Analysis
-
max time kernel
43s -
max time network
26s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2023, 01:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://odaen.com/au
Resource
win10v2004-20230831-en
General
-
Target
https://odaen.com/au
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2212 chrome.exe 2212 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2340 2212 chrome.exe 82 PID 2212 wrote to memory of 2340 2212 chrome.exe 82 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 4796 2212 chrome.exe 85 PID 2212 wrote to memory of 2344 2212 chrome.exe 86 PID 2212 wrote to memory of 2344 2212 chrome.exe 86 PID 2212 wrote to memory of 2816 2212 chrome.exe 87 PID 2212 wrote to memory of 2816 2212 chrome.exe 87 PID 2212 wrote to memory of 2816 2212 chrome.exe 87 PID 2212 wrote to memory of 2816 2212 chrome.exe 87 PID 2212 wrote to memory of 2816 2212 chrome.exe 87 PID 2212 wrote to memory of 2816 2212 chrome.exe 87 PID 2212 wrote to memory of 2816 2212 chrome.exe 87 PID 2212 wrote to memory of 2816 2212 chrome.exe 87 PID 2212 wrote to memory of 2816 2212 chrome.exe 87 PID 2212 wrote to memory of 2816 2212 chrome.exe 87 PID 2212 wrote to memory of 2816 2212 chrome.exe 87 PID 2212 wrote to memory of 2816 2212 chrome.exe 87 PID 2212 wrote to memory of 2816 2212 chrome.exe 87 PID 2212 wrote to memory of 2816 2212 chrome.exe 87 PID 2212 wrote to memory of 2816 2212 chrome.exe 87 PID 2212 wrote to memory of 2816 2212 chrome.exe 87 PID 2212 wrote to memory of 2816 2212 chrome.exe 87 PID 2212 wrote to memory of 2816 2212 chrome.exe 87 PID 2212 wrote to memory of 2816 2212 chrome.exe 87 PID 2212 wrote to memory of 2816 2212 chrome.exe 87 PID 2212 wrote to memory of 2816 2212 chrome.exe 87 PID 2212 wrote to memory of 2816 2212 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://odaen.com/au1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x88,0x108,0x7ffd8b449758,0x7ffd8b449768,0x7ffd8b4497782⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 --field-trial-handle=1804,i,3755266100183678525,18213509277326933505,131072 /prefetch:22⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1804,i,3755266100183678525,18213509277326933505,131072 /prefetch:82⤵PID:2344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1804,i,3755266100183678525,18213509277326933505,131072 /prefetch:82⤵PID:2816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2928 --field-trial-handle=1804,i,3755266100183678525,18213509277326933505,131072 /prefetch:12⤵PID:416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3136 --field-trial-handle=1804,i,3755266100183678525,18213509277326933505,131072 /prefetch:12⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4532 --field-trial-handle=1804,i,3755266100183678525,18213509277326933505,131072 /prefetch:12⤵PID:956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 --field-trial-handle=1804,i,3755266100183678525,18213509277326933505,131072 /prefetch:82⤵PID:916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 --field-trial-handle=1804,i,3755266100183678525,18213509277326933505,131072 /prefetch:82⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5aebaafd957f843c7fb1795a257492444
SHA1b9ee40fdb996f267e7e1de86173e5e21acd9da5c
SHA256d9614f334569a55d8e600442b054bdc55813fa2901121a587f356b0063da154b
SHA512626a2fd124a18757913671d1c8bd56d585ef352bcb7eb67385ecc0fbc1b862ef0c1a315f573018f55e306da639150bd8be51e8208aa7ac7eeccff9c1f0d0d6f5
-
Filesize
705B
MD5cbfb5515cd0cc1ac15e86cf9fb07dbe0
SHA11af253f069c7b90a26b645b71c31e122afc5e732
SHA256fe845fa59c39417e375ce342195f4d1c55630b4d5a68f37b434105faa55af198
SHA512f596f01124b8b05a3a45ae2212be8e3f940a8e98ee5a5c0f71857e5ba13b676b23f21ed998cb7d5a4eb96a16dd5c283bec703a0600a837cbaa0a63af103a1d7a
-
Filesize
6KB
MD50dd767a9b87e69acb42bea6eaaf91082
SHA1a8f74f604dc9922516c0cc71f121ca6ac9a1e716
SHA256031c7faa837f4bc1a1f92a4d7c2cf2b074f651b122d12afdb8c526908e693a9c
SHA51207e0ce18032c52b75e82ffbf6e776d11bf7706efa30bc928df10bfe8cbbb1472f4bbf244762fd14404c862a3860a1f2fe877ad81c02d34ffc3ab75c9307ee18a
-
Filesize
97KB
MD562dadf825d9a34032542792e43f7477f
SHA152d01d4874c6f96f4912b6c36949d4a3d9d95f79
SHA256561e24ce44392b9838d2c6f3d85fb3087b71588a3f56e61f618cd85a2c9611ed
SHA512cd87975208d67516e0d008153c9b6a3f5fb918cce393d65a8fbcc81a6aefe31b973e066026879d4262a6a7b6e9fa16f7d24c6d772ab59f414dbf8932f589bd83
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd