Analysis
-
max time kernel
47s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2023 16:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://qantas.xyz
Resource
win10v2004-20230915-en
General
-
Target
http://qantas.xyz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133396149029070003" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3256 chrome.exe 3256 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe Token: SeShutdownPrivilege 3256 chrome.exe Token: SeCreatePagefilePrivilege 3256 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe 3256 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3256 wrote to memory of 1112 3256 chrome.exe 72 PID 3256 wrote to memory of 1112 3256 chrome.exe 72 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3044 3256 chrome.exe 85 PID 3256 wrote to memory of 3500 3256 chrome.exe 86 PID 3256 wrote to memory of 3500 3256 chrome.exe 86 PID 3256 wrote to memory of 1164 3256 chrome.exe 87 PID 3256 wrote to memory of 1164 3256 chrome.exe 87 PID 3256 wrote to memory of 1164 3256 chrome.exe 87 PID 3256 wrote to memory of 1164 3256 chrome.exe 87 PID 3256 wrote to memory of 1164 3256 chrome.exe 87 PID 3256 wrote to memory of 1164 3256 chrome.exe 87 PID 3256 wrote to memory of 1164 3256 chrome.exe 87 PID 3256 wrote to memory of 1164 3256 chrome.exe 87 PID 3256 wrote to memory of 1164 3256 chrome.exe 87 PID 3256 wrote to memory of 1164 3256 chrome.exe 87 PID 3256 wrote to memory of 1164 3256 chrome.exe 87 PID 3256 wrote to memory of 1164 3256 chrome.exe 87 PID 3256 wrote to memory of 1164 3256 chrome.exe 87 PID 3256 wrote to memory of 1164 3256 chrome.exe 87 PID 3256 wrote to memory of 1164 3256 chrome.exe 87 PID 3256 wrote to memory of 1164 3256 chrome.exe 87 PID 3256 wrote to memory of 1164 3256 chrome.exe 87 PID 3256 wrote to memory of 1164 3256 chrome.exe 87 PID 3256 wrote to memory of 1164 3256 chrome.exe 87 PID 3256 wrote to memory of 1164 3256 chrome.exe 87 PID 3256 wrote to memory of 1164 3256 chrome.exe 87 PID 3256 wrote to memory of 1164 3256 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://qantas.xyz1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa86f99758,0x7ffa86f99768,0x7ffa86f997782⤵PID:1112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 --field-trial-handle=1868,i,3141923733741537844,10373940684068456390,131072 /prefetch:22⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1868,i,3141923733741537844,10373940684068456390,131072 /prefetch:82⤵PID:3500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2264 --field-trial-handle=1868,i,3141923733741537844,10373940684068456390,131072 /prefetch:82⤵PID:1164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2912 --field-trial-handle=1868,i,3141923733741537844,10373940684068456390,131072 /prefetch:12⤵PID:1312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2880 --field-trial-handle=1868,i,3141923733741537844,10373940684068456390,131072 /prefetch:12⤵PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3916 --field-trial-handle=1868,i,3141923733741537844,10373940684068456390,131072 /prefetch:12⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 --field-trial-handle=1868,i,3141923733741537844,10373940684068456390,131072 /prefetch:82⤵PID:3736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 --field-trial-handle=1868,i,3141923733741537844,10373940684068456390,131072 /prefetch:82⤵PID:3172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3384 --field-trial-handle=1868,i,3141923733741537844,10373940684068456390,131072 /prefetch:82⤵PID:416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3576 --field-trial-handle=1868,i,3141923733741537844,10373940684068456390,131072 /prefetch:82⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
432B
MD5c3300a44e61cdafbf294cafbecdbeb0b
SHA1651a9e3a3335905f6f5b877ce342c0c4a9a91f9d
SHA256272a99e2aea04c8f8ab5e744c6857930946165c8e1d00bf17668073e27e6b128
SHA512de8742391fbeee9a5f6cff90f653a64654bfd31f5ce2620baf9dec06a773d12473892801f34d6705770023c54bea8aba4154ebad839367bbd3c92191e537f16e
-
Filesize
1KB
MD5340b0c834f659aed62328e87887d1edc
SHA1b5fa98a430d0c671da3719a8e15488c33e2e8cc8
SHA2560f442234f1e488bf79b0e0ab8e85f580557594bcd55da0b0c40191377b8a9f0a
SHA512de89c096835a80a8d301845b5cb5308e481a9838c364151b7a07089f6675a02cabfadc54d69eabbd6ec46559021fbdb1b3eee7aa5730ed82b782f3d6f2bbfc12
-
Filesize
5KB
MD5b85381f9e820c6774b1242baf17d993c
SHA1dec3b275cd8355ca88cb7f84d929ff00a3163e1e
SHA2567b1c2da797ff73e6588bb32cad0ce9ca3f3573db8e4451233e4d0410bf8c252b
SHA512c92828bc9607cbb0da4de367e15f3f9ad7ab86ae8135e8d1972947794a6cb254f4e36d360f13cceafb2551d96a00bf53e0d34880685afb5c242c29b73694f90f
-
Filesize
5KB
MD5050060ea7e7eea6c6b5faa1b69e33c00
SHA10c3e23c7d568ebf256b9f43ef04afb7a6d56cf62
SHA2567cd302f7c2b85c5a1d99334de6d9b6a96d8c148824c78227b1cf54f9603f8a66
SHA51209a1109fc4588adcd6f6ad490d6fbca050fc1c56c90717d224e59e106c03c1b7f956e71984dbf8af8fd6b44c8169eddf1aebc9a9dea9fdbdf49cff039eb5fcf1
-
Filesize
104KB
MD5c65ecfe3ad2d47651b06510fb3a3765c
SHA1052afe82a2118e1b25eb1f62be08868990311182
SHA2564aee3f805c6dba452349c5ad9c426faa8016f7739ae3d30e640c052dc9996a8a
SHA512d0285a81d24c26bf129a223a4318170e5e01e19def3d9c9ba7a04a949dfafa75dd89a1271546132a353481716d304018dd39723654c91bcd113b19983a53ee8f
-
Filesize
103KB
MD51d91f6224b64fe99ad7b67188617db8d
SHA16f46372c94cac5fb4ac57ca8014dc5e9e28b1925
SHA25625fe64a86a20985dbfeb222610abb5fee29d8358e5c78ca686b4b37a8b6d7eb0
SHA5120ab9d940bbb77ecad4e567a67f0b472cabd507dfdb3a3db0026e7e0b9a4b8811abe6bf2696837d96d67b1b216113779b56f2474ff72ee4a922a0ff5b3f59773b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd