Analysis
-
max time kernel
600s -
max time network
489s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
30/08/2023, 10:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://saudileaks.org/
Resource
win10-20230703-en
Behavioral task
behavioral2
Sample
https://saudileaks.org/
Resource
win10v2004-20230703-en
General
-
Target
https://saudileaks.org/
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133378662873440878" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 448 chrome.exe 448 chrome.exe 3276 chrome.exe 3276 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 448 chrome.exe 448 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 448 wrote to memory of 3896 448 chrome.exe 81 PID 448 wrote to memory of 3896 448 chrome.exe 81 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 1988 448 chrome.exe 83 PID 448 wrote to memory of 3300 448 chrome.exe 84 PID 448 wrote to memory of 3300 448 chrome.exe 84 PID 448 wrote to memory of 3640 448 chrome.exe 88 PID 448 wrote to memory of 3640 448 chrome.exe 88 PID 448 wrote to memory of 3640 448 chrome.exe 88 PID 448 wrote to memory of 3640 448 chrome.exe 88 PID 448 wrote to memory of 3640 448 chrome.exe 88 PID 448 wrote to memory of 3640 448 chrome.exe 88 PID 448 wrote to memory of 3640 448 chrome.exe 88 PID 448 wrote to memory of 3640 448 chrome.exe 88 PID 448 wrote to memory of 3640 448 chrome.exe 88 PID 448 wrote to memory of 3640 448 chrome.exe 88 PID 448 wrote to memory of 3640 448 chrome.exe 88 PID 448 wrote to memory of 3640 448 chrome.exe 88 PID 448 wrote to memory of 3640 448 chrome.exe 88 PID 448 wrote to memory of 3640 448 chrome.exe 88 PID 448 wrote to memory of 3640 448 chrome.exe 88 PID 448 wrote to memory of 3640 448 chrome.exe 88 PID 448 wrote to memory of 3640 448 chrome.exe 88 PID 448 wrote to memory of 3640 448 chrome.exe 88 PID 448 wrote to memory of 3640 448 chrome.exe 88 PID 448 wrote to memory of 3640 448 chrome.exe 88 PID 448 wrote to memory of 3640 448 chrome.exe 88 PID 448 wrote to memory of 3640 448 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://saudileaks.org/1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd4e7d9758,0x7ffd4e7d9768,0x7ffd4e7d97782⤵PID:3896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1820,i,13398317757192408303,12698033726702280507,131072 /prefetch:22⤵PID:1988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1820,i,13398317757192408303,12698033726702280507,131072 /prefetch:82⤵PID:3300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2972 --field-trial-handle=1820,i,13398317757192408303,12698033726702280507,131072 /prefetch:12⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1820,i,13398317757192408303,12698033726702280507,131072 /prefetch:12⤵PID:400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1820,i,13398317757192408303,12698033726702280507,131072 /prefetch:82⤵PID:3640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4708 --field-trial-handle=1820,i,13398317757192408303,12698033726702280507,131072 /prefetch:82⤵PID:1104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 --field-trial-handle=1820,i,13398317757192408303,12698033726702280507,131072 /prefetch:82⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2392 --field-trial-handle=1820,i,13398317757192408303,12698033726702280507,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3276
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1668
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD53b488ce2a6cee49f0e51ecb74c515610
SHA15aa1e7a975bd7eca077752d3ed9256941820a180
SHA256ac996b8781ee079fc1f5725cd4b1de2ab251e6a2e18dd2db30e9803ae8ea8db6
SHA5124776ffce7327e199e32afc23291c815f1d47e4552d0904f498a307a796f3e711c34e9d3b52294239e0fdcd1dba41399cadfcb7de2fd00c99462e8da150162ff6
-
Filesize
1KB
MD5390e9d781db40c7171cd5a47963d992a
SHA138e1d28a0283edc19377297e5b26572c3110c81f
SHA2562e500865aac15553f9b8635f2e41e39b6b52aef1a8550a9d9232dd8f4f59047f
SHA512feea725044601be08be5f7bc0107880738acb783ece897d1e90102ae96b6ca503f301d12a03ef807b19b69f37c0045c08bdd16708516211c64d93988cbb06853
-
Filesize
1KB
MD54dfd1419f84b8e50c3e2806c8a26b471
SHA1e5b0932f65ee7db0e188099ba7a462e9f9844fe8
SHA2564752bd4d0ccb6b28b324205c38a4261defd4e4889c5e3aafd4102190759f9719
SHA5121ab8844d77d00126d06ebee49620af4fe35f02e0890a1e0c8ea76cf0d8a5f5b2570ab619fb88920614b1eef7d3a66c8ca7fdc2f3dc800e41c362de006c26e9bd
-
Filesize
539B
MD5febca11bc18fa8d775067a6b7ace887f
SHA108d793bf754d58b14f71b3402767a9798799616b
SHA256eee28a9f2cc3bb3f089868497ef0158ab2a1b916ac435bfeacddba6ee70cb8e4
SHA5126ab7ba5365e60ea511b424c616f047f353d7d026c4770a7a00f49ab20954d245c2e62b5dab5d3d983aa884db14fd66c1cc7ca99e24197b3d9aca1f6835576369
-
Filesize
6KB
MD545533de1e7d41de55ffa6ba1aa390c33
SHA109a1a1a58a6445f8822857bb5196d2c688900082
SHA25683d880ee5ee633741b2d851ca3d8bea01488d0225b4669fb8f7ad3c647f7cbeb
SHA51266856977583097aeb079300f21c793b7f5adbae8dc69b3fdfe5385a8190c9f7a12005ebe975d0973630e6cde2a4983bb16cbd468ef2e70022b8bbd5b2c41d76a
-
Filesize
87KB
MD59cd8d9fef332ef1e6f08703b45967553
SHA1c28be4a7b79d51908854f095321da48cb3ae8484
SHA2569470b1d78e8ef078d1e9cf4e3a6a669920d22abaefbdc13789b11793c5ff2fe7
SHA512e2cac0301410f40343e12fcb673c673133494b21e8b059981bc34251d7e479d3f621981c26a2cb1440055336778413a28d0b6fe43e7ed57e329c713e76ab9dee
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd