Analysis
-
max time kernel
600s -
max time network
594s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2023, 00:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://returnmyatogov-lodge.info
Resource
win10v2004-20230703-en
General
-
Target
https://returnmyatogov-lodge.info
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133379145289081451" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4700 chrome.exe 4700 chrome.exe 540 chrome.exe 540 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4700 chrome.exe 4700 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4700 wrote to memory of 3364 4700 chrome.exe 81 PID 4700 wrote to memory of 3364 4700 chrome.exe 81 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 2536 4700 chrome.exe 83 PID 4700 wrote to memory of 660 4700 chrome.exe 84 PID 4700 wrote to memory of 660 4700 chrome.exe 84 PID 4700 wrote to memory of 2208 4700 chrome.exe 85 PID 4700 wrote to memory of 2208 4700 chrome.exe 85 PID 4700 wrote to memory of 2208 4700 chrome.exe 85 PID 4700 wrote to memory of 2208 4700 chrome.exe 85 PID 4700 wrote to memory of 2208 4700 chrome.exe 85 PID 4700 wrote to memory of 2208 4700 chrome.exe 85 PID 4700 wrote to memory of 2208 4700 chrome.exe 85 PID 4700 wrote to memory of 2208 4700 chrome.exe 85 PID 4700 wrote to memory of 2208 4700 chrome.exe 85 PID 4700 wrote to memory of 2208 4700 chrome.exe 85 PID 4700 wrote to memory of 2208 4700 chrome.exe 85 PID 4700 wrote to memory of 2208 4700 chrome.exe 85 PID 4700 wrote to memory of 2208 4700 chrome.exe 85 PID 4700 wrote to memory of 2208 4700 chrome.exe 85 PID 4700 wrote to memory of 2208 4700 chrome.exe 85 PID 4700 wrote to memory of 2208 4700 chrome.exe 85 PID 4700 wrote to memory of 2208 4700 chrome.exe 85 PID 4700 wrote to memory of 2208 4700 chrome.exe 85 PID 4700 wrote to memory of 2208 4700 chrome.exe 85 PID 4700 wrote to memory of 2208 4700 chrome.exe 85 PID 4700 wrote to memory of 2208 4700 chrome.exe 85 PID 4700 wrote to memory of 2208 4700 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://returnmyatogov-lodge.info1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc19759758,0x7ffc19759768,0x7ffc197597782⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1880,i,7963329052745124662,9667474652901272218,131072 /prefetch:22⤵PID:2536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1880,i,7963329052745124662,9667474652901272218,131072 /prefetch:82⤵PID:660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1880,i,7963329052745124662,9667474652901272218,131072 /prefetch:82⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3080 --field-trial-handle=1880,i,7963329052745124662,9667474652901272218,131072 /prefetch:12⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1880,i,7963329052745124662,9667474652901272218,131072 /prefetch:12⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5060 --field-trial-handle=1880,i,7963329052745124662,9667474652901272218,131072 /prefetch:82⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 --field-trial-handle=1880,i,7963329052745124662,9667474652901272218,131072 /prefetch:82⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1588 --field-trial-handle=1880,i,7963329052745124662,9667474652901272218,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:540
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5c3353f0917b546670215abab15842f8d
SHA1c8ad3a9049a0be31bbfc49d3c3c1230fad0950e1
SHA2569abb429c1839b7c3cf99939f15d3d0ce14e76778654bacab8d31291e402d6a39
SHA512c4c2ac320a904716460bcbdc0374bd93d2ebf59b7fcfae67021f5e5e383f454ad2260dbc4e27c707e4dfe61f8cf61af8161fb76a22e56a22a6752436062c2116
-
Filesize
2KB
MD5c27dd2e7198602b86372e5765c9214b5
SHA1ace2411035a95959ced99055223a471ef04bf9fa
SHA256d5a4e854aca5e8c05fa0c221502d84ecefd2db77812c728d8f9457414b6374e5
SHA5127d0422a8918747e970a0574b5ce920229c050cf2d74adf1cf6e57bda31c8aabdb9f91086f304ce13d85dfbf5c0817be0d8091c76a9e8915b8399c3af0b574805
-
Filesize
2KB
MD5f848f5df7314d918fc748a7a56ed1142
SHA1b9d0c5d75b1904ac503998a0382c18ca1203c4be
SHA2562627b98fe82ee67f1dea44e872cfabbc044596c04213584f2a538e3ffd613fce
SHA51209399c36abcc800c47e270a4700686303588380eecdc109d536492841b2f7084df3995ce8944fa607d0db9eee6cc3b03b4b2d6fb0306d99de97ed46c15496c9c
-
Filesize
873B
MD52d722032737845f64630dbe26f030634
SHA16ce4c0b684fb570cc05ae9a53b7119a310cf883f
SHA2566adef89f64e9c8c72bfbf7d6c1af7201c4b8f52e0191cdebc51d4ff9631ee64f
SHA512eeba882b14d6801edb18e4a3f3fc60c04a3ad841f1bbd2026d3edc542ef2c823961cd45f9bc3b320a3d0ec11b88d1feedcc7af01269c3b5bb7f96c4e08f958fd
-
Filesize
6KB
MD508ad58a9233d7e9070b778280e5f2eb5
SHA12dbbd9cf35376d4e181a66f8ec55e299664abf80
SHA256d257784185d910fea8ae8f41a5c33fee33597aa266bd1c6c0e115186c4cef08e
SHA512902e36b87a981a028832882ccbc656cb9e0f3d579bdf09babb3bdc1e5c3b28036a8fe3640eb50fee42d577ff38b581261c47f72373897610b1ae5d87276cbfb5
-
Filesize
6KB
MD5d8635575221477b03330f634bb095d72
SHA175280de1bdabda674339445b0ed6435df154cf93
SHA256047deef679d674bbd35df25993678bb149ec472e33db2ac8fb85a8f01893ae49
SHA5128ae85f83d4174464a9876e26260d2de62e6c8bdeb9e132ab5d944273365d4c2d7133253254da91a59c0e865453ecc8d2aa1546b2280210f5de3c270e5196ce05
-
Filesize
6KB
MD52b944194381de6a9af8defcd20053e2d
SHA1e3f76c139f15e6d5058cda70039152f46276956b
SHA2560d7b8304a6de39b52f09a2f23eb6025e7339bbf3dc148746ee7d5ecebf1f7c62
SHA512c89ca1f11fbdee6964a781a62fcc29b3a2b1358cae3e90bd2ff0b9ebeda25e9d9ba37455c8aaa5a553a99d0956a1c89e34465a9cc6228615f3cf9065f720352d
-
Filesize
87KB
MD586a1fc6c4ba017bb74bbf96c80bc25d9
SHA1bfa5769ed970f3dab58373afa8127825a4872804
SHA2568971348c764af09dbe93b321c88d265c6b4ee12a358352d8c7f43583b3bbfffc
SHA51264289185f946eb9a7b0acbdc106d2b54df8d95fb8ff88fa9b8913a8c52ed006576c7c5220c5658a9745076da78d0a87dd88227284e78871ffee52d7ebb3664d5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd