Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2023, 09:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://dbbwbmbndi.ctn.gts.multisan.pr-use5.ap.gtr.certsbridge.com
Resource
win10v2004-20231025-en
General
-
Target
http://dbbwbmbndi.ctn.gts.multisan.pr-use5.ap.gtr.certsbridge.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133431334230649865" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4644 chrome.exe 4644 chrome.exe 412 chrome.exe 412 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe Token: SeShutdownPrivilege 4644 chrome.exe Token: SeCreatePagefilePrivilege 4644 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe 4644 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4644 wrote to memory of 4440 4644 chrome.exe 87 PID 4644 wrote to memory of 4440 4644 chrome.exe 87 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1836 4644 chrome.exe 90 PID 4644 wrote to memory of 1824 4644 chrome.exe 89 PID 4644 wrote to memory of 1824 4644 chrome.exe 89 PID 4644 wrote to memory of 4076 4644 chrome.exe 91 PID 4644 wrote to memory of 4076 4644 chrome.exe 91 PID 4644 wrote to memory of 4076 4644 chrome.exe 91 PID 4644 wrote to memory of 4076 4644 chrome.exe 91 PID 4644 wrote to memory of 4076 4644 chrome.exe 91 PID 4644 wrote to memory of 4076 4644 chrome.exe 91 PID 4644 wrote to memory of 4076 4644 chrome.exe 91 PID 4644 wrote to memory of 4076 4644 chrome.exe 91 PID 4644 wrote to memory of 4076 4644 chrome.exe 91 PID 4644 wrote to memory of 4076 4644 chrome.exe 91 PID 4644 wrote to memory of 4076 4644 chrome.exe 91 PID 4644 wrote to memory of 4076 4644 chrome.exe 91 PID 4644 wrote to memory of 4076 4644 chrome.exe 91 PID 4644 wrote to memory of 4076 4644 chrome.exe 91 PID 4644 wrote to memory of 4076 4644 chrome.exe 91 PID 4644 wrote to memory of 4076 4644 chrome.exe 91 PID 4644 wrote to memory of 4076 4644 chrome.exe 91 PID 4644 wrote to memory of 4076 4644 chrome.exe 91 PID 4644 wrote to memory of 4076 4644 chrome.exe 91 PID 4644 wrote to memory of 4076 4644 chrome.exe 91 PID 4644 wrote to memory of 4076 4644 chrome.exe 91 PID 4644 wrote to memory of 4076 4644 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://dbbwbmbndi.ctn.gts.multisan.pr-use5.ap.gtr.certsbridge.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff2a5c9758,0x7fff2a5c9768,0x7fff2a5c97782⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1884 --field-trial-handle=1964,i,18134263594335569452,8408976749369570465,131072 /prefetch:82⤵PID:1824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1964,i,18134263594335569452,8408976749369570465,131072 /prefetch:22⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1964,i,18134263594335569452,8408976749369570465,131072 /prefetch:82⤵PID:4076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2876 --field-trial-handle=1964,i,18134263594335569452,8408976749369570465,131072 /prefetch:12⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2860 --field-trial-handle=1964,i,18134263594335569452,8408976749369570465,131072 /prefetch:12⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3976 --field-trial-handle=1964,i,18134263594335569452,8408976749369570465,131072 /prefetch:12⤵PID:4184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3200 --field-trial-handle=1964,i,18134263594335569452,8408976749369570465,131072 /prefetch:12⤵PID:3796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 --field-trial-handle=1964,i,18134263594335569452,8408976749369570465,131072 /prefetch:82⤵PID:2120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 --field-trial-handle=1964,i,18134263594335569452,8408976749369570465,131072 /prefetch:82⤵PID:3124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4168 --field-trial-handle=1964,i,18134263594335569452,8408976749369570465,131072 /prefetch:12⤵PID:1744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2712 --field-trial-handle=1964,i,18134263594335569452,8408976749369570465,131072 /prefetch:12⤵PID:556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3688 --field-trial-handle=1964,i,18134263594335569452,8408976749369570465,131072 /prefetch:12⤵PID:688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2704 --field-trial-handle=1964,i,18134263594335569452,8408976749369570465,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:412
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5fc735f25afd5cc4c4a5c59039221530e
SHA1bd9a702303576d8f317fb37f5c1e2636e9617958
SHA2564cb721bf1caef30adc7cf874bca22e358c9ee0145496b6c0fb6f7100f4096b55
SHA512fcb7cb3b2092c33e5cd10fb2cdc0af5ed7ce4dc1ecfb67d7441a996376d20b853026ac4c7689aa79240d61846dd16efa6f97d92f44811a59e021f553a4ef94b2
-
Filesize
6KB
MD5dd143d13d3a78b5c333d2f86c49bea93
SHA1d8354fd0c1d0e6a3895764c53a66b00b5f9f8b20
SHA2563812c92d0a3a1a05b52b755798394843796a03d7eea683a9ee4400c737ddb966
SHA51242c9689a2db5d155dc5b83907facd8f5f9360626ecb8212bcf01c32c28980c53da52f0f1b2cbf1c70942774572f1358d4f0fd3d5ddb1b7602f122e378863670a
-
Filesize
215KB
MD59c1830a9085304c9108faf752808fa79
SHA1be3f34321aded6d9c2e3de7c9235543b2a1199b7
SHA256fe2a906ff1c62530e87619896b916964f51df94b9b32dd9c7ba7da8c02abeba9
SHA5125d02c3d7b4161bf3391663d86600505ec58343582b02db73a8497152d0e6cd65788a08eb480721ae346c97efc6a2a1e963c492cc26ce7c19da0b3571f6b1fa4a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd