Analysis
-
max time kernel
72s -
max time network
78s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2023, 18:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://appleid.apple.com/choose-your-country/
Resource
win10v2004-20230915-en
General
-
Target
https://appleid.apple.com/choose-your-country/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133404870503495496" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2224 chrome.exe 2224 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeCreatePagefilePrivilege 2224 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2224 wrote to memory of 3416 2224 chrome.exe 82 PID 2224 wrote to memory of 3416 2224 chrome.exe 82 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 628 2224 chrome.exe 84 PID 2224 wrote to memory of 1636 2224 chrome.exe 85 PID 2224 wrote to memory of 1636 2224 chrome.exe 85 PID 2224 wrote to memory of 3236 2224 chrome.exe 86 PID 2224 wrote to memory of 3236 2224 chrome.exe 86 PID 2224 wrote to memory of 3236 2224 chrome.exe 86 PID 2224 wrote to memory of 3236 2224 chrome.exe 86 PID 2224 wrote to memory of 3236 2224 chrome.exe 86 PID 2224 wrote to memory of 3236 2224 chrome.exe 86 PID 2224 wrote to memory of 3236 2224 chrome.exe 86 PID 2224 wrote to memory of 3236 2224 chrome.exe 86 PID 2224 wrote to memory of 3236 2224 chrome.exe 86 PID 2224 wrote to memory of 3236 2224 chrome.exe 86 PID 2224 wrote to memory of 3236 2224 chrome.exe 86 PID 2224 wrote to memory of 3236 2224 chrome.exe 86 PID 2224 wrote to memory of 3236 2224 chrome.exe 86 PID 2224 wrote to memory of 3236 2224 chrome.exe 86 PID 2224 wrote to memory of 3236 2224 chrome.exe 86 PID 2224 wrote to memory of 3236 2224 chrome.exe 86 PID 2224 wrote to memory of 3236 2224 chrome.exe 86 PID 2224 wrote to memory of 3236 2224 chrome.exe 86 PID 2224 wrote to memory of 3236 2224 chrome.exe 86 PID 2224 wrote to memory of 3236 2224 chrome.exe 86 PID 2224 wrote to memory of 3236 2224 chrome.exe 86 PID 2224 wrote to memory of 3236 2224 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://appleid.apple.com/choose-your-country/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec20c9758,0x7ffec20c9768,0x7ffec20c97782⤵PID:3416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1872,i,9896213417565784445,1319708010097363535,131072 /prefetch:22⤵PID:628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1872,i,9896213417565784445,1319708010097363535,131072 /prefetch:82⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1872,i,9896213417565784445,1319708010097363535,131072 /prefetch:82⤵PID:3236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2932 --field-trial-handle=1872,i,9896213417565784445,1319708010097363535,131072 /prefetch:12⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2940 --field-trial-handle=1872,i,9896213417565784445,1319708010097363535,131072 /prefetch:12⤵PID:3388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 --field-trial-handle=1872,i,9896213417565784445,1319708010097363535,131072 /prefetch:82⤵PID:3792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 --field-trial-handle=1872,i,9896213417565784445,1319708010097363535,131072 /prefetch:82⤵PID:4684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4736 --field-trial-handle=1872,i,9896213417565784445,1319708010097363535,131072 /prefetch:82⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1872,i,9896213417565784445,1319708010097363535,131072 /prefetch:82⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD56c37fc99aaadf11c4c5ed1b8ded7c2c2
SHA173217aa67b8dcc2386feee8cf796214ab9b2e619
SHA25629ac6ec6003e2f51d753b94fadd9f9661310d316ba75e646afe0202f09186515
SHA512dae5a9662fe732bb88ed2f04e3ef9431e442392bd8adb55f324731e81ff39d9cf5c00b7bb7023087be614063f64c46d13654748eb632f6145716b510fee21449
-
Filesize
384B
MD56a94971617bf9142af97a8ebeed0e1a8
SHA1195c89bfb772d09b2c1104382d1700a12a029499
SHA2569c5a5334b8704aadac2b4ed96a58e1633a1840731afbea59e261d825232f73e8
SHA51272825f78f5516b4ed16fd8bd1c72ca67bfc05b0726d3b4689d91792a09a1f0564dc37a67be8e07f1e282502e83117e51a4283ab8374aa398b56247774449f2ea
-
Filesize
1KB
MD59c6dfaca5709a7809e1f8491074e6785
SHA150ff599f6d92945e59b2111ad9c829d655bbce67
SHA256c69045afe707964164f5f8984af8e2539f129d0a58541910f9725b46eaea54fc
SHA5123d457bb9393bc788730184702ddb3a44287b01d9088cd3127a42516aae03ff4bbd463943d302054d2f92b98d04d0823be97deb61fe082c696f5fa85af748aae7
-
Filesize
1KB
MD575447207cce38f04512410070b8ac2a0
SHA179d3ad5330b626c850c7288f497c1f6260631af5
SHA256cb4e09b9e1f089aa6de59a0fe36d1a2d832784591f81908e8505ea490a5d6472
SHA51238f37f14d8bfead7380567e534642d9f5b5798f8beae591a12edc4d73ab39bf96841dc9363a42274864a1d5f6a074bf49a085f5b6392d876229ae3765b0c1f29
-
Filesize
872B
MD540d75c91962be158994e9525018b6657
SHA1fb23d73fe6a3be0770d1ca6dbb9cb38d8388d007
SHA256f6ac8dd7e03852a6a1dd0aec7c8e9547a8fd3a1c7e79853aac1a5ff28f5219d5
SHA512f949fbcbeb2724e615da7be85cee84e22ed401d4ca6afbabf7500382e9f75e076aa5e40c14a5d507120ab8b663a9df311feffefb46a1e6296730c48eeea413e8
-
Filesize
6KB
MD5057e6986ac72a48a8ed0afce854005cc
SHA1966d6c57649689e79da4cebbcda292c70b322090
SHA2569cfad1ed4bebbe84215eab144854df43967295c8e7fc606711e0b8f771a66b6a
SHA512514fe0e387b6e5a1d224352a4f2e4ca0d9e1991c3bd101ab8374a0ee7f2ff5e9bc354e43a0925c451feb31525c71199b4d2d06a1ae6f1831cf6c66ae016e8dd8
-
Filesize
5KB
MD56d8a93e060e6739ee111dcbdb430eecb
SHA191a76f49186d750c6e67e73f63f9948bcc8da319
SHA2560abb5fd4766d880bd870450fb81837510f7f17767a6130bbed7550ee87b5e8f4
SHA51207e4fe016b65f2cc862cb1393a9205d6581fb1cdfebe35ac1f2075243d9f9ad85acf9449b45a65add21925e5eab16b906743c19990e4ddddcaa15d71311fdb06
-
Filesize
5KB
MD50d5f5d5ed8e7fa31b5a0b3e2d8fb81a0
SHA11a800a6d35024893f00d32c13bf529fbaf00481f
SHA25616615fff03f612d489299e3608ffbe470a4f2ee58737c4797ddf134d135b6fef
SHA5125120fe4e3277ac0b472cfe9506e8fa199a626c1f740392d11440f70ee59b46c714e11c0fcd0f9a1f33b4b12b7744cd5a5ced16e0ff76ab5e00e1c06686155340
-
Filesize
136KB
MD5b3738d61659149e6764a60715ff22ce7
SHA1bceeebb360bb1ff47d85176b1d4def2192893382
SHA256dbc2ed3ba624dac2b8482e92f3da3f3e35e38f34d097420699a52417b62148db
SHA512588b17f73bc98b8de5ceb9cacdcf017c75038ca1fd13550bb4073e04ee147f5f903d3b6b9729348d67dc66d350256fce2825a14651b5a9fc2262f66c6c24004c
-
Filesize
103KB
MD5b525db558a7a3ed9b6421fc6a3d5a9eb
SHA10708610757faf18f02d254287dabd339f24c150f
SHA256608cf3654f83ba9eb15da5dff14ee6a441b816e24c9d4db07fcd8f2a5e072aa7
SHA512cbc0657ccaf6605adabd79f7f29773f4a457deb9f75deae23a6d7928279bab68017e1920bbd20ed414b51ec915817fcb6c0634bd67c6f30fa25352b7f1ddc584
-
Filesize
155KB
MD5e27d59ff94868d9b69db42f0c5395eec
SHA190c158f2f8b8b1127c54a30543901a7bec96ba65
SHA25633cc17579dd4edb5668a34fbde461dd7e19e398b005f9d06c853a5527000fc4f
SHA5123e59be054dc83ee8ec4eb8bdab6dd14bbc09c3adb2c8fdc551c13f1cc24305912875f7672f7361de4be1a359ba17b7e3a83ad151b68406d4fe2253f1dcbed565
-
Filesize
104KB
MD5a733d052a875142b17727373d36f40bb
SHA1b3984fa15479720b62675f09a54332d4b5797b4e
SHA25611c0bfd9903b0bb8fc12433a7edb37c96d888047964aae8a8b815c1d5e999216
SHA512c4fd1e130b9a925e1764c3d4cb9351ec4c1c957938bd21b4467d79f0ef88c3a7a79704f78f2d3f4288cf2579837f90e98332d334326fdb49d7e357d7cb943a1c
-
Filesize
264KB
MD504adad93018d5ac4e89291ed05cd70c5
SHA145dceb06b21286bc1430c5613d62cd7585b54de3
SHA2564b7c7a41a0b12b568f27142d4623bb9b5d38eebdfb5a19879de0efcad6a98438
SHA5127d44c192161f63795085add389db47922165d15e463c3418af84f5b22f509aac211036a0d6d9e3df733e465e3c1d7d25a18cdca849d8f27d9b41a2d2103fd0a5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd