Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2023 16:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://f00.psgsm.net
Resource
win10v2004-20231020-en
General
-
Target
http://f00.psgsm.net
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133431585077155426" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4768 chrome.exe 4768 chrome.exe 4880 chrome.exe 4880 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4768 wrote to memory of 1436 4768 chrome.exe 77 PID 4768 wrote to memory of 1436 4768 chrome.exe 77 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 464 4768 chrome.exe 88 PID 4768 wrote to memory of 1168 4768 chrome.exe 89 PID 4768 wrote to memory of 1168 4768 chrome.exe 89 PID 4768 wrote to memory of 4092 4768 chrome.exe 90 PID 4768 wrote to memory of 4092 4768 chrome.exe 90 PID 4768 wrote to memory of 4092 4768 chrome.exe 90 PID 4768 wrote to memory of 4092 4768 chrome.exe 90 PID 4768 wrote to memory of 4092 4768 chrome.exe 90 PID 4768 wrote to memory of 4092 4768 chrome.exe 90 PID 4768 wrote to memory of 4092 4768 chrome.exe 90 PID 4768 wrote to memory of 4092 4768 chrome.exe 90 PID 4768 wrote to memory of 4092 4768 chrome.exe 90 PID 4768 wrote to memory of 4092 4768 chrome.exe 90 PID 4768 wrote to memory of 4092 4768 chrome.exe 90 PID 4768 wrote to memory of 4092 4768 chrome.exe 90 PID 4768 wrote to memory of 4092 4768 chrome.exe 90 PID 4768 wrote to memory of 4092 4768 chrome.exe 90 PID 4768 wrote to memory of 4092 4768 chrome.exe 90 PID 4768 wrote to memory of 4092 4768 chrome.exe 90 PID 4768 wrote to memory of 4092 4768 chrome.exe 90 PID 4768 wrote to memory of 4092 4768 chrome.exe 90 PID 4768 wrote to memory of 4092 4768 chrome.exe 90 PID 4768 wrote to memory of 4092 4768 chrome.exe 90 PID 4768 wrote to memory of 4092 4768 chrome.exe 90 PID 4768 wrote to memory of 4092 4768 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://f00.psgsm.net1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb73ca9758,0x7ffb73ca9768,0x7ffb73ca97782⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1816,i,14687151044877861449,1884985126244312064,131072 /prefetch:22⤵PID:464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1816,i,14687151044877861449,1884985126244312064,131072 /prefetch:82⤵PID:1168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1816,i,14687151044877861449,1884985126244312064,131072 /prefetch:82⤵PID:4092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2888 --field-trial-handle=1816,i,14687151044877861449,1884985126244312064,131072 /prefetch:12⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2880 --field-trial-handle=1816,i,14687151044877861449,1884985126244312064,131072 /prefetch:12⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4132 --field-trial-handle=1816,i,14687151044877861449,1884985126244312064,131072 /prefetch:12⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 --field-trial-handle=1816,i,14687151044877861449,1884985126244312064,131072 /prefetch:82⤵PID:4324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 --field-trial-handle=1816,i,14687151044877861449,1884985126244312064,131072 /prefetch:82⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=744 --field-trial-handle=1816,i,14687151044877861449,1884985126244312064,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4880
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5dba6006d67015b8a4091e9612e4d3408
SHA1e888dcef06f93bfe4e536be027e79ef5f16b90f7
SHA256eead9f291e86c74f52393d40bcbdded2358b6ddcbdce03023af6f2cab2576043
SHA512d1d2d9b5dc463214cc511aad21d64fd71ef0b574957ab261d34c6751f126f31bb62ef374db5405362cce8ed5cef6f2ca53295e464b3e77a5498942d25f1b743e
-
Filesize
6KB
MD56c881b2f1a2c9a1b206f1eb3ef18af47
SHA1f16dbc711423f9fdadf4ed5c0a3e1bde9ee0a6c9
SHA256a357ba17b47305a8e173dae4cf586b81bd6e845dd85585c48ab6e41f945405be
SHA5122b70b138958b991bf3111d191875fb6172c5ccbc7e5b4deb01d53a80dd37c03f8206d4bb2356c0237265a5474057a4ed4f81d88b765e0ad457220f97189cc0a4
-
Filesize
109KB
MD5315bb0b31e4f496843b76f41d2221ccf
SHA1ef6d86464e5e9336d7ccf4af30a46308e3a75016
SHA256e6a52ec82cd7ad564b29692da5c677ccc1fab2ff2b5905e1a599bc4a977c7337
SHA512801b3236edc7ca316bdfdbd00350aa31d27605b57becd7872a75e908e1d3bea944feb535e03d89c756f5708e365014301d9035d487468e91997dd1d575040b19
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd