Analysis
-
max time kernel
33s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2023, 09:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://sync-dsp.ad-m.asia
Resource
win10v2004-20230915-en
General
-
Target
https://sync-dsp.ad-m.asia
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133396772052407606" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2332 chrome.exe 2332 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe -
Suspicious use of AdjustPrivilegeToken 56 IoCs
description pid Process Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2332 wrote to memory of 1956 2332 chrome.exe 31 PID 2332 wrote to memory of 1956 2332 chrome.exe 31 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 5100 2332 chrome.exe 84 PID 2332 wrote to memory of 2124 2332 chrome.exe 85 PID 2332 wrote to memory of 2124 2332 chrome.exe 85 PID 2332 wrote to memory of 1196 2332 chrome.exe 86 PID 2332 wrote to memory of 1196 2332 chrome.exe 86 PID 2332 wrote to memory of 1196 2332 chrome.exe 86 PID 2332 wrote to memory of 1196 2332 chrome.exe 86 PID 2332 wrote to memory of 1196 2332 chrome.exe 86 PID 2332 wrote to memory of 1196 2332 chrome.exe 86 PID 2332 wrote to memory of 1196 2332 chrome.exe 86 PID 2332 wrote to memory of 1196 2332 chrome.exe 86 PID 2332 wrote to memory of 1196 2332 chrome.exe 86 PID 2332 wrote to memory of 1196 2332 chrome.exe 86 PID 2332 wrote to memory of 1196 2332 chrome.exe 86 PID 2332 wrote to memory of 1196 2332 chrome.exe 86 PID 2332 wrote to memory of 1196 2332 chrome.exe 86 PID 2332 wrote to memory of 1196 2332 chrome.exe 86 PID 2332 wrote to memory of 1196 2332 chrome.exe 86 PID 2332 wrote to memory of 1196 2332 chrome.exe 86 PID 2332 wrote to memory of 1196 2332 chrome.exe 86 PID 2332 wrote to memory of 1196 2332 chrome.exe 86 PID 2332 wrote to memory of 1196 2332 chrome.exe 86 PID 2332 wrote to memory of 1196 2332 chrome.exe 86 PID 2332 wrote to memory of 1196 2332 chrome.exe 86 PID 2332 wrote to memory of 1196 2332 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://sync-dsp.ad-m.asia1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffde7bc9758,0x7ffde7bc9768,0x7ffde7bc97782⤵PID:1956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1912,i,13353853921874720551,7736793947005477978,131072 /prefetch:22⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 --field-trial-handle=1912,i,13353853921874720551,7736793947005477978,131072 /prefetch:82⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1912,i,13353853921874720551,7736793947005477978,131072 /prefetch:82⤵PID:1196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3024 --field-trial-handle=1912,i,13353853921874720551,7736793947005477978,131072 /prefetch:12⤵PID:3796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3008 --field-trial-handle=1912,i,13353853921874720551,7736793947005477978,131072 /prefetch:12⤵PID:1932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4868 --field-trial-handle=1912,i,13353853921874720551,7736793947005477978,131072 /prefetch:82⤵PID:4404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 --field-trial-handle=1912,i,13353853921874720551,7736793947005477978,131072 /prefetch:82⤵PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5368 --field-trial-handle=1912,i,13353853921874720551,7736793947005477978,131072 /prefetch:12⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5192 --field-trial-handle=1912,i,13353853921874720551,7736793947005477978,131072 /prefetch:12⤵PID:3300
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
8KB
MD559f3c096997c75c0d2d30ab070bba2b0
SHA10e0c80038062238d6b2ebf92e55ee4568d52b6e1
SHA25697eed2980852531113ea2103044a388063a45cb9525c2f0dbc8127eb8d18099a
SHA512b158f2ddc073b207a94c12c378a7dd5133a4dd8ac5602713a2c3f382df0a8f639d9e5f11f4694a57bc65c6097daa1cfa0d5a575ecd02614e51498ca1baf3d085
-
Filesize
5KB
MD582726bbc00b43ba350e9ac5f876fc6ab
SHA13d0293c459bee33734ec2558a3c5dfa1353acde6
SHA2568b91f0b17320a0a357adf4707e4b29159fe05178a8b0e540c9678dc686647c65
SHA512989242f37988427c2e915dda41ddca99ea1245a2bd90a053cf20a7030f484f61b1da7fcc4309465487b606c68b185573d70a39f80e4092d4ca54547a1bf8f60f
-
Filesize
103KB
MD503993eb8e4b2f81db53f196f567c8cd2
SHA18f04d20c00bed9b6a3a17a1e8fb2f0f968410201
SHA256c38e93e07eea749a5e5539e4c50a4512692600442a66a27b6b3718cfb27e9c94
SHA512d3f44757ee723c8ec9c525df07960779808ea8ade5606f2dd650bcdfc8c6ecda3c02982bfbb9fe550cf0c20277813db47f39d2ed8f5e3f447b5badfde1f0a1c6
-
Filesize
104KB
MD533d68177b6da221d033ef90eb924728d
SHA13175e87b6ceb9b7adafd48abddf2fac6bc697b1b
SHA256e3825828efd077e2840c14ce70844008aa5cfef82a436f83060c427f52dcf900
SHA51251f68882633ebb6f9ad76de6d23e5f2e920505883d5c15a2c5f6bac256ffe2e6aa70c822bc1ae6a1acf7e34cd8aea2e5afd950de39189735ed3d4306f66bd4b6
-
Filesize
104KB
MD54fa679d6c6a836ddb5d5722cc8754cc5
SHA101197c885f819a89e4aa1de5ca8ed6f47948b476
SHA256578cec122e8b79611ea7581e72800fa77fbd446da08c8b7b9eae0ea4631a501a
SHA5129cca194a031236851a68aaa62805f60b78cffef20c1b55deb80ce7560cc7e6c1b6cdb4ccb08d598438f7c15810855d05972551d359e4f58650681d48bc8af859