Analysis
-
max time kernel
157s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2023 07:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.plaintownshipstarkoh.gov/
Resource
win10v2004-20231025-en
General
-
Target
http://www.plaintownshipstarkoh.gov/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133433838525930236" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 384 chrome.exe 384 chrome.exe 4456 chrome.exe 4456 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 384 chrome.exe 384 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 384 wrote to memory of 2940 384 chrome.exe 51 PID 384 wrote to memory of 2940 384 chrome.exe 51 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 3976 384 chrome.exe 90 PID 384 wrote to memory of 2232 384 chrome.exe 91 PID 384 wrote to memory of 2232 384 chrome.exe 91 PID 384 wrote to memory of 5004 384 chrome.exe 92 PID 384 wrote to memory of 5004 384 chrome.exe 92 PID 384 wrote to memory of 5004 384 chrome.exe 92 PID 384 wrote to memory of 5004 384 chrome.exe 92 PID 384 wrote to memory of 5004 384 chrome.exe 92 PID 384 wrote to memory of 5004 384 chrome.exe 92 PID 384 wrote to memory of 5004 384 chrome.exe 92 PID 384 wrote to memory of 5004 384 chrome.exe 92 PID 384 wrote to memory of 5004 384 chrome.exe 92 PID 384 wrote to memory of 5004 384 chrome.exe 92 PID 384 wrote to memory of 5004 384 chrome.exe 92 PID 384 wrote to memory of 5004 384 chrome.exe 92 PID 384 wrote to memory of 5004 384 chrome.exe 92 PID 384 wrote to memory of 5004 384 chrome.exe 92 PID 384 wrote to memory of 5004 384 chrome.exe 92 PID 384 wrote to memory of 5004 384 chrome.exe 92 PID 384 wrote to memory of 5004 384 chrome.exe 92 PID 384 wrote to memory of 5004 384 chrome.exe 92 PID 384 wrote to memory of 5004 384 chrome.exe 92 PID 384 wrote to memory of 5004 384 chrome.exe 92 PID 384 wrote to memory of 5004 384 chrome.exe 92 PID 384 wrote to memory of 5004 384 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.plaintownshipstarkoh.gov/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd73a19758,0x7ffd73a19768,0x7ffd73a197782⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1676,i,10023722177966135286,15447626979205727268,131072 /prefetch:22⤵PID:3976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1676,i,10023722177966135286,15447626979205727268,131072 /prefetch:82⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1676,i,10023722177966135286,15447626979205727268,131072 /prefetch:82⤵PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2892 --field-trial-handle=1676,i,10023722177966135286,15447626979205727268,131072 /prefetch:12⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2916 --field-trial-handle=1676,i,10023722177966135286,15447626979205727268,131072 /prefetch:12⤵PID:3960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5040 --field-trial-handle=1676,i,10023722177966135286,15447626979205727268,131072 /prefetch:82⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4732 --field-trial-handle=1676,i,10023722177966135286,15447626979205727268,131072 /prefetch:82⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2768 --field-trial-handle=1676,i,10023722177966135286,15447626979205727268,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD553d4346dd5855f4183aeb6c577e96e50
SHA1559649cc7e562f98ab7ebcdafe1a04d3b4491bdd
SHA25638aebdb9d33c603816322b6683c70b92cb2cdfde15978f7e38952c34c85cba6a
SHA512a9d8f783dcba7c80a1e57d65760bfbda717ad7e12d54889600006bee08b1abed71f092ab778523cf27b25fea4b6a27e65f6f3204dc45b06c031612911ad38e4e
-
Filesize
2KB
MD5f663ccee51e0e84e7a612109edd150c1
SHA171b03e1adc9fe81511e61b988e4ae37988a9df58
SHA256130621a2f2a99da39ddfff6ef79ff2dadbe0e34bd04bab3e2073e479670c19c9
SHA5122c042dc59d0a878f343fb39232f703445eeb2fc6e34cc105e08a397bccfa81c778427f26c3700d455fba3bb483367ca7781bdc794d9a94f21efdf7c45c5cde4a
-
Filesize
706B
MD5839a3894d097cc7c5936aaa93808e779
SHA1eb376461a4df1169d2931301789241ae45895fe1
SHA256d56c98ba1d74a3f2edaa50bc55b3cf54e2e24e0b45f3daf13394ee6b67f6a71c
SHA5129de6f2e9e4acd060e21b086532607034bf7971e6850f2c6ed92183f369f191f23bc313ddc5e625a7b6500d26e29575022003b91d355f67c0e2d9dc0880828264
-
Filesize
6KB
MD559105a5172e5a9de258d1843d0e23cef
SHA144838657c5c7f21f7022e4634841a0d44e762da7
SHA2567738459548711398b543563ac84c6841d2c1720a43da4c947b1355fcd020cb85
SHA5126002c977f30693755d70caf3b1f78bed53dbc3c92e4c05e13690116ee88b19db17e7c3f4d39a2bbe2216d131ef25c26d20714684e19eed430075538b61bf045b
-
Filesize
215KB
MD5a39fa33ca2c20ccfe57ad42689a8d076
SHA1ef52eff177cd3c01cb332158fd7de28907c9e8f6
SHA256e3280c4fa518cc308d04c476dafe8b66ee5a147ec80c85a9f37b4165d9c9067a
SHA5121dd8cd76989cfedd97aa6ebaa4890f3ee3af69d0f8c03976c5d544fd6033e6b1319240a4aeacfd2e64ad542341bd94b4bbb9191aed1fc3bab31863b487f88ca8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd