Analysis
-
max time kernel
37s -
max time network
28s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
18-09-2023 00:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://publicationsitcinsights.com
Resource
win10-20230915-en
General
-
Target
http://publicationsitcinsights.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133394703887885915" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1792 chrome.exe 1792 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe Token: SeShutdownPrivilege 1792 chrome.exe Token: SeCreatePagefilePrivilege 1792 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe 1792 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1792 wrote to memory of 4828 1792 chrome.exe 42 PID 1792 wrote to memory of 4828 1792 chrome.exe 42 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 2532 1792 chrome.exe 71 PID 1792 wrote to memory of 4496 1792 chrome.exe 70 PID 1792 wrote to memory of 4496 1792 chrome.exe 70 PID 1792 wrote to memory of 4488 1792 chrome.exe 72 PID 1792 wrote to memory of 4488 1792 chrome.exe 72 PID 1792 wrote to memory of 4488 1792 chrome.exe 72 PID 1792 wrote to memory of 4488 1792 chrome.exe 72 PID 1792 wrote to memory of 4488 1792 chrome.exe 72 PID 1792 wrote to memory of 4488 1792 chrome.exe 72 PID 1792 wrote to memory of 4488 1792 chrome.exe 72 PID 1792 wrote to memory of 4488 1792 chrome.exe 72 PID 1792 wrote to memory of 4488 1792 chrome.exe 72 PID 1792 wrote to memory of 4488 1792 chrome.exe 72 PID 1792 wrote to memory of 4488 1792 chrome.exe 72 PID 1792 wrote to memory of 4488 1792 chrome.exe 72 PID 1792 wrote to memory of 4488 1792 chrome.exe 72 PID 1792 wrote to memory of 4488 1792 chrome.exe 72 PID 1792 wrote to memory of 4488 1792 chrome.exe 72 PID 1792 wrote to memory of 4488 1792 chrome.exe 72 PID 1792 wrote to memory of 4488 1792 chrome.exe 72 PID 1792 wrote to memory of 4488 1792 chrome.exe 72 PID 1792 wrote to memory of 4488 1792 chrome.exe 72 PID 1792 wrote to memory of 4488 1792 chrome.exe 72 PID 1792 wrote to memory of 4488 1792 chrome.exe 72 PID 1792 wrote to memory of 4488 1792 chrome.exe 72
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://publicationsitcinsights.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffaf4949758,0x7ffaf4949768,0x7ffaf49497782⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1812 --field-trial-handle=1820,i,1550078298664645693,17313455287446546808,131072 /prefetch:82⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1588 --field-trial-handle=1820,i,1550078298664645693,17313455287446546808,131072 /prefetch:22⤵PID:2532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1348 --field-trial-handle=1820,i,1550078298664645693,17313455287446546808,131072 /prefetch:82⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2660 --field-trial-handle=1820,i,1550078298664645693,17313455287446546808,131072 /prefetch:12⤵PID:1240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2796 --field-trial-handle=1820,i,1550078298664645693,17313455287446546808,131072 /prefetch:12⤵PID:2240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4656 --field-trial-handle=1820,i,1550078298664645693,17313455287446546808,131072 /prefetch:12⤵PID:3120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 --field-trial-handle=1820,i,1550078298664645693,17313455287446546808,131072 /prefetch:82⤵PID:3448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 --field-trial-handle=1820,i,1550078298664645693,17313455287446546808,131072 /prefetch:82⤵PID:2796
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
874B
MD5a2870f4e49a82d62a9f48824de480c9d
SHA1a922c44069d7d11a014b9e73bb710d31fd21d05d
SHA256ccc108382338356cecf5998fce442aa2a2f79b2ea00279e4e824e99c8dd5fbcb
SHA5121949bc79cdc75012a3d4b436e6b9fef9f4856f94d9f4c2bade91fc63e6f186239a31b8fb2aca1974c71ca7ed6bb32f8fb7d4fdf6d3c95e8994e7ecbf725e4d96
-
Filesize
5KB
MD578cc9ae2494595933175c997bf36c02c
SHA11d7952d5abd83125ab228d65b4b667f67f8e2eaf
SHA2565ba99f4ad43b95bf8e61e58f166b1011737402336126bcc309227d1b5bcd27f7
SHA51205a19e29aa322413c23bc78e83c0d651b3447518acb32eb21ef3f6439fa530286495091369c94aa9d014eef6400f82f9e554be310b3ae72fb33b88eca99b6224
-
Filesize
102KB
MD53259dc8f730713c82f5ef63b8fe6601b
SHA11472cb980078081fb7d488c7ba0ae40e082d51fb
SHA256542ff264d75bd7e8873e21bb727df4ca6e8dca9e0fbfee41f38a2544f55afa74
SHA512b601ef519c1e5ab15ed81e0d3346c429cb1a032f3fc81fb88b1c6e6b7aed3a5c9711dd9a8c4634d10152507a4a33f36e2eaff814ea5052957cce25f3fb7e7d1e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd