Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2023, 09:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://m.vector.com/a.php?sid=e80i.1atqgbf,f=6,u=f6374b211444f3f3c4fc279f2cf15eb1,n=e80i.1atqgbf,artref=320345
Resource
win10v2004-20230915-en
General
-
Target
https://m.vector.com/a.php?sid=e80i.1atqgbf,f=6,u=f6374b211444f3f3c4fc279f2cf15eb1,n=e80i.1atqgbf,artref=320345
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133408870876241908" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4216 chrome.exe 4216 chrome.exe 4220 chrome.exe 4220 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4216 chrome.exe 4216 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4216 wrote to memory of 4384 4216 chrome.exe 85 PID 4216 wrote to memory of 4384 4216 chrome.exe 85 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 4284 4216 chrome.exe 87 PID 4216 wrote to memory of 2564 4216 chrome.exe 91 PID 4216 wrote to memory of 2564 4216 chrome.exe 91 PID 4216 wrote to memory of 2024 4216 chrome.exe 88 PID 4216 wrote to memory of 2024 4216 chrome.exe 88 PID 4216 wrote to memory of 2024 4216 chrome.exe 88 PID 4216 wrote to memory of 2024 4216 chrome.exe 88 PID 4216 wrote to memory of 2024 4216 chrome.exe 88 PID 4216 wrote to memory of 2024 4216 chrome.exe 88 PID 4216 wrote to memory of 2024 4216 chrome.exe 88 PID 4216 wrote to memory of 2024 4216 chrome.exe 88 PID 4216 wrote to memory of 2024 4216 chrome.exe 88 PID 4216 wrote to memory of 2024 4216 chrome.exe 88 PID 4216 wrote to memory of 2024 4216 chrome.exe 88 PID 4216 wrote to memory of 2024 4216 chrome.exe 88 PID 4216 wrote to memory of 2024 4216 chrome.exe 88 PID 4216 wrote to memory of 2024 4216 chrome.exe 88 PID 4216 wrote to memory of 2024 4216 chrome.exe 88 PID 4216 wrote to memory of 2024 4216 chrome.exe 88 PID 4216 wrote to memory of 2024 4216 chrome.exe 88 PID 4216 wrote to memory of 2024 4216 chrome.exe 88 PID 4216 wrote to memory of 2024 4216 chrome.exe 88 PID 4216 wrote to memory of 2024 4216 chrome.exe 88 PID 4216 wrote to memory of 2024 4216 chrome.exe 88 PID 4216 wrote to memory of 2024 4216 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://m.vector.com/a.php?sid=e80i.1atqgbf,f=6,u=f6374b211444f3f3c4fc279f2cf15eb1,n=e80i.1atqgbf,artref=3203451⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb64949758,0x7ffb64949768,0x7ffb649497782⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1912,i,10072287161505627244,9677393066827372109,131072 /prefetch:22⤵PID:4284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2256 --field-trial-handle=1912,i,10072287161505627244,9677393066827372109,131072 /prefetch:82⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3012 --field-trial-handle=1912,i,10072287161505627244,9677393066827372109,131072 /prefetch:12⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3008 --field-trial-handle=1912,i,10072287161505627244,9677393066827372109,131072 /prefetch:12⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1912,i,10072287161505627244,9677393066827372109,131072 /prefetch:82⤵PID:2564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 --field-trial-handle=1912,i,10072287161505627244,9677393066827372109,131072 /prefetch:82⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 --field-trial-handle=1912,i,10072287161505627244,9677393066827372109,131072 /prefetch:82⤵PID:208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5268 --field-trial-handle=1912,i,10072287161505627244,9677393066827372109,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4220
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD5f5f1348a29676ec74380879092083a61
SHA1514e7eae844db5803de978c045a2158cd0ba32ed
SHA256702875f5ff7396170dc810c733c8ea09fd65b3441b4c9724da426942f36aae64
SHA5128fdb48195b84f24fb36cceff462592c745b8baa3b98e2c08e6dac4cde6c0a89e85b6ad08a42902993d7dc4d24472faa03de8524f5b1427d4cc4f9a32e5e9b3c0
-
Filesize
1KB
MD53bf8600fdc8232724336238b74c708d8
SHA1e63ca5af497d54e4af11f9d05cd36c6dc441389e
SHA256810c7ec62758a04eecdbee8a9b393b5d4c9e23f44f49564f15ccc7ea0314145c
SHA512bfb04fe85aa2dee74487b84ff49df090f979d0c3c8f5261cae3241f54586f7ad6208bb518fbbb69fa7285f210ecdf3df8500d8b431a4bf1939612ea41461188e
-
Filesize
706B
MD5d80942151cd279c320ab1ee798f35204
SHA1061e2a637544e78579b67627cf52f1b2cc9ccdf1
SHA25604c4efea7ffb67e4d6f9b31faa3f0d37361fec135cc24c815bd16fb355d0db8d
SHA512cf36bfe709efa42d46dbd5e37361db8b8b73d26dda117b5767aee51fdb7c611a24270cc9288dac343813ea83b8d9306abd0f24e8a27336dfb6e3c48e330eafb1
-
Filesize
6KB
MD5c5a1bc0be4c00458847a38b55aaf27b9
SHA1103bfa41912b50618dad1a11e7873500ea4c8716
SHA2560595b366a7bcb9abbdc20383c03a70e3dd0d2029e42abc1df2f79c21369ef802
SHA512aee84bf84539140921bc5da1dff55b3da898c893d18964987f82798e949237b65c2c503207ecddfa12524c7c5feca6e43ae7028c9c9f803b0d60b2ba9138ac70
-
Filesize
101KB
MD5e4047bad26fab6c5f0e1b17391ba3eb9
SHA1b27ca3208ae1ae349bb27937c3295505723b6193
SHA25696fb08a82355baf9f87d54ed80e38be40d1de2e981d908bf04fb42366d986494
SHA512bdf48f50f5178ce47544533b316215676cc3a9365722cc942bf8ec30a52b59d878ed83b0de14e4ffe3c86bb554fabfc7a3f288dfb7dc0973c515dfb4c47605ab
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd