Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2023, 20:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://p.rfihub.com
Resource
win10v2004-20230703-en
General
-
Target
https://p.rfihub.com
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133378135146147472" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1528 chrome.exe 1528 chrome.exe 3936 chrome.exe 3936 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1528 wrote to memory of 3896 1528 chrome.exe 76 PID 1528 wrote to memory of 3896 1528 chrome.exe 76 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 4600 1528 chrome.exe 82 PID 1528 wrote to memory of 3164 1528 chrome.exe 83 PID 1528 wrote to memory of 3164 1528 chrome.exe 83 PID 1528 wrote to memory of 5108 1528 chrome.exe 84 PID 1528 wrote to memory of 5108 1528 chrome.exe 84 PID 1528 wrote to memory of 5108 1528 chrome.exe 84 PID 1528 wrote to memory of 5108 1528 chrome.exe 84 PID 1528 wrote to memory of 5108 1528 chrome.exe 84 PID 1528 wrote to memory of 5108 1528 chrome.exe 84 PID 1528 wrote to memory of 5108 1528 chrome.exe 84 PID 1528 wrote to memory of 5108 1528 chrome.exe 84 PID 1528 wrote to memory of 5108 1528 chrome.exe 84 PID 1528 wrote to memory of 5108 1528 chrome.exe 84 PID 1528 wrote to memory of 5108 1528 chrome.exe 84 PID 1528 wrote to memory of 5108 1528 chrome.exe 84 PID 1528 wrote to memory of 5108 1528 chrome.exe 84 PID 1528 wrote to memory of 5108 1528 chrome.exe 84 PID 1528 wrote to memory of 5108 1528 chrome.exe 84 PID 1528 wrote to memory of 5108 1528 chrome.exe 84 PID 1528 wrote to memory of 5108 1528 chrome.exe 84 PID 1528 wrote to memory of 5108 1528 chrome.exe 84 PID 1528 wrote to memory of 5108 1528 chrome.exe 84 PID 1528 wrote to memory of 5108 1528 chrome.exe 84 PID 1528 wrote to memory of 5108 1528 chrome.exe 84 PID 1528 wrote to memory of 5108 1528 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://p.rfihub.com1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff03de9758,0x7fff03de9768,0x7fff03de97782⤵PID:3896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1884,i,7634585252813854221,13599677725735777316,131072 /prefetch:22⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1884,i,7634585252813854221,13599677725735777316,131072 /prefetch:82⤵PID:3164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1884,i,7634585252813854221,13599677725735777316,131072 /prefetch:82⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3032 --field-trial-handle=1884,i,7634585252813854221,13599677725735777316,131072 /prefetch:12⤵PID:452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2984 --field-trial-handle=1884,i,7634585252813854221,13599677725735777316,131072 /prefetch:12⤵PID:1448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 --field-trial-handle=1884,i,7634585252813854221,13599677725735777316,131072 /prefetch:82⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 --field-trial-handle=1884,i,7634585252813854221,13599677725735777316,131072 /prefetch:82⤵PID:1792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5136 --field-trial-handle=1884,i,7634585252813854221,13599677725735777316,131072 /prefetch:12⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5468 --field-trial-handle=1884,i,7634585252813854221,13599677725735777316,131072 /prefetch:12⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5176 --field-trial-handle=1884,i,7634585252813854221,13599677725735777316,131072 /prefetch:12⤵PID:3200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2708 --field-trial-handle=1884,i,7634585252813854221,13599677725735777316,131072 /prefetch:12⤵PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=212 --field-trial-handle=1884,i,7634585252813854221,13599677725735777316,131072 /prefetch:12⤵PID:1148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1616 --field-trial-handle=1884,i,7634585252813854221,13599677725735777316,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2384
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5b7eb5e3e58e2e792700e82ac8e1fa1dc
SHA18082551c4c4e2557f4bec7179984e8106e721a19
SHA256ccbee95f92b66c0c05641b15a48b0ae47032df06e24f882a44ab7f996e7f6906
SHA512230788c920455652bd46e7786316a3517c9250c7402e45dc316276de8f8c9e73dcdf5f82a2d71f17011580b61c9a3ec6f38c727c1a354b0602eefa0e73088bc7
-
Filesize
6KB
MD53ef293f860cfcbe4c8e5415567ea36c7
SHA1f1c2926caa1c1456cd64264eea339a662766cb0e
SHA2566a4a77fa8d10ecdaa9cec53c1658e3cd371d152091d42e71c3fff2b7cbfb26b9
SHA512937eafafe3e34a950e7c41dcbe2ef79b05ba053e13f7b7c2d896ff65a78d9480abe69c8e5f3ecee67971f3b98ef4e14d3f042a333118c714f22f3089fd6e7241
-
Filesize
6KB
MD55aac274208e85f12ca16c50c26e18ba9
SHA1e2b643334eebfcdcead42257ea480df18c35d4d6
SHA256b62dc220019b313c9bea55290749ab7762ebb41a3a5b51e225834b5252b8c47f
SHA512584c36b0ef185f10f4a79cc4a155eea6dbde3d75f77a2d0eed553143798a02b0c610a7b987e8ae6c9ee4f372bc13dc2ea91fcc0cbda0a3a128a9b85ea18e93e3
-
Filesize
87KB
MD57a7f6f8e00c77bf50c67bfe4cd5bb233
SHA1873f8ed2c254fccad72a83f06705e5452a2aed53
SHA256f33034f6543640a45af4a0f8593ee53f904ebac4716018a63be17a25ff394e59
SHA512b1f2a8954ce0db0e0713c784a79f71ed60482970b9c69d4437c20cd834e99deadce1009458fcec1d736c4ff8cde7b96a878db001e0a3ebaeffd124cac204f099
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd