Analysis
-
max time kernel
57s -
max time network
62s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2023, 19:18
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://pub-44f21b9dba9344e0a2e2752160a36785.r2.dev/JAJA.html#[email protected]
Resource
win10v2004-20230915-en
General
-
Target
https://pub-44f21b9dba9344e0a2e2752160a36785.r2.dev/JAJA.html#[email protected]
Malware Config
Signatures
-
Detected phishing page
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133404887326443739" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1756 chrome.exe 1756 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1756 chrome.exe 1756 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2952 1756 chrome.exe 50 PID 1756 wrote to memory of 2952 1756 chrome.exe 50 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4956 1756 chrome.exe 88 PID 1756 wrote to memory of 4452 1756 chrome.exe 89 PID 1756 wrote to memory of 4452 1756 chrome.exe 89 PID 1756 wrote to memory of 3788 1756 chrome.exe 90 PID 1756 wrote to memory of 3788 1756 chrome.exe 90 PID 1756 wrote to memory of 3788 1756 chrome.exe 90 PID 1756 wrote to memory of 3788 1756 chrome.exe 90 PID 1756 wrote to memory of 3788 1756 chrome.exe 90 PID 1756 wrote to memory of 3788 1756 chrome.exe 90 PID 1756 wrote to memory of 3788 1756 chrome.exe 90 PID 1756 wrote to memory of 3788 1756 chrome.exe 90 PID 1756 wrote to memory of 3788 1756 chrome.exe 90 PID 1756 wrote to memory of 3788 1756 chrome.exe 90 PID 1756 wrote to memory of 3788 1756 chrome.exe 90 PID 1756 wrote to memory of 3788 1756 chrome.exe 90 PID 1756 wrote to memory of 3788 1756 chrome.exe 90 PID 1756 wrote to memory of 3788 1756 chrome.exe 90 PID 1756 wrote to memory of 3788 1756 chrome.exe 90 PID 1756 wrote to memory of 3788 1756 chrome.exe 90 PID 1756 wrote to memory of 3788 1756 chrome.exe 90 PID 1756 wrote to memory of 3788 1756 chrome.exe 90 PID 1756 wrote to memory of 3788 1756 chrome.exe 90 PID 1756 wrote to memory of 3788 1756 chrome.exe 90 PID 1756 wrote to memory of 3788 1756 chrome.exe 90 PID 1756 wrote to memory of 3788 1756 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://pub-44f21b9dba9344e0a2e2752160a36785.r2.dev/JAJA.html#[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9cc349758,0x7ff9cc349768,0x7ff9cc3497782⤵PID:2952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1676,i,16817929601658809113,10280537492025882815,131072 /prefetch:22⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2012 --field-trial-handle=1676,i,16817929601658809113,10280537492025882815,131072 /prefetch:82⤵PID:4452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1676,i,16817929601658809113,10280537492025882815,131072 /prefetch:82⤵PID:3788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2968 --field-trial-handle=1676,i,16817929601658809113,10280537492025882815,131072 /prefetch:12⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2976 --field-trial-handle=1676,i,16817929601658809113,10280537492025882815,131072 /prefetch:12⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3856 --field-trial-handle=1676,i,16817929601658809113,10280537492025882815,131072 /prefetch:82⤵PID:3452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4520 --field-trial-handle=1676,i,16817929601658809113,10280537492025882815,131072 /prefetch:82⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD55e1a3b30b4b6e53f9abf7cbb3797a2e8
SHA1f13cbd574392296da4fb5318f2fbb62ad83c6efd
SHA25644a9edb95c7d799636b8b0be5ecc6dfdde3e6148481ae138384ac7540f19e557
SHA5120b9a8854c3d88b37751033571474ddd351a8e5aea37031a57c6c47b3b990203cf2e5056a07bd96c94981685c65e64affd706ccd8c79c5729a128aad4e3c1a248
-
Filesize
874B
MD528084cf303afaa1c43150c97f69da8ff
SHA18a376a31f9fc867769e96bfa3862b82094d2ab1c
SHA2568a13ab8766ae010d2fe6d8cb9bdbef7c516fe815c372d62d214352e91fd01113
SHA5124e23821989ef32b98500392693cdf95143d3dc6a1fba4476558226afddee3ac54ce015813b4b798268d9375e31886e6c71485d2951cc4fd9e77aa2719bb702ce
-
Filesize
6KB
MD59fc268ac9ff3e66e72b806290aae21c9
SHA190dd0bacf75632d21ab869bb7e55874b8c8107a6
SHA256239c167aad44ba1b4a7ab1d76b2b81809b11f86b6af8676214d6dab64452e158
SHA5125d3664c4f291ae40b548a294c944d203f2c738ce547419b44b8e4b20b96c29ea66fc962b98251582412aa444ac9b99303a2812396b22f28f100234870f52ceb1
-
Filesize
6KB
MD561e731f532c4eeb225dcd567be9c9e46
SHA1daafd9467e905ca761d21a464be31c15c0aeb477
SHA2561bc5a6c7c4b88e1c35dbacef75961a67ddb74c9952127e4849044289c796d595
SHA51214cfd2b2417aa9de8d12d1276c5f554fb883de3c19e72403afbc0137476d978213d2af36da326e79de6a0f3d15e6a28a45a5cc52da28fdc9c8b708ed7d4d8cc0
-
Filesize
101KB
MD5c5135298c0ee9318cfbaf1d5487d817e
SHA1f050874548954da21d1d9bb835bd48ba940f1d5e
SHA256d56706e62fea9f9bbda529c4df3df2a2fb36f4d5d1e0b1c107922c8234633e4b
SHA512e6088347f0e30757995f400095ac6598af7e3558ebf3dd4d903f2174c297b988b2843d8654b5881f296ecaf1d14aaaf9e53a174814d2336f0a99af8856694434
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd