Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2023, 22:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://auonlineservice.org/notice
Resource
win10v2004-20230915-en
General
-
Target
https://auonlineservice.org/notice
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133408475672217805" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4100 chrome.exe 4100 chrome.exe 3384 chrome.exe 3384 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe Token: SeShutdownPrivilege 4100 chrome.exe Token: SeCreatePagefilePrivilege 4100 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe 4100 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4100 wrote to memory of 4872 4100 chrome.exe 57 PID 4100 wrote to memory of 4872 4100 chrome.exe 57 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 4148 4100 chrome.exe 88 PID 4100 wrote to memory of 2268 4100 chrome.exe 90 PID 4100 wrote to memory of 2268 4100 chrome.exe 90 PID 4100 wrote to memory of 756 4100 chrome.exe 89 PID 4100 wrote to memory of 756 4100 chrome.exe 89 PID 4100 wrote to memory of 756 4100 chrome.exe 89 PID 4100 wrote to memory of 756 4100 chrome.exe 89 PID 4100 wrote to memory of 756 4100 chrome.exe 89 PID 4100 wrote to memory of 756 4100 chrome.exe 89 PID 4100 wrote to memory of 756 4100 chrome.exe 89 PID 4100 wrote to memory of 756 4100 chrome.exe 89 PID 4100 wrote to memory of 756 4100 chrome.exe 89 PID 4100 wrote to memory of 756 4100 chrome.exe 89 PID 4100 wrote to memory of 756 4100 chrome.exe 89 PID 4100 wrote to memory of 756 4100 chrome.exe 89 PID 4100 wrote to memory of 756 4100 chrome.exe 89 PID 4100 wrote to memory of 756 4100 chrome.exe 89 PID 4100 wrote to memory of 756 4100 chrome.exe 89 PID 4100 wrote to memory of 756 4100 chrome.exe 89 PID 4100 wrote to memory of 756 4100 chrome.exe 89 PID 4100 wrote to memory of 756 4100 chrome.exe 89 PID 4100 wrote to memory of 756 4100 chrome.exe 89 PID 4100 wrote to memory of 756 4100 chrome.exe 89 PID 4100 wrote to memory of 756 4100 chrome.exe 89 PID 4100 wrote to memory of 756 4100 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://auonlineservice.org/notice1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9ea6a9758,0x7ff9ea6a9768,0x7ff9ea6a97782⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1748,i,12055349254296046078,9026828935256866850,131072 /prefetch:22⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2176 --field-trial-handle=1748,i,12055349254296046078,9026828935256866850,131072 /prefetch:82⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1748,i,12055349254296046078,9026828935256866850,131072 /prefetch:82⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2884 --field-trial-handle=1748,i,12055349254296046078,9026828935256866850,131072 /prefetch:12⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2876 --field-trial-handle=1748,i,12055349254296046078,9026828935256866850,131072 /prefetch:12⤵PID:3696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4532 --field-trial-handle=1748,i,12055349254296046078,9026828935256866850,131072 /prefetch:12⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2108 --field-trial-handle=1748,i,12055349254296046078,9026828935256866850,131072 /prefetch:12⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3120 --field-trial-handle=1748,i,12055349254296046078,9026828935256866850,131072 /prefetch:12⤵PID:3948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 --field-trial-handle=1748,i,12055349254296046078,9026828935256866850,131072 /prefetch:82⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 --field-trial-handle=1748,i,12055349254296046078,9026828935256866850,131072 /prefetch:82⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3104 --field-trial-handle=1748,i,12055349254296046078,9026828935256866850,131072 /prefetch:12⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2688 --field-trial-handle=1748,i,12055349254296046078,9026828935256866850,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3384
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD504e7f9920dcf38bc851359d81e40ce5b
SHA109a4838d278d46641fe282713b1c8a8bbd3461d2
SHA25623f46458ff6047f9f10056619947e7795837305457f7dc722ed0c62804fd87b6
SHA512ddb5dc715a71c11713b1eae5b4a2a570a4f42a909bbfeb3a6787ee853e956f61bb200a4ef651a696915e470e21e53cee299ac4d468afbbfc116476ad634852ea
-
Filesize
2KB
MD57c27ae1501e6ac101c53369c2456f589
SHA13ed4494d91ac02d23052c0a2a9dd5517259fab4b
SHA25685093e3834320f83609796176263732471efabe5f0e3d737cc35528ff4380a49
SHA512f5173b9ca9e12b5e9622ff066dc4bcaa439d1b6d8dda049554d6c864cbf36e0d664e1e91a9b36aea50737085d2640d1f7f00ceddc2b9ed110575573ca07f81c2
-
Filesize
539B
MD5c58f5d5a5aa028247bd778e417e69e71
SHA1da4f52b2e22cbc940d4190ae1d67501e790adb0d
SHA256f462adbf62b36c6975c22392d3e55b4344661d257f6357284f14638d77a782f2
SHA512c6a6583ce85ababea93c89687c5902c7071e77c23a51988b930756fb0cb5165cce2d3723985376270f5ec3af1096b0641785a8b582eed5c1351e8d076c6b07d6
-
Filesize
6KB
MD5992942b6a6fbbdc9266bc8a18d7ff0f1
SHA165ba683b45e2c06cf74ca801f1c3be2e39a5a56a
SHA2569c434891353251746e05ebce8289dd4fbe2bb6e1e6cadaec1037310cec171268
SHA51288b619fbe37938b46b4ca41d598943534ca37a3b96ac5c8f8fabd92ded52fbfeafcf8f69bfe2dbf52779cb4c1b919bf5e255e69e014e2a69c064d72c1196115d
-
Filesize
101KB
MD5abc90d5bc80fa5c6e9247e2f1f1d2a1c
SHA18fb55e5b8d95a9bc7df140f67f6a65d971f44310
SHA256c6ef5e3ed504a25c26d5ff46b1c6fe17d8d2c3a3af6a3cca8d684a4e7756f0de
SHA5125603c0dcfae2621f1f132e1827ac2c56428750159e3c3623e84f383bb879bf9ac930ac3905384241ec8ca641b708ef55dddc5183a5da9af20268c1c34ae6f79c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd