 89 PID 5072 wrote to memory of 1228 5072 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://jesttransport.com1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe57ad9758,0x7ffe57ad9768,0x7ffe57ad97782⤵PID:2844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1836,i,1864889842233898919,1246585913672270488,131072 /prefetch:22⤵PID:3472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1836,i,1864889842233898919,1246585913672270488,131072 /prefetch:82⤵PID:3660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2764 --field-trial-handle=1836,i,1864889842233898919,1246585913672270488,131072 /prefetch:12⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2780 --field-trial-handle=1836,i,1864889842233898919,1246585913672270488,131072 /prefetch:12⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 --field-trial-handle=1836,i,1864889842233898919,1246585913672270488,131072 /prefetch:82⤵PID:1228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4632 --field-trial-handle=1836,i,1864889842233898919,1246585913672270488,131072 /prefetch:12⤵PID:3624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 --field-trial-handle=1836,i,1864889842233898919,1246585913672270488,131072 /prefetch:82⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 --field-trial-handle=1836,i,1864889842233898919,1246585913672270488,131072 /prefetch:82⤵PID:4036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5168 --field-trial-handle=1836,i,1864889842233898919,1246585913672270488,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2932
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1056
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5c01024e3b9bdbd9996dbb2da8ce5b587
SHA1bbcd51db18b208fd92994ede37ca7d5f94d22271
SHA2563940cf1b116e895f92d849d13d094965bb90f55e7b83c8333822d5c921b24629
SHA512f90ba26929b14e7959a9cdd9b1db17be099042d9ccbde0e4aa5669ea7ad917fb20ff29d30b36476277bc8d51ed86edb50879ec7c9d621b7c381d1bf4ea2bd620
-
Filesize
1KB
MD53ac6a20093ed78cf55a5fdede151fd31
SHA163f00e4ddcd9bdb9fb14034ae77ec3c687440c71
SHA256a51d9188ab45ead50e351e6e60fe07455e169dd2bff59b3dbf0f9a5e7648f18a
SHA512124d0744f89563130b8d957f3bbc78b631a57876eb267e7d60dbb5d5912b43d6279acf49f1a2e671779035e4b9d4da6cb3016f863582bf7c844aba158f62792d
-
Filesize
539B
MD5110b356247c489e2c4a49b1214b23c25
SHA18be60c459a18aa1e31e5bed54077b8e5d9c41c53
SHA256e9beb24b79201d16f3f3caefaff0364021ec5ed329956507e414d52188be9d46
SHA51259f6d87526d5bd158067b5090fd8034d185a273fe9f46a2d4ca79e500063a74d4bafa506e410099bb3744864cf12b69e40579cf3221076a1bcba0621ef75ab30
-
Filesize
6KB
MD52766ee15b4c94843ab9087eb59fd7b41
SHA107995396d3f44dd9fa9b8f215a82f55650655309
SHA256c3c9026f2a2640eff817d002583f5b029acbb2b0e93eedcb8a49917a0d6c6e5d
SHA512222f0ef7606140f98645ae481d59cd5c812208cb96b07145ddb7c6bb4ddcf4285e598938b86aadb7134f7b2e9d17dfe0c474f791fea67e6aa3a1b0c5c722ab5b
-
Filesize
87KB
MD5061b974f0b38b13783f707113f04e2c8
SHA11e3d5b5f50582c5bba10333763708e7bca2c7206
SHA256d9aa11336505b3b84c631284b6c415bacbd5e43ae3cc0e27e4e5a0ee4144e1f2
SHA5127ce0fd693330fb3d214b574c2c97425cb0d5bc777abe437cf363910da632d2c1543fabc6caeb5cab991ecdc804a96e14e8c16a52850a43a0630f020d0001d0d4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd