Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2023 03:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://hxxpsmedicarelevy-exemption.info/gov/MyGov
Resource
win10v2004-20230915-en
General
-
Target
https://hxxpsmedicarelevy-exemption.info/gov/MyGov
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133408655693730501" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4632 chrome.exe 4632 chrome.exe 2324 chrome.exe 2324 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe Token: SeShutdownPrivilege 4632 chrome.exe Token: SeCreatePagefilePrivilege 4632 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe 4632 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4632 wrote to memory of 1420 4632 chrome.exe 47 PID 4632 wrote to memory of 1420 4632 chrome.exe 47 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 4772 4632 chrome.exe 88 PID 4632 wrote to memory of 1716 4632 chrome.exe 90 PID 4632 wrote to memory of 1716 4632 chrome.exe 90 PID 4632 wrote to memory of 3788 4632 chrome.exe 89 PID 4632 wrote to memory of 3788 4632 chrome.exe 89 PID 4632 wrote to memory of 3788 4632 chrome.exe 89 PID 4632 wrote to memory of 3788 4632 chrome.exe 89 PID 4632 wrote to memory of 3788 4632 chrome.exe 89 PID 4632 wrote to memory of 3788 4632 chrome.exe 89 PID 4632 wrote to memory of 3788 4632 chrome.exe 89 PID 4632 wrote to memory of 3788 4632 chrome.exe 89 PID 4632 wrote to memory of 3788 4632 chrome.exe 89 PID 4632 wrote to memory of 3788 4632 chrome.exe 89 PID 4632 wrote to memory of 3788 4632 chrome.exe 89 PID 4632 wrote to memory of 3788 4632 chrome.exe 89 PID 4632 wrote to memory of 3788 4632 chrome.exe 89 PID 4632 wrote to memory of 3788 4632 chrome.exe 89 PID 4632 wrote to memory of 3788 4632 chrome.exe 89 PID 4632 wrote to memory of 3788 4632 chrome.exe 89 PID 4632 wrote to memory of 3788 4632 chrome.exe 89 PID 4632 wrote to memory of 3788 4632 chrome.exe 89 PID 4632 wrote to memory of 3788 4632 chrome.exe 89 PID 4632 wrote to memory of 3788 4632 chrome.exe 89 PID 4632 wrote to memory of 3788 4632 chrome.exe 89 PID 4632 wrote to memory of 3788 4632 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://hxxpsmedicarelevy-exemption.info/gov/MyGov1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa841b9758,0x7ffa841b9768,0x7ffa841b97782⤵PID:1420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1720,i,11785932938892085286,8394007769261949468,131072 /prefetch:22⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2156 --field-trial-handle=1720,i,11785932938892085286,8394007769261949468,131072 /prefetch:82⤵PID:3788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1720,i,11785932938892085286,8394007769261949468,131072 /prefetch:82⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3092 --field-trial-handle=1720,i,11785932938892085286,8394007769261949468,131072 /prefetch:12⤵PID:3932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3116 --field-trial-handle=1720,i,11785932938892085286,8394007769261949468,131072 /prefetch:12⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4020 --field-trial-handle=1720,i,11785932938892085286,8394007769261949468,131072 /prefetch:12⤵PID:4320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3476 --field-trial-handle=1720,i,11785932938892085286,8394007769261949468,131072 /prefetch:12⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 --field-trial-handle=1720,i,11785932938892085286,8394007769261949468,131072 /prefetch:82⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 --field-trial-handle=1720,i,11785932938892085286,8394007769261949468,131072 /prefetch:82⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4888 --field-trial-handle=1720,i,11785932938892085286,8394007769261949468,131072 /prefetch:12⤵PID:936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3496 --field-trial-handle=1720,i,11785932938892085286,8394007769261949468,131072 /prefetch:12⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=212 --field-trial-handle=1720,i,11785932938892085286,8394007769261949468,131072 /prefetch:12⤵PID:4948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4800 --field-trial-handle=1720,i,11785932938892085286,8394007769261949468,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2052
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1640
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:4288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD593bac5c18d6ba28ca9459fb758679c04
SHA12ca33cc471bd484fc5f9ff9a74396a258e7cb537
SHA256d2afd25826cdf4920d2a26e465543e995e24c3ead4ee79b09f513949ce7d111c
SHA51242fe609eb6acaf70dcdc8f176376268360ace81f866c418e2aea2c59cb530b8abd5f42ff59de0938d5deb01bd1c404ae317109bcdbf3d6c545afc15e338526dd
-
Filesize
6KB
MD5273f328c8294eb27c71d5c8d255ed3ab
SHA136a6a36b9a56da7d363ddee14da60eb8dd1b4b6c
SHA2560e7896724ebfcf901011950382928e5793b2f047c1b88fa021f477b1a965638d
SHA512326b10445068e6e0e2d372f949e996cd78881158229a8f0aac914fe9607c05ff698281be48297b66161bfcca75b3a280a666452bc9a4ed9eec74979dde27cd95
-
Filesize
6KB
MD5c8ceccfbf6528dbf059ed01466c992ee
SHA10a19b9d6c3f63f15210976862717422a9bba663d
SHA25676fe74d7bc5d79ac6688bdfb21f5cdfd5c54f58e0a056121d05b0474d2914fcd
SHA5122843e2d3eeaae34d263114fcbef1c846a5aed8f734c26a3fdd501e415b1bc6a3b075431394061e07b826b25bbbad35b6f84bad46500ce0817689783fbb3a942c
-
Filesize
101KB
MD56941000d43c42a1e9c6a5ebff2afee36
SHA123b5c8462438af257b7d241c808af770f4e35554
SHA256473c677b4c88c961faed25d86c113a01657c969b903c6ada174ce69cbe68a357
SHA5122b928994a788aebdc1f088c1103be06a2272b73e83387e52f2c25076b56f05ab8f632d9ebaf806525d90fc954ba703b70bb62ac379238bf95861bc019bc57d4d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd