Analysis
-
max time kernel
60s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2023, 03:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://url.avanan.click/v2/___https:/urldefense.com/v3/__https:/aus01.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Fwww.publications.qld.gov.au%2Fckan-publications-attachments-prod%2Fresources%2Fc03f3c80-d6d3-4381-99cb-8243c9780057%2F21_1300ft_assoc_incorp_f10a_v10_0821.pdf%3FETag%3D443563c456351988e58ac38c858f033d__%3B!!PUY2jUP3Fp7oEg!HYeP4SEkktwnU79K0gnEqW_WyhEG5Q6_vroLlk8hWC6PYSh69ZG3PBfR39OtSzOeAjfZjT3zRBaQQzCjKABt2MuymF7P6g%24&data=05%7C01%7Cregistration.services%40justice.qld.gov.au%7Cfe2cf4d6e42e419b0f2308daff1819a9%7C583ea622975d4befa1d0d1f9c139f8b3%7C0%7C0%7C638102777262780673%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=vFxJTLyUl7%2FppMWrE%2BfxFSWcItx4GngbWckBLw3CphI%3D&reserved=0
Resource
win10v2004-20230703-en
General
-
Target
https://url.avanan.click/v2/___https:/urldefense.com/v3/__https:/aus01.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Fwww.publications.qld.gov.au%2Fckan-publications-attachments-prod%2Fresources%2Fc03f3c80-d6d3-4381-99cb-8243c9780057%2F21_1300ft_assoc_incorp_f10a_v10_0821.pdf%3FETag%3D443563c456351988e58ac38c858f033d__%3B!!PUY2jUP3Fp7oEg!HYeP4SEkktwnU79K0gnEqW_WyhEG5Q6_vroLlk8hWC6PYSh69ZG3PBfR39OtSzOeAjfZjT3zRBaQQzCjKABt2MuymF7P6g%24&data=05%7C01%7Cregistration.services%40justice.qld.gov.au%7Cfe2cf4d6e42e419b0f2308daff1819a9%7C583ea622975d4befa1d0d1f9c139f8b3%7C0%7C0%7C638102777262780673%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=vFxJTLyUl7%2FppMWrE%2BfxFSWcItx4GngbWckBLw3CphI%3D&reserved=0
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133373226370848239" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4600 chrome.exe 4600 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4600 chrome.exe 4600 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4600 wrote to memory of 3396 4600 chrome.exe 52 PID 4600 wrote to memory of 3396 4600 chrome.exe 52 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1140 4600 chrome.exe 83 PID 4600 wrote to memory of 1360 4600 chrome.exe 85 PID 4600 wrote to memory of 1360 4600 chrome.exe 85 PID 4600 wrote to memory of 4528 4600 chrome.exe 84 PID 4600 wrote to memory of 4528 4600 chrome.exe 84 PID 4600 wrote to memory of 4528 4600 chrome.exe 84 PID 4600 wrote to memory of 4528 4600 chrome.exe 84 PID 4600 wrote to memory of 4528 4600 chrome.exe 84 PID 4600 wrote to memory of 4528 4600 chrome.exe 84 PID 4600 wrote to memory of 4528 4600 chrome.exe 84 PID 4600 wrote to memory of 4528 4600 chrome.exe 84 PID 4600 wrote to memory of 4528 4600 chrome.exe 84 PID 4600 wrote to memory of 4528 4600 chrome.exe 84 PID 4600 wrote to memory of 4528 4600 chrome.exe 84 PID 4600 wrote to memory of 4528 4600 chrome.exe 84 PID 4600 wrote to memory of 4528 4600 chrome.exe 84 PID 4600 wrote to memory of 4528 4600 chrome.exe 84 PID 4600 wrote to memory of 4528 4600 chrome.exe 84 PID 4600 wrote to memory of 4528 4600 chrome.exe 84 PID 4600 wrote to memory of 4528 4600 chrome.exe 84 PID 4600 wrote to memory of 4528 4600 chrome.exe 84 PID 4600 wrote to memory of 4528 4600 chrome.exe 84 PID 4600 wrote to memory of 4528 4600 chrome.exe 84 PID 4600 wrote to memory of 4528 4600 chrome.exe 84 PID 4600 wrote to memory of 4528 4600 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://url.avanan.click/v2/___https:/urldefense.com/v3/__https:/aus01.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Fwww.publications.qld.gov.au%2Fckan-publications-attachments-prod%2Fresources%2Fc03f3c80-d6d3-4381-99cb-8243c9780057%2F21_1300ft_assoc_incorp_f10a_v10_0821.pdf%3FETag%3D443563c456351988e58ac38c858f033d__%3B!!PUY2jUP3Fp7oEg!HYeP4SEkktwnU79K0gnEqW_WyhEG5Q6_vroLlk8hWC6PYSh69ZG3PBfR39OtSzOeAjfZjT3zRBaQQzCjKABt2MuymF7P6g%24&data=05%7C01%7Cregistration.services%40justice.qld.gov.au%7Cfe2cf4d6e42e419b0f2308daff1819a9%7C583ea622975d4befa1d0d1f9c139f8b3%7C0%7C0%7C638102777262780673%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=vFxJTLyUl7%2FppMWrE%2BfxFSWcItx4GngbWckBLw3CphI%3D&reserved=01⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb0fd99758,0x7ffb0fd99768,0x7ffb0fd997782⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1804,i,2046117153265601587,17347360353200644660,131072 /prefetch:22⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1804,i,2046117153265601587,17347360353200644660,131072 /prefetch:82⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1804,i,2046117153265601587,17347360353200644660,131072 /prefetch:82⤵PID:1360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2996 --field-trial-handle=1804,i,2046117153265601587,17347360353200644660,131072 /prefetch:12⤵PID:4604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=1804,i,2046117153265601587,17347360353200644660,131072 /prefetch:12⤵PID:3976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 --field-trial-handle=1804,i,2046117153265601587,17347360353200644660,131072 /prefetch:82⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 --field-trial-handle=1804,i,2046117153265601587,17347360353200644660,131072 /prefetch:82⤵PID:4732
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1772
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
535B
MD5aa45094ecc136aa36e3daa3e68103beb
SHA121596f9c363719a4a7f172a82ea349388b4d3b86
SHA256af333ca9e56c5f4e078979f8ef058777bfefe56b67d2fa2d890a211ddda94964
SHA5122a2aa2b4a46174e2c1060f4b118f4cc4f059e474688f35c02050445747e9fd7f34e10be117334e2a2f2d3ee4f955532b55a72a1008ca1ee843097e3f532cca5d
-
Filesize
6KB
MD5b767bea9ef62357bb74a349c0371e7be
SHA11a144598b61351c6f6d132495f6a56c4cf4d517b
SHA256cb2a80a1ea3e290f0ccf725c29a66dfdd60c8da12202b8ed1e857e5b7592259b
SHA51234cc8bc7b972af7f8f58b7467915dbba24812c38a58ac94327b07ddb03690f930ab49df657b25b62e0859a776c8fb32363b859776e85997cc47e0b49655e0fc1
-
Filesize
87KB
MD5fba47e387c7fc15f4939c52216999048
SHA1dc3af92fc8e5fb0f20971b139ab9b4722e005751
SHA25629886970024bad3f943fb7f4823eb2c6f1c27f62addc8ce6026351baa9596bb5
SHA512a7eb3af5ac6ad611566592940667fed574cc12ad0a0bfa9c837116c99f6edf2bdf71be71b43e7851357f34c7bdaf3ea4b91e90216df7bb2b76ab55abfcbbdea8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd