Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2023 21:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://refundmydelay.com
Resource
win10v2004-20230915-en
Behavioral task
behavioral2
Sample
https://refundmydelay.com
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral3
Sample
https://refundmydelay.com
Resource
macos-20230831-en
General
-
Target
https://refundmydelay.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133407574975087389" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2108 chrome.exe 2108 chrome.exe 2360 chrome.exe 2360 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2108 wrote to memory of 4276 2108 chrome.exe 86 PID 2108 wrote to memory of 4276 2108 chrome.exe 86 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 4128 2108 chrome.exe 90 PID 2108 wrote to memory of 1748 2108 chrome.exe 89 PID 2108 wrote to memory of 1748 2108 chrome.exe 89 PID 2108 wrote to memory of 1912 2108 chrome.exe 91 PID 2108 wrote to memory of 1912 2108 chrome.exe 91 PID 2108 wrote to memory of 1912 2108 chrome.exe 91 PID 2108 wrote to memory of 1912 2108 chrome.exe 91 PID 2108 wrote to memory of 1912 2108 chrome.exe 91 PID 2108 wrote to memory of 1912 2108 chrome.exe 91 PID 2108 wrote to memory of 1912 2108 chrome.exe 91 PID 2108 wrote to memory of 1912 2108 chrome.exe 91 PID 2108 wrote to memory of 1912 2108 chrome.exe 91 PID 2108 wrote to memory of 1912 2108 chrome.exe 91 PID 2108 wrote to memory of 1912 2108 chrome.exe 91 PID 2108 wrote to memory of 1912 2108 chrome.exe 91 PID 2108 wrote to memory of 1912 2108 chrome.exe 91 PID 2108 wrote to memory of 1912 2108 chrome.exe 91 PID 2108 wrote to memory of 1912 2108 chrome.exe 91 PID 2108 wrote to memory of 1912 2108 chrome.exe 91 PID 2108 wrote to memory of 1912 2108 chrome.exe 91 PID 2108 wrote to memory of 1912 2108 chrome.exe 91 PID 2108 wrote to memory of 1912 2108 chrome.exe 91 PID 2108 wrote to memory of 1912 2108 chrome.exe 91 PID 2108 wrote to memory of 1912 2108 chrome.exe 91 PID 2108 wrote to memory of 1912 2108 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://refundmydelay.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff2eec9758,0x7fff2eec9768,0x7fff2eec97782⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1868,i,4481405797269284285,9576246684960552596,131072 /prefetch:82⤵PID:1748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1868,i,4481405797269284285,9576246684960552596,131072 /prefetch:22⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1868,i,4481405797269284285,9576246684960552596,131072 /prefetch:82⤵PID:1912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1868,i,4481405797269284285,9576246684960552596,131072 /prefetch:12⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2988 --field-trial-handle=1868,i,4481405797269284285,9576246684960552596,131072 /prefetch:12⤵PID:4444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4556 --field-trial-handle=1868,i,4481405797269284285,9576246684960552596,131072 /prefetch:12⤵PID:936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1868,i,4481405797269284285,9576246684960552596,131072 /prefetch:82⤵PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5028 --field-trial-handle=1868,i,4481405797269284285,9576246684960552596,131072 /prefetch:82⤵PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5084 --field-trial-handle=1868,i,4481405797269284285,9576246684960552596,131072 /prefetch:12⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5160 --field-trial-handle=1868,i,4481405797269284285,9576246684960552596,131072 /prefetch:12⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3180 --field-trial-handle=1868,i,4481405797269284285,9576246684960552596,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2360
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5c8624202f020dc54e7433a33998c15a6
SHA1391495872f5a0037a653d29a98994fef1eaeb48b
SHA256e279306ac30bb254b210a23744316a62153c8737561632a4c118be867b2ceaa9
SHA512f80547398f162cb872bcbf4d304e2db3ea8a8988c54cf9838f6053ced104a76b3ed7b0c8aa3518372eaa3320469e0794a20041974f479e8be3920cc8f668eea2
-
Filesize
1KB
MD544f1c2ef2b9220bc154e49b2623daa73
SHA17a766132ddfcdfabe9f563335aabba1c8aaa1f5b
SHA256acc1289b2c4350190eb4aaa5c9e3d7a9ebc133ab227bd9e6583bdeffeaaf6768
SHA5123264e3f841b685029b722e6786f964b2f49167c7e086c40026147410b3f7031c34b4ab590b171ec06f0ada68e537668d3e5ace8a9543e074fdd6530796f978a2
-
Filesize
6KB
MD537ec1576e1e932b2cf4b0f7bd873e163
SHA16483d16fa33d4c74ff8fd624cf6e0bfcca54c4db
SHA256cf57a8697f92b223d8840ac4544fb003ec35d679117cf359f4a4b468d0b0c747
SHA51254bb41fe1a55fdd26b81542b376f5eef47e12581a5506ae3a468aae5544542454f397648e3d2cd5663294928154a5dadcbf49a2343764c1dd9569034c75ee62f
-
Filesize
6KB
MD5c85fd0742c2aa038f1204c8c008a803d
SHA18360b42b3ef63da6a8967c04c7d3356b5571aa7e
SHA2567272f31f0cc12add07ab4ff6f52dd8b78ffac279a10778439bd48af29439638f
SHA512a15f3911636056a9dfb443f86e0ff698bc35d699830512531a2f1f2c5ae86fa14fd6e9a32a7bad25065a0d0e80810da8a2687f2903d61f9d65cf1ed005bd8942
-
Filesize
6KB
MD54a7c2d30e5631b66ba755126e33569ce
SHA1273cfe1ae04f1f6c789168f74dfdd27d6e01ced7
SHA256b17bef6c53add7e5dbb728bf7c3a8761f1bc0575aa55fbd792398ae1c5dfa932
SHA5121b8f1fbad28a1a1212bab44821e873320733219ed7bd20f5a2e0c2033382b575b35bf79ac28723d8b8b118374eda0b468228a22902a5525a68a6175cd1ae1ce9
-
Filesize
101KB
MD5f9644658a840f0935f51a1d7797dd432
SHA18bea8c72bad78edf7805a5b3f01d3afcb7d5c0c4
SHA256fc2346065e79e7f6666e58c1e173b9de084c546cb0548b995c0d958008f4ee1a
SHA512621ca04d0172cdce4b6377957254d1e947e0b16b70d9da3d29a73e3eba951b0fa007e976d85606a305d6f980c13161ce9693fa7a332d0c05ec9020ba74f05143
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e