Analysis
-
max time kernel
1802s -
max time network
1709s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 03:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://processing-taxrefund.services/au
Resource
win10v2004-20230915-en
General
-
Target
https://processing-taxrefund.services/au
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133415568272000163" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1668 chrome.exe 1668 chrome.exe 2356 chrome.exe 2356 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1648 1668 chrome.exe 84 PID 1668 wrote to memory of 1648 1668 chrome.exe 84 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1268 1668 chrome.exe 88 PID 1668 wrote to memory of 1496 1668 chrome.exe 89 PID 1668 wrote to memory of 1496 1668 chrome.exe 89 PID 1668 wrote to memory of 3936 1668 chrome.exe 90 PID 1668 wrote to memory of 3936 1668 chrome.exe 90 PID 1668 wrote to memory of 3936 1668 chrome.exe 90 PID 1668 wrote to memory of 3936 1668 chrome.exe 90 PID 1668 wrote to memory of 3936 1668 chrome.exe 90 PID 1668 wrote to memory of 3936 1668 chrome.exe 90 PID 1668 wrote to memory of 3936 1668 chrome.exe 90 PID 1668 wrote to memory of 3936 1668 chrome.exe 90 PID 1668 wrote to memory of 3936 1668 chrome.exe 90 PID 1668 wrote to memory of 3936 1668 chrome.exe 90 PID 1668 wrote to memory of 3936 1668 chrome.exe 90 PID 1668 wrote to memory of 3936 1668 chrome.exe 90 PID 1668 wrote to memory of 3936 1668 chrome.exe 90 PID 1668 wrote to memory of 3936 1668 chrome.exe 90 PID 1668 wrote to memory of 3936 1668 chrome.exe 90 PID 1668 wrote to memory of 3936 1668 chrome.exe 90 PID 1668 wrote to memory of 3936 1668 chrome.exe 90 PID 1668 wrote to memory of 3936 1668 chrome.exe 90 PID 1668 wrote to memory of 3936 1668 chrome.exe 90 PID 1668 wrote to memory of 3936 1668 chrome.exe 90 PID 1668 wrote to memory of 3936 1668 chrome.exe 90 PID 1668 wrote to memory of 3936 1668 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://processing-taxrefund.services/au1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff5e809758,0x7fff5e809768,0x7fff5e8097782⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1804,i,5280831416307336610,17258585195898335049,131072 /prefetch:22⤵PID:1268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1804,i,5280831416307336610,17258585195898335049,131072 /prefetch:82⤵PID:1496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1804,i,5280831416307336610,17258585195898335049,131072 /prefetch:82⤵PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3108 --field-trial-handle=1804,i,5280831416307336610,17258585195898335049,131072 /prefetch:12⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3080 --field-trial-handle=1804,i,5280831416307336610,17258585195898335049,131072 /prefetch:12⤵PID:3492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4624 --field-trial-handle=1804,i,5280831416307336610,17258585195898335049,131072 /prefetch:12⤵PID:228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4812 --field-trial-handle=1804,i,5280831416307336610,17258585195898335049,131072 /prefetch:12⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 --field-trial-handle=1804,i,5280831416307336610,17258585195898335049,131072 /prefetch:82⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3976 --field-trial-handle=1804,i,5280831416307336610,17258585195898335049,131072 /prefetch:82⤵PID:216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5092 --field-trial-handle=1804,i,5280831416307336610,17258585195898335049,131072 /prefetch:12⤵PID:4396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3708 --field-trial-handle=1804,i,5280831416307336610,17258585195898335049,131072 /prefetch:12⤵PID:1260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4804 --field-trial-handle=1804,i,5280831416307336610,17258585195898335049,131072 /prefetch:12⤵PID:1672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3828 --field-trial-handle=1804,i,5280831416307336610,17258585195898335049,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5124 --field-trial-handle=1804,i,5280831416307336610,17258585195898335049,131072 /prefetch:12⤵PID:3932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5004 --field-trial-handle=1804,i,5280831416307336610,17258585195898335049,131072 /prefetch:12⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD501d284a5ea7ad8dcacd10d5ff8c84a4b
SHA100c822d14c1808794729108b9fc6c14f98344e7c
SHA256387cae0fa44d5476ebfdbaf39bcb095135249690484668cf5b497b803daf8ba8
SHA512c1892123888c0fac8fa26a1022334f0e23be3fa11441cebd093ed42ea979da56344da3eb57258ed2885a8013c09161322bf317a5178ab7b9242053a0aca540b0
-
Filesize
6KB
MD56ebabb87474bcfa6c19b5e511aba09a1
SHA189b4e82046b158ba4cc83c5356028f2e3ceca6d8
SHA2566cfc79febf8fe7eea396b9d5c2dbf6bb758c6f9b186998ec8811c5f8aeea3ea8
SHA512dbcbff523215a46e0ffe438dd4cae3758bd33c8d54718519837190a3b194d52ee1c142e3465d387464b0ed513f9780d5c087019a77380495652cc7b301f97ce6
-
Filesize
6KB
MD51b49cb895a944a242db016432f228c7a
SHA193094d66558874e5c74be9e24d366f526887609f
SHA256a6825830a0ee57e5098b38b821b8b0241bbe920585c65c23c493323866170e5e
SHA512aa8c983eeca1f62bcebd5c198db799d2b1f2c8019982c3c6ab09fd2298d35d517666a30fe66eee0183172a5dbf77d1eefa54871dca28b9561f2b7815deaa0d9d
-
Filesize
101KB
MD5900229cf54b482a6b27ecb3f316dc038
SHA15ff22e18d8a3fc8a6579826d0c380e0e10d8a3f2
SHA2564d7da9514704cc7002bbfef0a556d9244cd1f65fa4d6628a1662784fc494cd1b
SHA51211b407d2b7c76f901c614907c3de69f3f9d9ad06ea5a976b07621647d77ebd0ec9ea2f974f84c549509f96ed76bc7e39d68ad7ff8727b4f3da2f69ede24c599a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd