Analysis
-
max time kernel
600s -
max time network
602s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2023, 15:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.personalflowarayudainfo.com
Resource
win10v2004-20230831-en
General
-
Target
https://www.personalflowarayudainfo.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133383134864859634" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1156 chrome.exe 1156 chrome.exe 4144 chrome.exe 4144 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1156 wrote to memory of 1184 1156 chrome.exe 75 PID 1156 wrote to memory of 1184 1156 chrome.exe 75 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 3708 1156 chrome.exe 87 PID 1156 wrote to memory of 4376 1156 chrome.exe 88 PID 1156 wrote to memory of 4376 1156 chrome.exe 88 PID 1156 wrote to memory of 2688 1156 chrome.exe 89 PID 1156 wrote to memory of 2688 1156 chrome.exe 89 PID 1156 wrote to memory of 2688 1156 chrome.exe 89 PID 1156 wrote to memory of 2688 1156 chrome.exe 89 PID 1156 wrote to memory of 2688 1156 chrome.exe 89 PID 1156 wrote to memory of 2688 1156 chrome.exe 89 PID 1156 wrote to memory of 2688 1156 chrome.exe 89 PID 1156 wrote to memory of 2688 1156 chrome.exe 89 PID 1156 wrote to memory of 2688 1156 chrome.exe 89 PID 1156 wrote to memory of 2688 1156 chrome.exe 89 PID 1156 wrote to memory of 2688 1156 chrome.exe 89 PID 1156 wrote to memory of 2688 1156 chrome.exe 89 PID 1156 wrote to memory of 2688 1156 chrome.exe 89 PID 1156 wrote to memory of 2688 1156 chrome.exe 89 PID 1156 wrote to memory of 2688 1156 chrome.exe 89 PID 1156 wrote to memory of 2688 1156 chrome.exe 89 PID 1156 wrote to memory of 2688 1156 chrome.exe 89 PID 1156 wrote to memory of 2688 1156 chrome.exe 89 PID 1156 wrote to memory of 2688 1156 chrome.exe 89 PID 1156 wrote to memory of 2688 1156 chrome.exe 89 PID 1156 wrote to memory of 2688 1156 chrome.exe 89 PID 1156 wrote to memory of 2688 1156 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.personalflowarayudainfo.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb80fc9758,0x7ffb80fc9768,0x7ffb80fc97782⤵PID:1184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1872,i,4414667417839140487,1359117369918369272,131072 /prefetch:22⤵PID:3708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1872,i,4414667417839140487,1359117369918369272,131072 /prefetch:82⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1872,i,4414667417839140487,1359117369918369272,131072 /prefetch:82⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1872,i,4414667417839140487,1359117369918369272,131072 /prefetch:12⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3020 --field-trial-handle=1872,i,4414667417839140487,1359117369918369272,131072 /prefetch:12⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4596 --field-trial-handle=1872,i,4414667417839140487,1359117369918369272,131072 /prefetch:12⤵PID:3696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5012 --field-trial-handle=1872,i,4414667417839140487,1359117369918369272,131072 /prefetch:12⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 --field-trial-handle=1872,i,4414667417839140487,1359117369918369272,131072 /prefetch:82⤵PID:1396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 --field-trial-handle=1872,i,4414667417839140487,1359117369918369272,131072 /prefetch:82⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1000 --field-trial-handle=1872,i,4414667417839140487,1359117369918369272,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4144
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53ea6d04fbec2dca91cb00eda42598d10
SHA1c6768f5e22e02406c3ff4a290fe6ce4624f0b090
SHA256654bff7b97b183a7ac790e7607f6bd713f89931da4700db77ab149ab10668761
SHA5126ce813770df334928e5166a4edd29825dbba391f136026064509f6a2dbfd69bc29d5210a12589b57a893d29be3205205200707fbcaefe3834772ce1f93042777
-
Filesize
1KB
MD53bd2d07163f1c8c772d59654fd475e4e
SHA11e52af29153c3d74dc063a0202089f16f62e5f72
SHA256fe3a9b0208313ce74e77e6776f74575cbdff1aa70c63f4c564023dd358c516c4
SHA5129a96bb39e156b145bc2c7768df78236eecf380eda0326e34f30de72d6716a03f2c52ec3e59ec4b3324a8ea7658f00620f613f7dd0c34dc9a01840a9cd51b242c
-
Filesize
1KB
MD52d68adea8df42f9dbe180dc3a8d0240a
SHA1db8afeef83ae90bef614c48400e9bb686442df5e
SHA256d88983b35e308a80bdd1676efd492ca79c32198fd96a7907d4c1e243017b6f4c
SHA512e8f08b6ea86e2e02332228fc97c96c2b847f787bfb2a6bcc3640bdaeb1c78c9a9b81d35e67171fede5ebc975f5e66392afb10d7fababf227276cd74f948f7068
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\dbc9be20-e039-45fc-a32f-7ed0e6cb96d2.tmp
Filesize3KB
MD556b93ed1a1e8fae627c13435855bad82
SHA17b435f353377a95120a5141e7b53d96a81cb24dc
SHA2568b93ef0e7765a8dcbf81ce1c031cf712af9c0a51b52c3ec5a376351879155afd
SHA512c1c15a40cbba845c361c55fc037de6072afdcb761e4bacf2e28b4c5d826b9d9d5162f6fa4e9694b1009e4ea0c7ca257d1c5d0ccf987e50e837f12a3f0367f139
-
Filesize
6KB
MD5f5f9a9046321b67ee63008ae9634620f
SHA1a8369e4c639a3041c7ab5b015f6e8ed8a1e75a61
SHA256e981de27e68b278623db06f40f761fbda0019a560d4ec9871d8fe7e53c9471dd
SHA5126c4b207c8efc8c85b8379f99780253c8d8eabc31257550fc668fec0e375259c74a35bc145cc15e741e2e8b54caa255afcc805d32fd9e4f2554e4881e5a8d0d0d
-
Filesize
5KB
MD576683a5abfbd8f7739f54074ccde156b
SHA1f2a29cb77b06b2266bf716a49c0d63339b24773a
SHA256a9a9fc5afb879cda6b6b2bd9392eb7c9f3e3ab947f01e033041cc53f085cf744
SHA512c6db561abe03b77f85fe1bfad6ef88874772377d72dcea31a24716edcffd63ef0a5a5bd99745bd6dc251a5723bce97af873cb6cbe56a4bb1a8cc9f7493d5b757
-
Filesize
5KB
MD5ecfc8f3519f405d8855f5d48adf7562f
SHA16fea1aecf9ca515b4915b392f11bb89299378d69
SHA2564a6136b971fa84a43dc6de09951f383557826d2c3c8505f0d444191f4336603d
SHA51270adc267395b65d8192f8ad359709059ae3c6d1b6aca5060cdca2d366bc70e2dc13cc5792db87f5553c6e1610042d4cccd62f9d07c544d2c39eb74ac81676817
-
Filesize
190KB
MD585c30ce1f8ce7e03d695fade3f1ac3dd
SHA10fbcdefec163276bd39e0153d17eeec8c5974ebb
SHA256e82e65c4d4674269fc7311d13aa92450fd22138cae3e94bcc63161e98bb4d416
SHA512f31ceb6a688ad3881088c8ab46d786e78d45500154424c7acd438e838518daef407220752a9ddf7250870bf6e463d43f01c07433480639894ee8618b423d53f7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd