Analysis
-
max time kernel
179s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2023, 01:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://mygovauprofile.info
Resource
win10v2004-20231020-en
General
-
Target
http://mygovauprofile.info
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133433632401013986" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4992 chrome.exe 4992 chrome.exe 2976 chrome.exe 2976 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe Token: SeShutdownPrivilege 4992 chrome.exe Token: SeCreatePagefilePrivilege 4992 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe 4992 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4992 wrote to memory of 2920 4992 chrome.exe 85 PID 4992 wrote to memory of 2920 4992 chrome.exe 85 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4776 4992 chrome.exe 88 PID 4992 wrote to memory of 4168 4992 chrome.exe 90 PID 4992 wrote to memory of 4168 4992 chrome.exe 90 PID 4992 wrote to memory of 1344 4992 chrome.exe 89 PID 4992 wrote to memory of 1344 4992 chrome.exe 89 PID 4992 wrote to memory of 1344 4992 chrome.exe 89 PID 4992 wrote to memory of 1344 4992 chrome.exe 89 PID 4992 wrote to memory of 1344 4992 chrome.exe 89 PID 4992 wrote to memory of 1344 4992 chrome.exe 89 PID 4992 wrote to memory of 1344 4992 chrome.exe 89 PID 4992 wrote to memory of 1344 4992 chrome.exe 89 PID 4992 wrote to memory of 1344 4992 chrome.exe 89 PID 4992 wrote to memory of 1344 4992 chrome.exe 89 PID 4992 wrote to memory of 1344 4992 chrome.exe 89 PID 4992 wrote to memory of 1344 4992 chrome.exe 89 PID 4992 wrote to memory of 1344 4992 chrome.exe 89 PID 4992 wrote to memory of 1344 4992 chrome.exe 89 PID 4992 wrote to memory of 1344 4992 chrome.exe 89 PID 4992 wrote to memory of 1344 4992 chrome.exe 89 PID 4992 wrote to memory of 1344 4992 chrome.exe 89 PID 4992 wrote to memory of 1344 4992 chrome.exe 89 PID 4992 wrote to memory of 1344 4992 chrome.exe 89 PID 4992 wrote to memory of 1344 4992 chrome.exe 89 PID 4992 wrote to memory of 1344 4992 chrome.exe 89 PID 4992 wrote to memory of 1344 4992 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://mygovauprofile.info1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8c5989758,0x7ff8c5989768,0x7ff8c59897782⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1660 --field-trial-handle=1908,i,6136346834712511346,1957134695812891441,131072 /prefetch:22⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1908,i,6136346834712511346,1957134695812891441,131072 /prefetch:82⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1908,i,6136346834712511346,1957134695812891441,131072 /prefetch:82⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3020 --field-trial-handle=1908,i,6136346834712511346,1957134695812891441,131072 /prefetch:12⤵PID:624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1908,i,6136346834712511346,1957134695812891441,131072 /prefetch:12⤵PID:1824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3972 --field-trial-handle=1908,i,6136346834712511346,1957134695812891441,131072 /prefetch:12⤵PID:2536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3308 --field-trial-handle=1908,i,6136346834712511346,1957134695812891441,131072 /prefetch:12⤵PID:1984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4772 --field-trial-handle=1908,i,6136346834712511346,1957134695812891441,131072 /prefetch:82⤵PID:1420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4068 --field-trial-handle=1908,i,6136346834712511346,1957134695812891441,131072 /prefetch:82⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4132 --field-trial-handle=1908,i,6136346834712511346,1957134695812891441,131072 /prefetch:12⤵PID:1076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2312 --field-trial-handle=1908,i,6136346834712511346,1957134695812891441,131072 /prefetch:12⤵PID:384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=748 --field-trial-handle=1908,i,6136346834712511346,1957134695812891441,131072 /prefetch:12⤵PID:932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4960 --field-trial-handle=1908,i,6136346834712511346,1957134695812891441,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2976
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\609b82fc-6aee-4dfb-9dbd-cca2bf134481.tmp
Filesize6KB
MD50691106cb6b183f8b088e4ebd633e80d
SHA16288d17d73fca6e743e455035a7b68fa8dc14079
SHA256210816ffeb96edfba3c0c24f5c5fa7d4467eb7d486f711f9b068677b9aa6f457
SHA512670803b1e47567e539c80b17f37358a4637da231f2862a65ceef20c7d37c8056df6cf08e6488a652f4153c499a4d9b80789f1dcd6fdf4516434a309e7a5d909e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\da916fd4-67c1-44aa-8d84-b6846283c878.tmp
Filesize6KB
MD5adb604d59be788b7a220e7cb7bf14b91
SHA1e001ab1ee6ec22a687f58e57b1d2c737775d9686
SHA256f222e96d526537101882acd7a1a32d08ddfb2a0a5f7bfbe34c3c08d2ec80e476
SHA512d35f43886af15b0275cfeda2a36ebcd29d42e564a870b3a3c07a561040a4f11864389b45a88077e5dd45d69dd0fa0b3ffe32b394803caf688eb5b17418ed5b09
-
Filesize
109KB
MD51b0ac43c5a43cba2331f199d6869d54c
SHA134715b6ff4db18d3576b7aeb87d5c303097b57c8
SHA25678de096342209253666fa5b1737bd9f25531cf78542f146ea15bbbde4dee53be
SHA51236f3378249d0fe10a549a2b1bfbb056e87b0785807688cd7d9483c4bf962a9d018f4a71e0feda7a7d3191db22d4c9cebf291bda2afaede4eec1ae74589bb8124
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd