Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2023 22:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ausxtaxservices.org
Resource
win10v2004-20230915-en
Behavioral task
behavioral2
Sample
https://ausxtaxservices.org
Resource
android-x64-arm64-20230831-en
General
-
Target
https://ausxtaxservices.org
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133407589097153450" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3096 chrome.exe 3096 chrome.exe 4784 chrome.exe 4784 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe Token: SeShutdownPrivilege 3096 chrome.exe Token: SeCreatePagefilePrivilege 3096 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe 3096 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3096 wrote to memory of 3376 3096 chrome.exe 82 PID 3096 wrote to memory of 3376 3096 chrome.exe 82 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 4564 3096 chrome.exe 89 PID 3096 wrote to memory of 1984 3096 chrome.exe 88 PID 3096 wrote to memory of 1984 3096 chrome.exe 88 PID 3096 wrote to memory of 4344 3096 chrome.exe 90 PID 3096 wrote to memory of 4344 3096 chrome.exe 90 PID 3096 wrote to memory of 4344 3096 chrome.exe 90 PID 3096 wrote to memory of 4344 3096 chrome.exe 90 PID 3096 wrote to memory of 4344 3096 chrome.exe 90 PID 3096 wrote to memory of 4344 3096 chrome.exe 90 PID 3096 wrote to memory of 4344 3096 chrome.exe 90 PID 3096 wrote to memory of 4344 3096 chrome.exe 90 PID 3096 wrote to memory of 4344 3096 chrome.exe 90 PID 3096 wrote to memory of 4344 3096 chrome.exe 90 PID 3096 wrote to memory of 4344 3096 chrome.exe 90 PID 3096 wrote to memory of 4344 3096 chrome.exe 90 PID 3096 wrote to memory of 4344 3096 chrome.exe 90 PID 3096 wrote to memory of 4344 3096 chrome.exe 90 PID 3096 wrote to memory of 4344 3096 chrome.exe 90 PID 3096 wrote to memory of 4344 3096 chrome.exe 90 PID 3096 wrote to memory of 4344 3096 chrome.exe 90 PID 3096 wrote to memory of 4344 3096 chrome.exe 90 PID 3096 wrote to memory of 4344 3096 chrome.exe 90 PID 3096 wrote to memory of 4344 3096 chrome.exe 90 PID 3096 wrote to memory of 4344 3096 chrome.exe 90 PID 3096 wrote to memory of 4344 3096 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ausxtaxservices.org1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe83ed9758,0x7ffe83ed9768,0x7ffe83ed97782⤵PID:3376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1888,i,14605962680123788114,9496972346372126280,131072 /prefetch:82⤵PID:1984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1888,i,14605962680123788114,9496972346372126280,131072 /prefetch:22⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1888,i,14605962680123788114,9496972346372126280,131072 /prefetch:82⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3016 --field-trial-handle=1888,i,14605962680123788114,9496972346372126280,131072 /prefetch:12⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1888,i,14605962680123788114,9496972346372126280,131072 /prefetch:12⤵PID:1444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4668 --field-trial-handle=1888,i,14605962680123788114,9496972346372126280,131072 /prefetch:12⤵PID:3668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 --field-trial-handle=1888,i,14605962680123788114,9496972346372126280,131072 /prefetch:82⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3860 --field-trial-handle=1888,i,14605962680123788114,9496972346372126280,131072 /prefetch:82⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5364 --field-trial-handle=1888,i,14605962680123788114,9496972346372126280,131072 /prefetch:12⤵PID:4156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3304 --field-trial-handle=1888,i,14605962680123788114,9496972346372126280,131072 /prefetch:12⤵PID:1456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3012 --field-trial-handle=1888,i,14605962680123788114,9496972346372126280,131072 /prefetch:12⤵PID:812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2380 --field-trial-handle=1888,i,14605962680123788114,9496972346372126280,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5a2411835f0a93ac1933d9f054adaf17c
SHA182b4936193dff90fc83e62099d538f6c9fcbe2ab
SHA256b6ff9c995772b80865119a0d21f6463c9fcb11227911c06d8b8ea048668c555d
SHA51205e4f9574b4fc4751ff2289de6d988bc4a8a21dd362bf4f71d2975b1e50db137e3b3f1bdb0d589e04bc3705a11f78c3d5c0c3b67fca1151217e31d7f96d250bd
-
Filesize
2KB
MD5b5a82eb96f89ddadc236f59b347b11d3
SHA105e4b94991f9388ea0e3e794f83baa1546b76624
SHA256cd6bb0efad36556fb46444264bf2cc94af76b97d634f172d269e54720b5d1435
SHA5129714d0fdd12f9d9738e2e5686fbbeec006ebc9fc85abe93cc8c787656aa20c41b092416cf44e07f59af0f697a7b58571b49c21a45f819b0573f2e29fb3082ae6
-
Filesize
6KB
MD592ea7badb489fef0211594e02e2655d5
SHA1581d0dfdb2495074dc917d620f4e9c5dfb783efb
SHA2569f957d5bb46869476f032921f459416962f8c0e4f23ac170e2924833cbfca960
SHA512997400769d7cfaa09e59ec6f4f4b1dc7d631646dfba962be571d6eb3b66e72cd66ea3f669bbc2cc44986b8400069f4daaf5963bd95ebb758bc0dafa6de485223
-
Filesize
101KB
MD5171c3eae7f58baf040fa749dc937c053
SHA1d54bfa82ff869676a713706a19b948268d9bc4e5
SHA256f95bea3641eb106912fb0cdd9ad43695f4f189253c00f262effaced6b3344fa2
SHA512b8a5263ca7861bc67c0fc3ac3e8b4ad7ea3432b7e58a9a9af1d490715bb63f58fa7bc1ab4ee112e229d0fc485dd3efeb478f3ecb43dee4560280b383026fbd94
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd