Analysis
-
max time kernel
18s -
max time network
24s -
platform
windows10-1703_x64 -
resource
win10-20231023-en -
resource tags
arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system -
submitted
31-10-2023 09:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=https%3a%2f%2fnews.governmentevents.co.uk%2fc%2f1lxSzsOXm7VIfu12wdo64N6iFKrF&umid=7ba8938c-fd6a-4820-b2b2-b16b57deb73a&auth=65a620fa4b6e2edf0405a6ed61dc7465231096cd-d36435ad7543b9804f76d65b540f33585c860978
Resource
win10-20231023-en
General
-
Target
https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=https%3a%2f%2fnews.governmentevents.co.uk%2fc%2f1lxSzsOXm7VIfu12wdo64N6iFKrF&umid=7ba8938c-fd6a-4820-b2b2-b16b57deb73a&auth=65a620fa4b6e2edf0405a6ed61dc7465231096cd-d36435ad7543b9804f76d65b540f33585c860978
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133432187493472052" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1708 chrome.exe 1708 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe Token: SeShutdownPrivilege 1708 chrome.exe Token: SeCreatePagefilePrivilege 1708 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe 1708 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1708 wrote to memory of 4644 1708 chrome.exe 70 PID 1708 wrote to memory of 4644 1708 chrome.exe 70 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 1068 1708 chrome.exe 73 PID 1708 wrote to memory of 4536 1708 chrome.exe 72 PID 1708 wrote to memory of 4536 1708 chrome.exe 72 PID 1708 wrote to memory of 2652 1708 chrome.exe 74 PID 1708 wrote to memory of 2652 1708 chrome.exe 74 PID 1708 wrote to memory of 2652 1708 chrome.exe 74 PID 1708 wrote to memory of 2652 1708 chrome.exe 74 PID 1708 wrote to memory of 2652 1708 chrome.exe 74 PID 1708 wrote to memory of 2652 1708 chrome.exe 74 PID 1708 wrote to memory of 2652 1708 chrome.exe 74 PID 1708 wrote to memory of 2652 1708 chrome.exe 74 PID 1708 wrote to memory of 2652 1708 chrome.exe 74 PID 1708 wrote to memory of 2652 1708 chrome.exe 74 PID 1708 wrote to memory of 2652 1708 chrome.exe 74 PID 1708 wrote to memory of 2652 1708 chrome.exe 74 PID 1708 wrote to memory of 2652 1708 chrome.exe 74 PID 1708 wrote to memory of 2652 1708 chrome.exe 74 PID 1708 wrote to memory of 2652 1708 chrome.exe 74 PID 1708 wrote to memory of 2652 1708 chrome.exe 74 PID 1708 wrote to memory of 2652 1708 chrome.exe 74 PID 1708 wrote to memory of 2652 1708 chrome.exe 74 PID 1708 wrote to memory of 2652 1708 chrome.exe 74 PID 1708 wrote to memory of 2652 1708 chrome.exe 74 PID 1708 wrote to memory of 2652 1708 chrome.exe 74 PID 1708 wrote to memory of 2652 1708 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=https%3a%2f%2fnews.governmentevents.co.uk%2fc%2f1lxSzsOXm7VIfu12wdo64N6iFKrF&umid=7ba8938c-fd6a-4820-b2b2-b16b57deb73a&auth=65a620fa4b6e2edf0405a6ed61dc7465231096cd-d36435ad7543b9804f76d65b540f33585c8609781⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff80d7c9758,0x7ff80d7c9768,0x7ff80d7c97782⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1992 --field-trial-handle=1776,i,13748569402546490801,14577975612144049561,131072 /prefetch:82⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1776,i,13748569402546490801,14577975612144049561,131072 /prefetch:22⤵PID:1068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2108 --field-trial-handle=1776,i,13748569402546490801,14577975612144049561,131072 /prefetch:82⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3016 --field-trial-handle=1776,i,13748569402546490801,14577975612144049561,131072 /prefetch:12⤵PID:1296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2880 --field-trial-handle=1776,i,13748569402546490801,14577975612144049561,131072 /prefetch:12⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4360 --field-trial-handle=1776,i,13748569402546490801,14577975612144049561,131072 /prefetch:12⤵PID:3468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3060 --field-trial-handle=1776,i,13748569402546490801,14577975612144049561,131072 /prefetch:12⤵PID:3120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4840 --field-trial-handle=1776,i,13748569402546490801,14577975612144049561,131072 /prefetch:12⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4976 --field-trial-handle=1776,i,13748569402546490801,14577975612144049561,131072 /prefetch:12⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5240 --field-trial-handle=1776,i,13748569402546490801,14577975612144049561,131072 /prefetch:12⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=6032 --field-trial-handle=1776,i,13748569402546490801,14577975612144049561,131072 /prefetch:12⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6268 --field-trial-handle=1776,i,13748569402546490801,14577975612144049561,131072 /prefetch:82⤵PID:2776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6340 --field-trial-handle=1776,i,13748569402546490801,14577975612144049561,131072 /prefetch:82⤵PID:3472
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5990324ce59f0281c7b36fb9889e8887f
SHA135abc926cbea649385d104b1fd2963055454bf27
SHA25667bcedd3040fc55d968bbe21df05c02b731181541aff4ae72b9205300a4a3ecc
SHA51231e83da1ac217d25be6e7f35a041881b926f731fff69db6f144e4fe99b696a31f9ab7766ca22cf5a482743c2a2d00a699ca2c2d67837a86c471a2dd3bed9ea1f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.governmentevents.co.uk_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD502ff9c90cef7b3932564e6dd3895ced7
SHA1486b15e017267ef266d0289561a1da29998fa7f6
SHA256eb24f3adb0ecc648624785eada0ea657175cc9e773a6fcf77ac8771c49ea6ef0
SHA51258021b6ebeab22721463bc3d465ecf05f22562a2a001162ee0ce8ab121a4646f55aadf5e2f5ac19df7e2656aee44ee2fa4e09574c94c2c0173b60e4fdaabb1bf
-
Filesize
2KB
MD558e83ef90db56a68768d84618e13e5dd
SHA17bf5657e8373a7264054602380fa5878cb0196a3
SHA256d58720afecc08cf01c20e0b1f3e1b32a56300ad0c1baa0907d74ab220efef4aa
SHA5128d4b83ed7918b843e867bc241d262e399558b222a3aa2dffe6b358f81a3faaf53ce866fee3f30483d141d5714f5c834aa0d588bf31db7328da4d6ebf3d6be6c5
-
Filesize
5KB
MD592ab074451f9fd4154bc94a1243b45d1
SHA132b82f7659f87f9a15ef9b636ee7ddf15c06530f
SHA256794ec54c814c64ced1b768d8588e6cb0406666ec643c6a4efc5bc65420a4fac0
SHA5128f65ae5204e0ef6a634b0a8ad48e65d98c34ac0ddee7ed05449d863e3bf7819db7c53615c4706f06aa12b864bc57ffac95fca3a98f928b094e44f69b20746ddf
-
Filesize
109KB
MD53bd7fde212d3da1eeb63c1b0e754a7f0
SHA156c3e44c3288497e72c3aa5f84f34bbd6fbb33c6
SHA25687d231c9ebb568d69e61076d4e349a02393bcfb3b91ee638812923474c6a335c
SHA512786706d532f2fc069ef29b48cc61e911ad0d9affc3f810f660a64468ebdf0904a86c2c47d5b5904103dc22c7e84c6690536142d0b6066e5168859e89f74b3c3f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd