Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
22/09/2023, 04:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://accessmyfunds.net
Resource
win10v2004-20230915-en
General
-
Target
https://accessmyfunds.net
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133398292870431647" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 964 chrome.exe 964 chrome.exe 3956 chrome.exe 3956 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 964 chrome.exe 964 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe Token: SeShutdownPrivilege 964 chrome.exe Token: SeCreatePagefilePrivilege 964 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe 964 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 964 wrote to memory of 4420 964 chrome.exe 45 PID 964 wrote to memory of 4420 964 chrome.exe 45 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2912 964 chrome.exe 86 PID 964 wrote to memory of 2116 964 chrome.exe 87 PID 964 wrote to memory of 2116 964 chrome.exe 87 PID 964 wrote to memory of 3200 964 chrome.exe 90 PID 964 wrote to memory of 3200 964 chrome.exe 90 PID 964 wrote to memory of 3200 964 chrome.exe 90 PID 964 wrote to memory of 3200 964 chrome.exe 90 PID 964 wrote to memory of 3200 964 chrome.exe 90 PID 964 wrote to memory of 3200 964 chrome.exe 90 PID 964 wrote to memory of 3200 964 chrome.exe 90 PID 964 wrote to memory of 3200 964 chrome.exe 90 PID 964 wrote to memory of 3200 964 chrome.exe 90 PID 964 wrote to memory of 3200 964 chrome.exe 90 PID 964 wrote to memory of 3200 964 chrome.exe 90 PID 964 wrote to memory of 3200 964 chrome.exe 90 PID 964 wrote to memory of 3200 964 chrome.exe 90 PID 964 wrote to memory of 3200 964 chrome.exe 90 PID 964 wrote to memory of 3200 964 chrome.exe 90 PID 964 wrote to memory of 3200 964 chrome.exe 90 PID 964 wrote to memory of 3200 964 chrome.exe 90 PID 964 wrote to memory of 3200 964 chrome.exe 90 PID 964 wrote to memory of 3200 964 chrome.exe 90 PID 964 wrote to memory of 3200 964 chrome.exe 90 PID 964 wrote to memory of 3200 964 chrome.exe 90 PID 964 wrote to memory of 3200 964 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://accessmyfunds.net1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe076a9758,0x7ffe076a9768,0x7ffe076a97782⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1708,i,8340782084036718703,11491655090814569167,131072 /prefetch:22⤵PID:2912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1708,i,8340782084036718703,11491655090814569167,131072 /prefetch:82⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2956 --field-trial-handle=1708,i,8340782084036718703,11491655090814569167,131072 /prefetch:12⤵PID:1468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2944 --field-trial-handle=1708,i,8340782084036718703,11491655090814569167,131072 /prefetch:12⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2188 --field-trial-handle=1708,i,8340782084036718703,11491655090814569167,131072 /prefetch:82⤵PID:3200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 --field-trial-handle=1708,i,8340782084036718703,11491655090814569167,131072 /prefetch:82⤵PID:3272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 --field-trial-handle=1708,i,8340782084036718703,11491655090814569167,131072 /prefetch:82⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1708,i,8340782084036718703,11491655090814569167,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3956
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD5582d5804a75d255cfa5fbf04e0f07a8b
SHA17730b0b96342d94038a292e08b158743aeec8594
SHA256f1d8f80f5c66e58b6f6ba19cef5532fbce8cea1e5646e8199cfded2d91dea71a
SHA5129aa7cc39e97f41e7670ea276174abbe27c60d76a16ae7b9ff6048f66e19fa12dcdff3850e019de520784c3a1896f10d2caaa9a04c5e505be3b65e8d24398083c
-
Filesize
1KB
MD5a48db95006d935d4df5d58d9864c725f
SHA16214b4f54693dfa7a0ffc36d53c5af34a113847f
SHA2566b463cdb721dc79f7c025c36c2d4770449d49f7d4eee62693e54f6aca386402c
SHA512a73e1b3799fb769f41e536a7d06d31fe17085d1394d00e2a3f6686314d80c0a480996e32101bc3dd4722dd61898bae4d71d49a02d9f23155566ef091e466ecd2
-
Filesize
2KB
MD5c05e7cf17a41299e41b7345cea1296a7
SHA1b40612137496aa8a0a103fde9a28b31ff9ed077d
SHA2565879962082bd909999a0a752a14b903716613161f881a5fedd1b3936613a23fa
SHA5121e880605d436a41d9f1e3b751e9eba7aea899def53f89a1af081ea6f74d8620f06cd890352a84804540b0e8214ae4f5cdb82a1d6b4d2a5138c21b6b4db88e1a8
-
Filesize
537B
MD5fba30b38fbc43f9f7c10321d3ba26ca6
SHA1f8aa2a742d4be9d4f1fc354a2fdf2ede6039b31e
SHA2564e5edbcdbabc301e8c05143e25ed960de808307e19893a9d3de83d924676759a
SHA512a0d13faf3d1cab5b9406a5af331d4d752f9d10b4ee98e2bbf98fb33b5e76c4dcd2e45ecfdb4028d531d57a1924e7b98f1c473c493f8f8f609674c3700088b574
-
Filesize
6KB
MD5ab3a55cd01b90969bb998194091e0d1d
SHA172ec659d5badff4357792e47dce00d46a0bdfced
SHA2563f942e2759de9e77b2f3684ff9cf6d30bd803bba638e53d2dff498ede2ec0b37
SHA51203b6f8bae56e5852cba806994ea5563ad5d686bfffe275025e2a25050a285be4d5e26c99f560387a2d3599c9785c6bc9b8e39e58de5c23d0e1a59b0ef3a93439
-
Filesize
102KB
MD5426437490d4eb512ee730a3f500a1c74
SHA1429abc843faaed6b8c3302ea54180774e0d96631
SHA25657446c45c6168c84d93291b81989a71768e03bdbd4d736668d948cd5c8baa57d
SHA5122f29760d4447280835cc54ecb4b9061c1cb1c8e6849ab223573f3b00f075f92e800d7c25b762d84d1155d6233e0737782b0e5b7daf5cfb8db9ad88800e721ade
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd