Analysis
-
max time kernel
53s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2023, 20:56
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.google.com/amp/s/google.com.ua%2famp%2fs%2fwww.sawlfa.co.za%2f.new%2fauth%2f3cs6%2f%2fXSBeo%2f%2f%2f%2fYmhjaW5mb0BkY2NjZC5lZHU=
Resource
win10v2004-20230915-en
General
-
Target
https://www.google.com/amp/s/google.com.ua%2famp%2fs%2fwww.sawlfa.co.za%2f.new%2fauth%2f3cs6%2f%2fXSBeo%2f%2f%2f%2fYmhjaW5mb0BkY2NjZC5lZHU=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133410129857246989" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4732 chrome.exe 4732 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4732 wrote to memory of 820 4732 chrome.exe 85 PID 4732 wrote to memory of 820 4732 chrome.exe 85 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 1048 4732 chrome.exe 88 PID 4732 wrote to memory of 456 4732 chrome.exe 89 PID 4732 wrote to memory of 456 4732 chrome.exe 89 PID 4732 wrote to memory of 264 4732 chrome.exe 92 PID 4732 wrote to memory of 264 4732 chrome.exe 92 PID 4732 wrote to memory of 264 4732 chrome.exe 92 PID 4732 wrote to memory of 264 4732 chrome.exe 92 PID 4732 wrote to memory of 264 4732 chrome.exe 92 PID 4732 wrote to memory of 264 4732 chrome.exe 92 PID 4732 wrote to memory of 264 4732 chrome.exe 92 PID 4732 wrote to memory of 264 4732 chrome.exe 92 PID 4732 wrote to memory of 264 4732 chrome.exe 92 PID 4732 wrote to memory of 264 4732 chrome.exe 92 PID 4732 wrote to memory of 264 4732 chrome.exe 92 PID 4732 wrote to memory of 264 4732 chrome.exe 92 PID 4732 wrote to memory of 264 4732 chrome.exe 92 PID 4732 wrote to memory of 264 4732 chrome.exe 92 PID 4732 wrote to memory of 264 4732 chrome.exe 92 PID 4732 wrote to memory of 264 4732 chrome.exe 92 PID 4732 wrote to memory of 264 4732 chrome.exe 92 PID 4732 wrote to memory of 264 4732 chrome.exe 92 PID 4732 wrote to memory of 264 4732 chrome.exe 92 PID 4732 wrote to memory of 264 4732 chrome.exe 92 PID 4732 wrote to memory of 264 4732 chrome.exe 92 PID 4732 wrote to memory of 264 4732 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.google.com/amp/s/google.com.ua%2famp%2fs%2fwww.sawlfa.co.za%2f.new%2fauth%2f3cs6%2f%2fXSBeo%2f%2f%2f%2fYmhjaW5mb0BkY2NjZC5lZHU=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa7be19758,0x7ffa7be19768,0x7ffa7be197782⤵PID:820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1868,i,4924927731390514872,824213452463895391,131072 /prefetch:22⤵PID:1048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1868,i,4924927731390514872,824213452463895391,131072 /prefetch:82⤵PID:456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2944 --field-trial-handle=1868,i,4924927731390514872,824213452463895391,131072 /prefetch:12⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2936 --field-trial-handle=1868,i,4924927731390514872,824213452463895391,131072 /prefetch:12⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1868,i,4924927731390514872,824213452463895391,131072 /prefetch:82⤵PID:264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 --field-trial-handle=1868,i,4924927731390514872,824213452463895391,131072 /prefetch:82⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 --field-trial-handle=1868,i,4924927731390514872,824213452463895391,131072 /prefetch:82⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4648 --field-trial-handle=1868,i,4924927731390514872,824213452463895391,131072 /prefetch:12⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3364 --field-trial-handle=1868,i,4924927731390514872,824213452463895391,131072 /prefetch:12⤵PID:912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5432 --field-trial-handle=1868,i,4924927731390514872,824213452463895391,131072 /prefetch:12⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5444 --field-trial-handle=1868,i,4924927731390514872,824213452463895391,131072 /prefetch:12⤵PID:3308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4660 --field-trial-handle=1868,i,4924927731390514872,824213452463895391,131072 /prefetch:12⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5820 --field-trial-handle=1868,i,4924927731390514872,824213452463895391,131072 /prefetch:12⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5768 --field-trial-handle=1868,i,4924927731390514872,824213452463895391,131072 /prefetch:12⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD5bb646842cc0768b87b9b2057504e9bcb
SHA197840a0045631bc8385792b87998cc2700e9ec25
SHA2565bdb5f4327a9488ad051eb90ec15a75cfb8a6b40e8155126634969fdb10fc118
SHA51262bf8e39e9e10a9ff39db13455c7a10bdb9625c3dc1b19c8f4859a7699c1e6720050ce33f3b52b907a504eba1e625b7d4509b759206b1c2f66f3229480b347b0
-
Filesize
539B
MD502f72671ba5722be55c9c97ce17499b5
SHA1a0a2e4bc7df5679b5003f9bd0b84481357fd8c50
SHA256fe9292e17d1c957f0c4e01e21fd85cebd187077a6a1e73a514a0029d988b514d
SHA512143f0cd3f2873b1ed32397f48ae0ffa115f3de0fed16250f9406de9d8ab02cc0c7cf458d741147a637bc48ea7092f15c048bdf94c9f1b2c813f94447fb4703aa
-
Filesize
1KB
MD5392ec7dcfdbba06dcc3cb43b6004f31d
SHA11ec94b605318f8890250815e69ad43ab5c432193
SHA256035aeeb697909a32d6ed3298e92ba9a7bb025207d23682bcfc48b0d47443e630
SHA5123d3f23a4db89fd072c219f764973a04bd357b2ccc64c587de259c5241f75eab333461f48c126b5d8c90d42e5d7bc7827d1e2a6407ff885025d713da6aad418a6
-
Filesize
6KB
MD5fe8cd512deab302308f9ee9f62660ba8
SHA16847821a02b60dc102f2e17e459562a59b766e7d
SHA256dd14b9190980333e46e8672cfbbd710880e63b5e0c1d08972f52c46281dce0ee
SHA5121a5b5b2985bd0a7100519f233f64fe2d572d90c7295c9fec03cfbf0cedc2916e12c5a4045a5e204105823d7fd80687978e0a5ce29ead5aea039568af9e6a343b
-
Filesize
6KB
MD5024399fbd10c83fa061242b4b91237b3
SHA18bf3b293790ca50a758cd96d5fd8de1b82b0386f
SHA2569a64f850f5a0d7693674452eb0c11244b73643470fcd41da6b206b93e998fb09
SHA5125325b16f8e505b954a09e37bb1628da3bd890d62389638fd81aedbc4d722e9b5d8409d817320cc7ca752831c30f42c89315508ae88b45d7719ce7f43fdd1cf94
-
Filesize
101KB
MD567134f34d61720cb934b8e794f1bc9cb
SHA1f8e5baf48a89f8bc9f1eb49a033375b44095211c
SHA2564c7c3b0e290b6a934c47b333298ff73f92251aa05da2280ea32eb4199ee9ad5a
SHA51213c5893b0eeefa9b3f5006ceccc97450f48f64051b88b944ed9bc99ded0cbdc6aad8c6d1dd510d6218c484a9344fee9c0b9b1163a84d3fec959e617d51402a2c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd