Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2023 03:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://auclaimantlodgement.info
Resource
win10v2004-20230915-en
General
-
Target
https://auclaimantlodgement.info
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133408652024758088" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 4104 chrome.exe 4104 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2140 chrome.exe 2140 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe Token: SeShutdownPrivilege 2140 chrome.exe Token: SeCreatePagefilePrivilege 2140 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe 2140 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2140 wrote to memory of 1528 2140 chrome.exe 82 PID 2140 wrote to memory of 1528 2140 chrome.exe 82 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 1776 2140 chrome.exe 86 PID 2140 wrote to memory of 2648 2140 chrome.exe 85 PID 2140 wrote to memory of 2648 2140 chrome.exe 85 PID 2140 wrote to memory of 964 2140 chrome.exe 84 PID 2140 wrote to memory of 964 2140 chrome.exe 84 PID 2140 wrote to memory of 964 2140 chrome.exe 84 PID 2140 wrote to memory of 964 2140 chrome.exe 84 PID 2140 wrote to memory of 964 2140 chrome.exe 84 PID 2140 wrote to memory of 964 2140 chrome.exe 84 PID 2140 wrote to memory of 964 2140 chrome.exe 84 PID 2140 wrote to memory of 964 2140 chrome.exe 84 PID 2140 wrote to memory of 964 2140 chrome.exe 84 PID 2140 wrote to memory of 964 2140 chrome.exe 84 PID 2140 wrote to memory of 964 2140 chrome.exe 84 PID 2140 wrote to memory of 964 2140 chrome.exe 84 PID 2140 wrote to memory of 964 2140 chrome.exe 84 PID 2140 wrote to memory of 964 2140 chrome.exe 84 PID 2140 wrote to memory of 964 2140 chrome.exe 84 PID 2140 wrote to memory of 964 2140 chrome.exe 84 PID 2140 wrote to memory of 964 2140 chrome.exe 84 PID 2140 wrote to memory of 964 2140 chrome.exe 84 PID 2140 wrote to memory of 964 2140 chrome.exe 84 PID 2140 wrote to memory of 964 2140 chrome.exe 84 PID 2140 wrote to memory of 964 2140 chrome.exe 84 PID 2140 wrote to memory of 964 2140 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://auclaimantlodgement.info1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb76aa9758,0x7ffb76aa9768,0x7ffb76aa97782⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2188 --field-trial-handle=1972,i,1752624503969015092,16234252019194530096,131072 /prefetch:82⤵PID:964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1912 --field-trial-handle=1972,i,1752624503969015092,16234252019194530096,131072 /prefetch:82⤵PID:2648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1972,i,1752624503969015092,16234252019194530096,131072 /prefetch:22⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1972,i,1752624503969015092,16234252019194530096,131072 /prefetch:12⤵PID:3384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1972,i,1752624503969015092,16234252019194530096,131072 /prefetch:12⤵PID:980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 --field-trial-handle=1972,i,1752624503969015092,16234252019194530096,131072 /prefetch:82⤵PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 --field-trial-handle=1972,i,1752624503969015092,16234252019194530096,131072 /prefetch:82⤵PID:3092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 --field-trial-handle=1972,i,1752624503969015092,16234252019194530096,131072 /prefetch:82⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 --field-trial-handle=1972,i,1752624503969015092,16234252019194530096,131072 /prefetch:82⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=932 --field-trial-handle=1972,i,1752624503969015092,16234252019194530096,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4104
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD50d173c423d0cb55d35de47a3230c368a
SHA12afa21ea7c7a2fa069c518e12824e5f9638c188e
SHA2563cbd0bf66f1adec2eb8d0bf77e57ade94306cd59c43b275c37790822ddb2907d
SHA5120738cbb8e5b25d2bedb376099cecf81aa7ad990e0f0ac77e3d3af09c0efe9f45ec2904ae479d862d94308fb80d0e6d72f0373e211abb69a686f262ed118f4274
-
Filesize
1KB
MD5a470ef0287b6a44b8269ff92126a9e6b
SHA1b19da93581af1f62bded5deb778694366ba2dd81
SHA256dbc1b86ac826a434d0cb3fe8e8ff12dc9d76d7609b8baf4fae6e4baa64df3504
SHA51206461c823952fb474bc6731f776c9a8aad2898d0cd1665d74a6bcb98aa63812932e75f4e422511568ce8906d3866928af5faf06e8b41ad9ea00941609b10d305
-
Filesize
2KB
MD5182fd4dda96c926554fee97be4716544
SHA16865666329666963504f703a34dab0009f758eaa
SHA256ace43c45dad509a58693a39208c26bfed2d9ca56f9f3bb764af7678d3561f827
SHA5120a55a88a80521de3c595018ca744a7082caf45d76ac25326db00b89783b26747f8aa9c587350a9335943ff607830cda60458577af1317456e9ce9f186b844d6b
-
Filesize
539B
MD579bf4f5985c816652b1b84484af033df
SHA11e554418634698f60f93b5fd8ecb1523f2bd5ddd
SHA256737eea7f76463b556afcf2188f6c87aaf2c08612cbae8da262106cb328046545
SHA5120e08d85f50bb323a3b084c62e51a7dc95420aade4dd51f2fdbb3a53a578d3430e4b6f86577ab21e0f0a7e3698fdf4a43eee6d94a6d48d5b87f27233af2061d0a
-
Filesize
6KB
MD53fe4b8688f62896cce9966fa560e35af
SHA11efefa83c91a8f55ca9d277282fec7ecaf014e34
SHA256a967adbaa03d727506c1104f4fa80f380d138084755b4f1255dd2ada04413327
SHA51277fcb8459d1d1b43fcf1b8a99a869e0aaca32fc2407f99a11030197f1d65bf2090cf6dd69952e08698ec167b0b72b78ded6d2784eab84943833fa4eaf56aca61
-
Filesize
5KB
MD52da570a9f29cba7b7db5ba8567f6e988
SHA1e912f60e44e0f37acaef5ee4769e9ce3b48f533c
SHA2567e908087334c273cafb6eb97b06ebbbffb2d8734290328844395530b5e51bcb6
SHA512a65f1434c8bcc971f9c2b300aab7d4cd4b3829a5a305588007ef17da2ba70d8f6019dd955d9420e6f28040f17184d04266dc7b71f207d3eeb10685861775e056
-
Filesize
5KB
MD53751e1513244a5d7508a08ca77c0b04f
SHA1b7638f4bcf93f1539e76605837599b2d93dc26e1
SHA2565d42fe82d555d59b02d9dc457f1ae27d541584a4fdfeb3503dc3dd6ec2f8b36b
SHA51258f69165fe07e317e1ad8be1eb4e72c1e7f4737e7455a7f63fc6f744429c71a7ccef0e978131419b19f19a191796d94167b4397972424b902bfedd97ef9379b3
-
Filesize
103KB
MD5082ea73081ed92a419cb2973c0d349d8
SHA121b3e42929eb9ea4e16e76e9164e9e243955e35f
SHA256aa0423315c9c7bb6ae788e0b71af564b01599e902c30823789fe18b54a7fb39a
SHA5120037cb4bddae8801e90cd57aa05179f0d33d1dd4e3333e5e8d52dcaa67c96fbf38fa89b4f284749715edf99a15aa1174b06f07aba8eede40900a9055db8b3c52
-
Filesize
104KB
MD5a9184ca97b99852451b00404a11c7521
SHA1c721a3f9ec44c13fbff1517dbc4aa79f512d8219
SHA2569e0b669cb2de815b7b7aaaada83b4dd52b59380f72ecceb1f44095887dd658d1
SHA512cedbd883db2466b37574e5c0967d062427ccb1efae08659260cdeeeb6793159f8818f9212e067a3bea54b25e307164162dc7e2b744fd34d52558656b87b579c7
-
Filesize
138KB
MD54508cec7fe5137cd93f15929698e0f0b
SHA106588f83baaf279f3340e83157b03a35dc7d5040
SHA2562499d8ca9727677d4225208c16798d134015c08cdb0e992d3033bdd29abaaad6
SHA512a991c51080070f10e915e134707970148d1484c9726eae2c9d7f4436f556803bcddd011bb201cbe96421c76dc68a5d9d801fa512b63bb754136d63014cedee76
-
Filesize
103KB
MD59ba6a005b7549e4a61e5ee1f2536f148
SHA151472355ae3d62c6b954f1b489ed830fb49e1cd7
SHA2560c5c00ede5ffe22ee5da593b6b91be1bd719f17bdd6331fea2d571dc4d783048
SHA5127651ff5a79d5277d4a5a461c2fbd52fdc53b90177e143ffcdbbb5417c5b6c0e1e2f0110952a9cc758501fd3dc61236cd8ce9f9ff54c21ffab3f3257f877842d2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd