Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2023, 12:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ufiling.labour.gov.za/uif/add-practitioner-confirm?id=DCpq%2BdgGzvCt3YldmKsrvg%3D%3D&action=T40vukU3hDucegLcntVikg%3D%3D
Resource
win10v2004-20231023-en
General
-
Target
https://ufiling.labour.gov.za/uif/add-practitioner-confirm?id=DCpq%2BdgGzvCt3YldmKsrvg%3D%3D&action=T40vukU3hDucegLcntVikg%3D%3D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133446107371721759" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3944 chrome.exe 3944 chrome.exe 4156 chrome.exe 4156 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3944 chrome.exe 3944 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3944 wrote to memory of 3784 3944 chrome.exe 86 PID 3944 wrote to memory of 3784 3944 chrome.exe 86 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 1276 3944 chrome.exe 89 PID 3944 wrote to memory of 2280 3944 chrome.exe 90 PID 3944 wrote to memory of 2280 3944 chrome.exe 90 PID 3944 wrote to memory of 880 3944 chrome.exe 91 PID 3944 wrote to memory of 880 3944 chrome.exe 91 PID 3944 wrote to memory of 880 3944 chrome.exe 91 PID 3944 wrote to memory of 880 3944 chrome.exe 91 PID 3944 wrote to memory of 880 3944 chrome.exe 91 PID 3944 wrote to memory of 880 3944 chrome.exe 91 PID 3944 wrote to memory of 880 3944 chrome.exe 91 PID 3944 wrote to memory of 880 3944 chrome.exe 91 PID 3944 wrote to memory of 880 3944 chrome.exe 91 PID 3944 wrote to memory of 880 3944 chrome.exe 91 PID 3944 wrote to memory of 880 3944 chrome.exe 91 PID 3944 wrote to memory of 880 3944 chrome.exe 91 PID 3944 wrote to memory of 880 3944 chrome.exe 91 PID 3944 wrote to memory of 880 3944 chrome.exe 91 PID 3944 wrote to memory of 880 3944 chrome.exe 91 PID 3944 wrote to memory of 880 3944 chrome.exe 91 PID 3944 wrote to memory of 880 3944 chrome.exe 91 PID 3944 wrote to memory of 880 3944 chrome.exe 91 PID 3944 wrote to memory of 880 3944 chrome.exe 91 PID 3944 wrote to memory of 880 3944 chrome.exe 91 PID 3944 wrote to memory of 880 3944 chrome.exe 91 PID 3944 wrote to memory of 880 3944 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ufiling.labour.gov.za/uif/add-practitioner-confirm?id=DCpq%2BdgGzvCt3YldmKsrvg%3D%3D&action=T40vukU3hDucegLcntVikg%3D%3D1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffba8a9758,0x7fffba8a9768,0x7fffba8a97782⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1828,i,11139906548903060418,11465906560542180384,131072 /prefetch:22⤵PID:1276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1828,i,11139906548903060418,11465906560542180384,131072 /prefetch:82⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1828,i,11139906548903060418,11465906560542180384,131072 /prefetch:82⤵PID:880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3204 --field-trial-handle=1828,i,11139906548903060418,11465906560542180384,131072 /prefetch:12⤵PID:1160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3184 --field-trial-handle=1828,i,11139906548903060418,11465906560542180384,131072 /prefetch:12⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 --field-trial-handle=1828,i,11139906548903060418,11465906560542180384,131072 /prefetch:82⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 --field-trial-handle=1828,i,11139906548903060418,11465906560542180384,131072 /prefetch:82⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3736 --field-trial-handle=1828,i,11139906548903060418,11465906560542180384,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4156
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
264B
MD520c77cce3ad3a6af1cc363d66be11f67
SHA13a8878e94ba470c0450d8409ca3a66ba236c7529
SHA256c6c0b5dd96b361d2712fce9a490b45f3e083a86cf4349f21e6a3ce7c1c9f56d4
SHA512a0891fd4f88b4d686d98825e9bc0de19d0f97741684fe1417a8366b0dd1eaa25e5204e1d7cd10ace8f650c3aef88ebf5a43ab6a02dffc7345a4a360cbffebe51
-
Filesize
1KB
MD5991490a2f180845ea541ef12bc206f56
SHA1ab90a4c41950faa63c342796d52973910cd4cfd8
SHA256f1c071182f440c79fed4f55cef374b4d97f280d4f117bd346631bb8a56ad232a
SHA512fd4282ab5e1d3650dede8816f72353026e35929093ac9ad8db82849d4bdf97551180343795e4b7322769ce484c909e296a8578ad7179b986092fe7f1f9899be5
-
Filesize
705B
MD5dfa50c30c0307ce317afdffae8ffd19c
SHA194a34d61fd1a6a1d12eac5315c62c1758330aa2b
SHA2564fe90b958f1752177bbcca50fe9e8168d5078a3ec39861bff0a905ca0a2b8427
SHA512cf20e7116cb84f0abbfe5131f10cfdd72380bc4be727df39bf74384cdf69e0f29cad42061cc0691a6437cae968c5064bc746e1bd6b0df5b87302352e50d1f234
-
Filesize
5KB
MD57478abd81b6017bf9e9203c851e9be24
SHA1c38596b01f340d9750b054970f92fc33feb6862a
SHA25658292ec160b85e86cb69dc6fbd685da75b49a0b8da77a9ab7dbe28edd37edc26
SHA512a93325170a1547210aec8215e9da343c64e1d212a1b003d3c76a4305e045c0318a7aad6a69415632f91e0a61b688438d1f8ec74fd2753c3e37199fb1dd714408
-
Filesize
5KB
MD5a28157369a28d96136b3c9654282daaf
SHA1821d1c864cdf83bfb9874d3fbee3b46c43bc0316
SHA2569866e3daea75aee442266b134c5f10c3cbc76af2a7074c342e5d4edae61d078c
SHA5122ce5f7cf676f412f32b25bb9a40224c6e37b88c4c5f4ab907942fa497b2067cedb47a2ced3688745c64d496c4987b7015dff010a2cfbed6ea4dc67aeac6e32ca
-
Filesize
6KB
MD59336d2bd53153db1cc8d7ecb366e42a9
SHA108ada392a1472041f2151eb9db8029211129052f
SHA25651c696acaa5143256f7cdaab6fd3728180184b0816c4111d36473435f90214e9
SHA512abf0bf4d7fbecbf7d572b47302818ced846fe3c1c6c553af89ee95539364232decc02dd836fbe944397d7029d6ebdf605da9b60a7a27b1494a188f7db7b17c9b
-
Filesize
109KB
MD52ea8c6acd1721ccf971a1ee9971a27bc
SHA1eb964b4fc23b3f462889b72b765f2c1dcdcb6dc2
SHA2561932ae284a26297c5bd575630be23b87cdf82df9719913f447523225c0d2abc8
SHA512c3f77555d0b88479ded385324809367ca875fc73aeb3536b154c23cbef29148cee14f85dc48840abdb4ef0ee89d0eabd116ee4e3a7e6b503578f836246a98933