Analysis
-
max time kernel
40s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2023, 18:47
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gem.godaddy.com/signups/activate/MS0tYklNMzlORXdWL01Nb05Ic1kxdzlHS1NVZXZlUEpaSGVXNXVoSEUzcVJpRGhwWlk1dmRHOHlsejgyR1pUS1JYaWluakNmRTVJQWl1UGlUaXhsZz09LS1xdUxUdElESllqeElqRXcxLS1RM3N1cDRHVTA1dmRPZ0FxUEFoMThnPT0=?signup=6918020#[email protected]
Resource
win10v2004-20230915-en
General
-
Target
https://gem.godaddy.com/signups/activate/MS0tYklNMzlORXdWL01Nb05Ic1kxdzlHS1NVZXZlUEpaSGVXNXVoSEUzcVJpRGhwWlk1dmRHOHlsejgyR1pUS1JYaWluakNmRTVJQWl1UGlUaXhsZz09LS1xdUxUdElESllqeElqRXcxLS1RM3N1cDRHVTA1dmRPZ0FxUEFoMThnPT0=?signup=6918020#[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133397956747248789" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3040 chrome.exe 3040 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3040 wrote to memory of 4240 3040 chrome.exe 28 PID 3040 wrote to memory of 4240 3040 chrome.exe 28 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 4128 3040 chrome.exe 87 PID 3040 wrote to memory of 1932 3040 chrome.exe 88 PID 3040 wrote to memory of 1932 3040 chrome.exe 88 PID 3040 wrote to memory of 1996 3040 chrome.exe 89 PID 3040 wrote to memory of 1996 3040 chrome.exe 89 PID 3040 wrote to memory of 1996 3040 chrome.exe 89 PID 3040 wrote to memory of 1996 3040 chrome.exe 89 PID 3040 wrote to memory of 1996 3040 chrome.exe 89 PID 3040 wrote to memory of 1996 3040 chrome.exe 89 PID 3040 wrote to memory of 1996 3040 chrome.exe 89 PID 3040 wrote to memory of 1996 3040 chrome.exe 89 PID 3040 wrote to memory of 1996 3040 chrome.exe 89 PID 3040 wrote to memory of 1996 3040 chrome.exe 89 PID 3040 wrote to memory of 1996 3040 chrome.exe 89 PID 3040 wrote to memory of 1996 3040 chrome.exe 89 PID 3040 wrote to memory of 1996 3040 chrome.exe 89 PID 3040 wrote to memory of 1996 3040 chrome.exe 89 PID 3040 wrote to memory of 1996 3040 chrome.exe 89 PID 3040 wrote to memory of 1996 3040 chrome.exe 89 PID 3040 wrote to memory of 1996 3040 chrome.exe 89 PID 3040 wrote to memory of 1996 3040 chrome.exe 89 PID 3040 wrote to memory of 1996 3040 chrome.exe 89 PID 3040 wrote to memory of 1996 3040 chrome.exe 89 PID 3040 wrote to memory of 1996 3040 chrome.exe 89 PID 3040 wrote to memory of 1996 3040 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://gem.godaddy.com/signups/activate/MS0tYklNMzlORXdWL01Nb05Ic1kxdzlHS1NVZXZlUEpaSGVXNXVoSEUzcVJpRGhwWlk1dmRHOHlsejgyR1pUS1JYaWluakNmRTVJQWl1UGlUaXhsZz09LS1xdUxUdElESllqeElqRXcxLS1RM3N1cDRHVTA1dmRPZ0FxUEFoMThnPT0=?signup=6918020#[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffd15a9758,0x7fffd15a9768,0x7fffd15a97782⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1836,i,12668849793517244552,17745202424634960659,131072 /prefetch:22⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=1836,i,12668849793517244552,17745202424634960659,131072 /prefetch:82⤵PID:1932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1836,i,12668849793517244552,17745202424634960659,131072 /prefetch:82⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2936 --field-trial-handle=1836,i,12668849793517244552,17745202424634960659,131072 /prefetch:12⤵PID:3688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2944 --field-trial-handle=1836,i,12668849793517244552,17745202424634960659,131072 /prefetch:12⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4720 --field-trial-handle=1836,i,12668849793517244552,17745202424634960659,131072 /prefetch:12⤵PID:4804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4892 --field-trial-handle=1836,i,12668849793517244552,17745202424634960659,131072 /prefetch:82⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 --field-trial-handle=1836,i,12668849793517244552,17745202424634960659,131072 /prefetch:82⤵PID:2516
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
704B
MD5ee102f26d2945c87ecf33c471ebc994f
SHA18d987dfc6050cbf3443ffa834a2f7d5c3925f6f2
SHA256b1584fb0ce86a8eefafae285e9d7ff3b6aaa4dde0b1c23190e964ca6069fb47c
SHA512c99390ec6aeba22895498940ee1ea76f31fa513c2d7286920f1c69e5a11dc2e38227b29ef36f145ce1992e66d48a2895ae78e3484795893804e482ddf2a5c48a
-
Filesize
704B
MD508005df54740148fbf5ef07a4a41485e
SHA16aacf4505890b6d57c79be1450295d920d0ff448
SHA256c663bf54d21eef083f1e8dcdcb3f4945488beadde0dec880919a5f41b654b92e
SHA5125ee6811814c61c344400ca3fae51e94afa5d9a35ec0bded244a9e60144495739d505684d95f6563d56f6345cfb635cecbb36a19a4204c3831b1cdee8e90b2cd6
-
Filesize
6KB
MD5fc9d910634870eae2eced63b6f6c0122
SHA1c463a86a7c12208f6f5ef5aae24b6ed11933e0be
SHA256a2b30400dccfedd606785f2f8822ff3b732825732cc2171494aa4714b1efd281
SHA51200cdc02a96aa3ff2c4f5a71a4b9083d20299cc786eb2fb73ec9acedef9b4ead4d5add4659b15d24c829301a79051bf542ab595860e50b21d6e70133d165a3c25
-
Filesize
102KB
MD5282603a46aefc1ec9d7fa700d9e67f58
SHA17152cbac997fb794f717abf3c73c47b9bf36247a
SHA256ffdc8a4f0cf38f35526f82bf3ea230087e0e9be43df5c3628484cf4c11efb2cc
SHA512772dcdd26472222824fd1829b2d150b9c88d3f12e6a44060d620e7c1dbe895ec1fa9987f47bb5e29a69d187e00aa6ce44cf5fcc7546977c1630aaf058b26d932
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd