Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
15/11/2023, 10:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://makbuztek.com.tr/#/sorgulama/sorgula;ettn=9f7a24a5-10d0-4fd2-97d1-6b75edef64bd
Resource
win10v2004-20231023-en
General
-
Target
https://makbuztek.com.tr/#/sorgulama/sorgula;ettn=9f7a24a5-10d0-4fd2-97d1-6b75edef64bd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133445168827347327" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3384 chrome.exe 3384 chrome.exe 3252 chrome.exe 3252 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3384 chrome.exe 3384 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3384 wrote to memory of 3024 3384 chrome.exe 28 PID 3384 wrote to memory of 3024 3384 chrome.exe 28 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 4636 3384 chrome.exe 89 PID 3384 wrote to memory of 3156 3384 chrome.exe 90 PID 3384 wrote to memory of 3156 3384 chrome.exe 90 PID 3384 wrote to memory of 3696 3384 chrome.exe 92 PID 3384 wrote to memory of 3696 3384 chrome.exe 92 PID 3384 wrote to memory of 3696 3384 chrome.exe 92 PID 3384 wrote to memory of 3696 3384 chrome.exe 92 PID 3384 wrote to memory of 3696 3384 chrome.exe 92 PID 3384 wrote to memory of 3696 3384 chrome.exe 92 PID 3384 wrote to memory of 3696 3384 chrome.exe 92 PID 3384 wrote to memory of 3696 3384 chrome.exe 92 PID 3384 wrote to memory of 3696 3384 chrome.exe 92 PID 3384 wrote to memory of 3696 3384 chrome.exe 92 PID 3384 wrote to memory of 3696 3384 chrome.exe 92 PID 3384 wrote to memory of 3696 3384 chrome.exe 92 PID 3384 wrote to memory of 3696 3384 chrome.exe 92 PID 3384 wrote to memory of 3696 3384 chrome.exe 92 PID 3384 wrote to memory of 3696 3384 chrome.exe 92 PID 3384 wrote to memory of 3696 3384 chrome.exe 92 PID 3384 wrote to memory of 3696 3384 chrome.exe 92 PID 3384 wrote to memory of 3696 3384 chrome.exe 92 PID 3384 wrote to memory of 3696 3384 chrome.exe 92 PID 3384 wrote to memory of 3696 3384 chrome.exe 92 PID 3384 wrote to memory of 3696 3384 chrome.exe 92 PID 3384 wrote to memory of 3696 3384 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://makbuztek.com.tr/#/sorgulama/sorgula;ettn=9f7a24a5-10d0-4fd2-97d1-6b75edef64bd1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff66b99758,0x7fff66b99768,0x7fff66b997782⤵PID:3024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1872,i,6629739643710823509,426315787486088914,131072 /prefetch:22⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1872,i,6629739643710823509,426315787486088914,131072 /prefetch:82⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=1872,i,6629739643710823509,426315787486088914,131072 /prefetch:12⤵PID:1820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1872,i,6629739643710823509,426315787486088914,131072 /prefetch:82⤵PID:3696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3020 --field-trial-handle=1872,i,6629739643710823509,426315787486088914,131072 /prefetch:12⤵PID:3880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 --field-trial-handle=1872,i,6629739643710823509,426315787486088914,131072 /prefetch:82⤵PID:1792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 --field-trial-handle=1872,i,6629739643710823509,426315787486088914,131072 /prefetch:82⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4896 --field-trial-handle=1872,i,6629739643710823509,426315787486088914,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3252
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4072
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4712
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:2028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD52531f2862885ba18a9a499becd65886c
SHA1f69e981b49dc69e0e28d87b8bfefcca1566eec9e
SHA25688a39d114373b9c76cfb283864cf6918ae4dfb2c6f94b0122d322860aa4ff3c0
SHA5124f07d976d435c4564ea9cfa94539a384191fb5bc2833530c169f6a96d969d2aee5f582f5d69ea7ee5fe64dfaa8f8f6b93efcf787e3a7b7ec7742ac5c0a29cd6f
-
Filesize
1KB
MD5ff836391f2967edff6e178ce5e82f2c4
SHA10fe2a4bc3d80dda3df0e80929f9a544f653bf2f9
SHA2560a024d4e84f53f9c81740fafb87234430fa28f71939f2f868c6a132f4b9cb30e
SHA512c21d85f483f488d856d88ea54753d36972809e8d4e29f819794ab597d92cd94d45b2c03b94ad5920e49c7f480bfa1f627de6e29633414c55ed58225ed77c4a1d
-
Filesize
2KB
MD5f5b974ff9c1f337096de3eadd2eaffa8
SHA13123afc716d43816ce35cd2397489d236a0b22ac
SHA256390663330f7e9b485473b46c2f3e694d93f8fe66f0030393af6576e25f001a9a
SHA51239dff217982f6019b21ca1aa4d5552a27868bb313c71a8bcc55756bf2c40b1bf0c8a0f31a569470dc82458483269a3f8d6fd58ede62b6d12bb1638ef9c9078ec
-
Filesize
6KB
MD5cd43466f096169c14637cfc6160e07b4
SHA1cba561948e4725feaa2eff2461419d80393fa863
SHA256f513209da2092fa554222902bff4d3b13c73a4fbbf7744bf61cf1dec1a8e2564
SHA5123786d9370f727c3b679819aa98a7ee23667a3b0dcefd86c4cadfef5fc370112739f2b3e798195d9ebb1ade4ea7518349ef904bcb69be9305a51a402a05b5599a
-
Filesize
214KB
MD5d42524a5f8fbac7866ef10bc7f06c2a1
SHA1446ca35f42b9e29ce9361643e613647c314c1e5c
SHA256cd8e3b8d5084a3133edb31518914f43a9319020de696be94bf7905c26261224f
SHA51254440a2a8b4f92bfc374443f4121d058843846253638075cbbd832b7462fe5085dfea32d24e265da3914431b102d35482fbc5a2922871b288fec5f528b3082bd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd