Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2023, 05:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://abitaremx.com/NewGov/
Resource
win10v2004-20231023-en
General
-
Target
https://abitaremx.com/NewGov/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133437204916180333" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3948 chrome.exe 3948 chrome.exe 3244 chrome.exe 3244 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3948 chrome.exe 3948 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3948 wrote to memory of 4316 3948 chrome.exe 77 PID 3948 wrote to memory of 4316 3948 chrome.exe 77 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 1836 3948 chrome.exe 92 PID 3948 wrote to memory of 3236 3948 chrome.exe 93 PID 3948 wrote to memory of 3236 3948 chrome.exe 93 PID 3948 wrote to memory of 1660 3948 chrome.exe 94 PID 3948 wrote to memory of 1660 3948 chrome.exe 94 PID 3948 wrote to memory of 1660 3948 chrome.exe 94 PID 3948 wrote to memory of 1660 3948 chrome.exe 94 PID 3948 wrote to memory of 1660 3948 chrome.exe 94 PID 3948 wrote to memory of 1660 3948 chrome.exe 94 PID 3948 wrote to memory of 1660 3948 chrome.exe 94 PID 3948 wrote to memory of 1660 3948 chrome.exe 94 PID 3948 wrote to memory of 1660 3948 chrome.exe 94 PID 3948 wrote to memory of 1660 3948 chrome.exe 94 PID 3948 wrote to memory of 1660 3948 chrome.exe 94 PID 3948 wrote to memory of 1660 3948 chrome.exe 94 PID 3948 wrote to memory of 1660 3948 chrome.exe 94 PID 3948 wrote to memory of 1660 3948 chrome.exe 94 PID 3948 wrote to memory of 1660 3948 chrome.exe 94 PID 3948 wrote to memory of 1660 3948 chrome.exe 94 PID 3948 wrote to memory of 1660 3948 chrome.exe 94 PID 3948 wrote to memory of 1660 3948 chrome.exe 94 PID 3948 wrote to memory of 1660 3948 chrome.exe 94 PID 3948 wrote to memory of 1660 3948 chrome.exe 94 PID 3948 wrote to memory of 1660 3948 chrome.exe 94 PID 3948 wrote to memory of 1660 3948 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://abitaremx.com/NewGov/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe09189758,0x7ffe09189768,0x7ffe091897782⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1888,i,6844138104614026720,16579003022671120637,131072 /prefetch:22⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1888,i,6844138104614026720,16579003022671120637,131072 /prefetch:82⤵PID:3236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1888,i,6844138104614026720,16579003022671120637,131072 /prefetch:82⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3088 --field-trial-handle=1888,i,6844138104614026720,16579003022671120637,131072 /prefetch:12⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3120 --field-trial-handle=1888,i,6844138104614026720,16579003022671120637,131072 /prefetch:12⤵PID:3472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 --field-trial-handle=1888,i,6844138104614026720,16579003022671120637,131072 /prefetch:82⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5060 --field-trial-handle=1888,i,6844138104614026720,16579003022671120637,131072 /prefetch:82⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2320 --field-trial-handle=1888,i,6844138104614026720,16579003022671120637,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3244
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5451306bd29902fdcc48adee069cee40e
SHA14a8f3872e8a716d37a18952cd1e09c109cb09e5f
SHA25656cd366a5f74785101c9ddbfcdebbf5a89d92bc7bf5a1941593f589ae3244594
SHA51242d48cbbd0e7856983ed2fec66fd42f1f741cb12ff35841ac1c4a3fbb4208c02cbfd7e18f7bfef95de76c770fbf53f3bbdc9902aa7de5171a731ceb0a06b8e29
-
Filesize
6KB
MD5439483ed6631d109e486d47fdc6ffd2f
SHA1f605915d7ea80e3b63b8f6b2cdbe70eb2f84242f
SHA2561c0c1c314a937dcd1e820db6e26938ac2938a75b82a394b80db432594948492e
SHA512e66f6dfd35f7a026072c6d99a1648ab60ab1e75e3fdc5edb6c0f677e7aa956c61a4c7a811b938fbe3810934e605ff813fea0b2b816613f503122e03af44d3506
-
Filesize
5KB
MD5704890a9f5262734f41cddb5b095d452
SHA18f939fca414596ce104c89a905b32e56edcb600e
SHA256f14cc09e7026ac1a9da03807aa9f0b84e8ad2018174ed8f05f8cf5cfa2e14836
SHA5125f15d1e0bcb72a20fb981a4a05329fd43f0c45b6f15d4183f9cc4dae623f134ab59497ff4798c322513989eef6babd9a11d8a83b5f0a5cc7613befd03c9a26a6
-
Filesize
5KB
MD5519958b190db59b47d6f0e41992370e8
SHA1787892834fe1edfc7f865ba621eac708c99e67b0
SHA256a594bd4b3e99632d467b44eb62dac824551afea46594502bf2909138617422ff
SHA512c1c84ba8c3e50665438e95932b40bb0b6dac06069ab829f5fc346199192a6f643fb62de45d85f0b4eed0a38a9d14cedca4d5cef45e348f463dee1a601e8bc8a9
-
Filesize
109KB
MD522856b1a6c8a5e04fd838b69dc06f747
SHA10604f60e875bab459e5c79e099211049a54dc6ee
SHA25634b5cb75818866a2ff8871429e03bf66df576be61b27f510d9132f3e3f7e1260
SHA512a44441175e541498080fd5b29e755db71767dec3c0a5e70e695cf42265d8b152c17544b5290e241c94364de4182715fc17e182422bc2ce136b5e8bf42f75dffe
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd