Analysis
-
max time kernel
1799s -
max time network
1690s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
15/11/2023, 13:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://adform.net
Resource
win10v2004-20231023-en
General
-
Target
http://adform.net
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133445319960748021" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2848 chrome.exe 2848 chrome.exe 2216 chrome.exe 2216 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2848 wrote to memory of 4748 2848 chrome.exe 87 PID 2848 wrote to memory of 4748 2848 chrome.exe 87 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 972 2848 chrome.exe 91 PID 2848 wrote to memory of 4672 2848 chrome.exe 90 PID 2848 wrote to memory of 4672 2848 chrome.exe 90 PID 2848 wrote to memory of 4132 2848 chrome.exe 92 PID 2848 wrote to memory of 4132 2848 chrome.exe 92 PID 2848 wrote to memory of 4132 2848 chrome.exe 92 PID 2848 wrote to memory of 4132 2848 chrome.exe 92 PID 2848 wrote to memory of 4132 2848 chrome.exe 92 PID 2848 wrote to memory of 4132 2848 chrome.exe 92 PID 2848 wrote to memory of 4132 2848 chrome.exe 92 PID 2848 wrote to memory of 4132 2848 chrome.exe 92 PID 2848 wrote to memory of 4132 2848 chrome.exe 92 PID 2848 wrote to memory of 4132 2848 chrome.exe 92 PID 2848 wrote to memory of 4132 2848 chrome.exe 92 PID 2848 wrote to memory of 4132 2848 chrome.exe 92 PID 2848 wrote to memory of 4132 2848 chrome.exe 92 PID 2848 wrote to memory of 4132 2848 chrome.exe 92 PID 2848 wrote to memory of 4132 2848 chrome.exe 92 PID 2848 wrote to memory of 4132 2848 chrome.exe 92 PID 2848 wrote to memory of 4132 2848 chrome.exe 92 PID 2848 wrote to memory of 4132 2848 chrome.exe 92 PID 2848 wrote to memory of 4132 2848 chrome.exe 92 PID 2848 wrote to memory of 4132 2848 chrome.exe 92 PID 2848 wrote to memory of 4132 2848 chrome.exe 92 PID 2848 wrote to memory of 4132 2848 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://adform.net1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe129a9758,0x7ffe129a9768,0x7ffe129a97782⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1896,i,15430352280124257442,1198609093231989031,131072 /prefetch:82⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1896,i,15430352280124257442,1198609093231989031,131072 /prefetch:22⤵PID:972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1896,i,15430352280124257442,1198609093231989031,131072 /prefetch:82⤵PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1896,i,15430352280124257442,1198609093231989031,131072 /prefetch:12⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2992 --field-trial-handle=1896,i,15430352280124257442,1198609093231989031,131072 /prefetch:12⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3912 --field-trial-handle=1896,i,15430352280124257442,1198609093231989031,131072 /prefetch:12⤵PID:1532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3144 --field-trial-handle=1896,i,15430352280124257442,1198609093231989031,131072 /prefetch:12⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4492 --field-trial-handle=1896,i,15430352280124257442,1198609093231989031,131072 /prefetch:82⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3912 --field-trial-handle=1896,i,15430352280124257442,1198609093231989031,131072 /prefetch:82⤵PID:4292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4508 --field-trial-handle=1896,i,15430352280124257442,1198609093231989031,131072 /prefetch:12⤵PID:4428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1692 --field-trial-handle=1896,i,15430352280124257442,1198609093231989031,131072 /prefetch:12⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=1008 --field-trial-handle=1896,i,15430352280124257442,1198609093231989031,131072 /prefetch:12⤵PID:3504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1896,i,15430352280124257442,1198609093231989031,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1876 --field-trial-handle=1896,i,15430352280124257442,1198609093231989031,131072 /prefetch:12⤵PID:1452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4792 --field-trial-handle=1896,i,15430352280124257442,1198609093231989031,131072 /prefetch:12⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:236
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4420
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:3728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD570c653ef6aa052a1b3db7cfb027259e9
SHA103891be8bfc5bce5d4ba3561746168aa77317142
SHA2566a2699a120f516b6a6c598a461cd21de1234c8303608bd23a3f85cb76b576a6a
SHA5126fe02c099b849baf9d1f1efdfd70ef7bd59de31c3476dba35a646b64eb204bc9959eb9936e54ea747c7ea4d6682e857e3084aa312926156ccf0a348b17cf4b70
-
Filesize
5KB
MD5f66dbce44e6bec7b551b4c754f0b0b7f
SHA16be7c02b4ea2596984d8d446a9fcbee8fb45e7c4
SHA256999944e209c120475b8ab30e257fa049a761a2e40c32b1ecc15641486a26aecc
SHA512ceccc564f83d389727389847d85c0e8bb6f4962da7f22ec11459c235aba33befa00d9aa7134ec642c9f1fef89f7fe02a79d9a0f7ed835f3d14d21ffc3710d8c5
-
Filesize
5KB
MD58438328895309c0e207c858e96682232
SHA1f65279de9a0f7554315345414201db26a2bd3ff0
SHA2565bb3e571e530b95ba83e78e72a6cf041da77d92a97fa1fd049927d4f010e3f8f
SHA512b1b631ff71c79f502ea981636b063c1841e37762c0e4fc20583b61216558077015573107550f2581c7900e571a3c602f11afc5a68f72c7512f634dd667181120
-
Filesize
109KB
MD5388a1153a3c4dba7175665da762b78ca
SHA137dc859b88cfa6a756619c476c7f9bad396fcb06
SHA256ae047afa7e33c582bfe644265c3f811d59b8ec1f029f0bc50eccbde397676658
SHA5122d555f58bbf458b2bee8e4ffa974c1dbfcf8705f4905fe6c93dc27a9d03de425c2ba0e7695d6d89897605896e205a17de2f25d3f7eb976bc7073f5ebc284fe70
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd