Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-es -
resource tags
arch:x64arch:x86image:win10v2004-20230915-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
02/10/2023, 09:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://s.id/Paquette-ES80162703
Resource
win10v2004-20230915-es
General
-
Target
https://s.id/Paquette-ES80162703
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133407116528495234" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2168 chrome.exe 2168 chrome.exe 3420 chrome.exe 3420 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe Token: SeShutdownPrivilege 2168 chrome.exe Token: SeCreatePagefilePrivilege 2168 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe 2168 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2168 wrote to memory of 4616 2168 chrome.exe 17 PID 2168 wrote to memory of 4616 2168 chrome.exe 17 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 1064 2168 chrome.exe 86 PID 2168 wrote to memory of 3084 2168 chrome.exe 88 PID 2168 wrote to memory of 3084 2168 chrome.exe 88 PID 2168 wrote to memory of 3816 2168 chrome.exe 87 PID 2168 wrote to memory of 3816 2168 chrome.exe 87 PID 2168 wrote to memory of 3816 2168 chrome.exe 87 PID 2168 wrote to memory of 3816 2168 chrome.exe 87 PID 2168 wrote to memory of 3816 2168 chrome.exe 87 PID 2168 wrote to memory of 3816 2168 chrome.exe 87 PID 2168 wrote to memory of 3816 2168 chrome.exe 87 PID 2168 wrote to memory of 3816 2168 chrome.exe 87 PID 2168 wrote to memory of 3816 2168 chrome.exe 87 PID 2168 wrote to memory of 3816 2168 chrome.exe 87 PID 2168 wrote to memory of 3816 2168 chrome.exe 87 PID 2168 wrote to memory of 3816 2168 chrome.exe 87 PID 2168 wrote to memory of 3816 2168 chrome.exe 87 PID 2168 wrote to memory of 3816 2168 chrome.exe 87 PID 2168 wrote to memory of 3816 2168 chrome.exe 87 PID 2168 wrote to memory of 3816 2168 chrome.exe 87 PID 2168 wrote to memory of 3816 2168 chrome.exe 87 PID 2168 wrote to memory of 3816 2168 chrome.exe 87 PID 2168 wrote to memory of 3816 2168 chrome.exe 87 PID 2168 wrote to memory of 3816 2168 chrome.exe 87 PID 2168 wrote to memory of 3816 2168 chrome.exe 87 PID 2168 wrote to memory of 3816 2168 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://s.id/Paquette-ES801627031⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec24c9758,0x7ffec24c9768,0x7ffec24c97782⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1876,i,13469937109159441401,12603095263337381250,131072 /prefetch:22⤵PID:1064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1876,i,13469937109159441401,12603095263337381250,131072 /prefetch:82⤵PID:3816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=1876,i,13469937109159441401,12603095263337381250,131072 /prefetch:82⤵PID:3084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3020 --field-trial-handle=1876,i,13469937109159441401,12603095263337381250,131072 /prefetch:12⤵PID:1384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3012 --field-trial-handle=1876,i,13469937109159441401,12603095263337381250,131072 /prefetch:12⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4868 --field-trial-handle=1876,i,13469937109159441401,12603095263337381250,131072 /prefetch:12⤵PID:2680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 --field-trial-handle=1876,i,13469937109159441401,12603095263337381250,131072 /prefetch:82⤵PID:736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3900 --field-trial-handle=1876,i,13469937109159441401,12603095263337381250,131072 /prefetch:82⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2576 --field-trial-handle=1876,i,13469937109159441401,12603095263337381250,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3420
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5eaa79e9001d9632dbc6fb46812d5cb22
SHA1c589c0cd56c80d0dc5c5d708794a719f1076795b
SHA25645390a5d741551251adce8d90cc40296deb659eab74f8952bc38e922ba683414
SHA512e280e7e0a639885bf442f81ba61802feca25997d70c6bf3f3a3b2c03ec5d0431c5b382dfe12dbfbeaa733ef866dcf1b8ed94c9280251f0dfacd0c63a2eee5146
-
Filesize
2KB
MD58d8a2bdedfa824ec350ff6fa54f17a65
SHA17db71af375a6786dff6484e96fd035f008e9ea81
SHA256cffaba86d2a39bf1987fe80e5b1ceb1a7ffd77b35aab74a4a00e3933bc58fab6
SHA512ed096a2b263ad1d815b9c83711de8eed793f1863c8da18a5ab12e765a638704c12f07bacbad607a1ac178c4340bf75ffaa2881742f3b1c3c838b83a4b525cee4
-
Filesize
1KB
MD5f95baf5db1b39bed64e852e0ece415bc
SHA1c85f6254f92705f4def2e9f05b661441f137e082
SHA256a331fb710b396c7035aca3547f076d8049f0abbff252f7935696b8d0604fc788
SHA51287baf5f1003751526b1a92729dad4e1de2c598b2b719c1ac773ac1e01908ea38b97ca849bbfb20ce8693a69fa85b7335ab68a34914433a9ea91830059e046e62
-
Filesize
6KB
MD5d647b3c110e8df885b01371745fe41b9
SHA10e42c866202092cbf528271f981143e26f36c8c5
SHA256473e63a4e84cbf686932f44dd43a6fc7b5bf5f8be35f0c07f28447ddb5282b89
SHA5124f799628765600681c98b1a5df6c64f2de5f72593a984996556706e34aed96c9aec75461ea4815c68a0d62fbe3ef6248949340de6134a9f01d889f2cfec83b19
-
Filesize
101KB
MD53f7cf2622bab0a0100ac264d888c3e99
SHA19cc39db1be36900536c1028fb209c203d0b25633
SHA25658d34548a676815413d82bf241a009f9f415b803e8ab6fde3ad4ea3c145a1f84
SHA51222fadb25aeb131803aa767cf83745ea2e5998805cce50fa00b0ba83703562b2718abafa34f368d6572e2fb8f76d79c1b6cb5a6e1a60d6988304724f14c1ee858
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd