Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
19-09-2023 11:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.academia.edu/keypass/U2taYzErdGlXNWlHeURaclhtTlpOOEdUS0ZzWjRoZWtCWkV5NklHUXNMTT0tLUdCMXpkMVRXWnd1Zlkzb2tzR1Y3dUE9PQ==--9c6116368c4899d823584fd743db6031ec25cef6/t/id4Gq-Rmbv6aV-bnTwhD/38956879/Model_for_the_Prescription_of_the_Appropriate_Inhibition_Technique_for_Hydrates_in_Natural_Gas_Streams
Resource
win10-20230915-en
General
-
Target
https://www.academia.edu/keypass/U2taYzErdGlXNWlHeURaclhtTlpOOEdUS0ZzWjRoZWtCWkV5NklHUXNMTT0tLUdCMXpkMVRXWnd1Zlkzb2tzR1Y3dUE9PQ==--9c6116368c4899d823584fd743db6031ec25cef6/t/id4Gq-Rmbv6aV-bnTwhD/38956879/Model_for_the_Prescription_of_the_Appropriate_Inhibition_Technique_for_Hydrates_in_Natural_Gas_Streams
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133395950256837032" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4956 chrome.exe 4956 chrome.exe 528 chrome.exe 528 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe Token: SeShutdownPrivilege 4956 chrome.exe Token: SeCreatePagefilePrivilege 4956 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4956 wrote to memory of 4928 4956 chrome.exe 41 PID 4956 wrote to memory of 4928 4956 chrome.exe 41 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4808 4956 chrome.exe 74 PID 4956 wrote to memory of 4512 4956 chrome.exe 72 PID 4956 wrote to memory of 4512 4956 chrome.exe 72 PID 4956 wrote to memory of 1928 4956 chrome.exe 73 PID 4956 wrote to memory of 1928 4956 chrome.exe 73 PID 4956 wrote to memory of 1928 4956 chrome.exe 73 PID 4956 wrote to memory of 1928 4956 chrome.exe 73 PID 4956 wrote to memory of 1928 4956 chrome.exe 73 PID 4956 wrote to memory of 1928 4956 chrome.exe 73 PID 4956 wrote to memory of 1928 4956 chrome.exe 73 PID 4956 wrote to memory of 1928 4956 chrome.exe 73 PID 4956 wrote to memory of 1928 4956 chrome.exe 73 PID 4956 wrote to memory of 1928 4956 chrome.exe 73 PID 4956 wrote to memory of 1928 4956 chrome.exe 73 PID 4956 wrote to memory of 1928 4956 chrome.exe 73 PID 4956 wrote to memory of 1928 4956 chrome.exe 73 PID 4956 wrote to memory of 1928 4956 chrome.exe 73 PID 4956 wrote to memory of 1928 4956 chrome.exe 73 PID 4956 wrote to memory of 1928 4956 chrome.exe 73 PID 4956 wrote to memory of 1928 4956 chrome.exe 73 PID 4956 wrote to memory of 1928 4956 chrome.exe 73 PID 4956 wrote to memory of 1928 4956 chrome.exe 73 PID 4956 wrote to memory of 1928 4956 chrome.exe 73 PID 4956 wrote to memory of 1928 4956 chrome.exe 73 PID 4956 wrote to memory of 1928 4956 chrome.exe 73
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.academia.edu/keypass/U2taYzErdGlXNWlHeURaclhtTlpOOEdUS0ZzWjRoZWtCWkV5NklHUXNMTT0tLUdCMXpkMVRXWnd1Zlkzb2tzR1Y3dUE9PQ==--9c6116368c4899d823584fd743db6031ec25cef6/t/id4Gq-Rmbv6aV-bnTwhD/38956879/Model_for_the_Prescription_of_the_Appropriate_Inhibition_Technique_for_Hydrates_in_Natural_Gas_Streams1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffec9b99758,0x7ffec9b99768,0x7ffec9b997782⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1812 --field-trial-handle=1784,i,9870034383894713930,4361443582107181803,131072 /prefetch:82⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2072 --field-trial-handle=1784,i,9870034383894713930,4361443582107181803,131072 /prefetch:82⤵PID:1928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1612 --field-trial-handle=1784,i,9870034383894713930,4361443582107181803,131072 /prefetch:22⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3068 --field-trial-handle=1784,i,9870034383894713930,4361443582107181803,131072 /prefetch:12⤵PID:4548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3096 --field-trial-handle=1784,i,9870034383894713930,4361443582107181803,131072 /prefetch:12⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3808 --field-trial-handle=1784,i,9870034383894713930,4361443582107181803,131072 /prefetch:12⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 --field-trial-handle=1784,i,9870034383894713930,4361443582107181803,131072 /prefetch:82⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 --field-trial-handle=1784,i,9870034383894713930,4361443582107181803,131072 /prefetch:82⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2448 --field-trial-handle=1784,i,9870034383894713930,4361443582107181803,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:528
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181KB
MD5f4d077fdd3bad1c3730c23cc2dea0538
SHA155bca2302e887ed5e238ed93ec228b46cdfb7d7f
SHA256450d9f7f377f988975ef34a223a85831d1f9f862d5052f834efcda8146142e3a
SHA5120b3754e2c994e97be8e84d3b239661bf08134d39921b4a9d1e41d26c2779c5ac5a106f71ca2b7bb6997d6ea1457d1225414129a8826a9a4388b7ace66cc008cc
-
Filesize
648B
MD54bf8d94f75e94bc3c7dc45e5c68546ff
SHA11bd61ad6fd079b28bc9d645ff33a1620316da950
SHA256c34e7053737af17146330bb7f9f7c5355d220bea1080cba7c99d7e35460f9a43
SHA512e90b311ec2293a9b17a8830a34ff714d552273066374fcb016e7ab58fefa60d81934e6720725280c8d662033da4793da7d87cfb4c0ec97670fb7c228266d2225
-
Filesize
1KB
MD5d32635a012e4272c8c8ed3fb08aa4fa9
SHA1f6cc4325e17c688b385446f3063849e98c03ecdc
SHA256f6f0fd3a7c5d5661715d47b40b6bac5d4d4f6e725618c65e9a7644c9465b9ac2
SHA5127bdd95be9e316106f6e3cbc117f60e379ac61289c5c01602778ebb9e7d7103eaaf5fa1f005f519beb780b97153ab44af826b7a513495cc7dbf30970fa0a9bfff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\eebe875f-5e64-45fd-b8c0-486bec0a3b7a.tmp
Filesize5KB
MD571b12698114c768f21cf714ee86ee771
SHA126788aeb130d61997eed146fe285f6a0f143fe45
SHA256d9a0f90d5a2c0d45b646eb42387fe8299b4c66dfc298e51ca9e4e66d6f400c0f
SHA512a0ad168de758075b910322cdb24ba0710a3e733a396ada199260d62536b0958dcb608e39a122f35979e6ebb391d09b078392c2fda53e86d69f2416a5fc0a4c14
-
Filesize
5KB
MD5186f5382a09a136a3816b2b99542a34f
SHA18cf477bfa545d7d7d4032cfd0bdd96dd7214b169
SHA256f6e6c372bf0f8a493bfc5f45407dbf95622fd90446fb99645579c8ba91c64d20
SHA512e5ae191be140626051e464ebb17ce488eff46c40ad9a6216f550098b79df1380e204f8f5ec736f0864fd367a5b254bfc24f04abded28eaee7a4680fdf1db21b0
-
Filesize
5KB
MD5b855aa0127192d43e4e08ca3e15d598f
SHA13b06e87814a9dfb6bd3c5deef90191b1ce4e5f25
SHA256b9149024acb7f78517d494d9914d0a7b6c180bcb968bab6498196d1112e888c1
SHA51287d8dd5f9068584ebe03fc8d8f064657648cfcabe1404bbf5e602041ddaa6079470d2516944e7736d6342e38b87441d3c01ad3030a489235ee145cee8bbfe485
-
Filesize
6KB
MD5ec3c37a71ffc7306dc0bc722ad7fa4ff
SHA1f984ec81315567747d154ab3c4d19bdb0ede8b1d
SHA2563d851e1391748ab3cf419ac52be9545fa3bfef4a055251557ed838fcba0f652f
SHA512ccfce923f2c6faad3cb925a5f1828a3c2faa47f7dbb0b49417fd7c79cc991503c6e9a9509583bc40c9df533f025b76fadd78b6fd460b6a2cf59bbd36dcf8ae3b
-
Filesize
102KB
MD54c411da6db5ae00a0b85c370d13a62b2
SHA1a266f58230593f8457b4dd1af6afc1c3e200b168
SHA2565f9c35aa409e9cabb55a5860c4768a1b83070c2fa21a88f6edf227e9e2b16d91
SHA512d99617437680c9a92c4fafd91ab865040613c8843b62700c8de4a5854f5b64228e77f1d26813cbf067c727a13c0eebc70eef5ec99c466ab1c8621c0f21548b65
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd