Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2023 04:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ausgv23.sbs/ServiceAbenef
Resource
win10v2004-20231023-en
General
-
Target
http://ausgv23.sbs/ServiceAbenef
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133450162487245544" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3420 chrome.exe 3420 chrome.exe 2724 chrome.exe 2724 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3420 wrote to memory of 3416 3420 chrome.exe 87 PID 3420 wrote to memory of 3416 3420 chrome.exe 87 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 4016 3420 chrome.exe 90 PID 3420 wrote to memory of 3640 3420 chrome.exe 91 PID 3420 wrote to memory of 3640 3420 chrome.exe 91 PID 3420 wrote to memory of 3796 3420 chrome.exe 92 PID 3420 wrote to memory of 3796 3420 chrome.exe 92 PID 3420 wrote to memory of 3796 3420 chrome.exe 92 PID 3420 wrote to memory of 3796 3420 chrome.exe 92 PID 3420 wrote to memory of 3796 3420 chrome.exe 92 PID 3420 wrote to memory of 3796 3420 chrome.exe 92 PID 3420 wrote to memory of 3796 3420 chrome.exe 92 PID 3420 wrote to memory of 3796 3420 chrome.exe 92 PID 3420 wrote to memory of 3796 3420 chrome.exe 92 PID 3420 wrote to memory of 3796 3420 chrome.exe 92 PID 3420 wrote to memory of 3796 3420 chrome.exe 92 PID 3420 wrote to memory of 3796 3420 chrome.exe 92 PID 3420 wrote to memory of 3796 3420 chrome.exe 92 PID 3420 wrote to memory of 3796 3420 chrome.exe 92 PID 3420 wrote to memory of 3796 3420 chrome.exe 92 PID 3420 wrote to memory of 3796 3420 chrome.exe 92 PID 3420 wrote to memory of 3796 3420 chrome.exe 92 PID 3420 wrote to memory of 3796 3420 chrome.exe 92 PID 3420 wrote to memory of 3796 3420 chrome.exe 92 PID 3420 wrote to memory of 3796 3420 chrome.exe 92 PID 3420 wrote to memory of 3796 3420 chrome.exe 92 PID 3420 wrote to memory of 3796 3420 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://ausgv23.sbs/ServiceAbenef1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb3339758,0x7fffb3339768,0x7fffb33397782⤵PID:3416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1904,i,2369668435711852777,4997559622459383907,131072 /prefetch:22⤵PID:4016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1904,i,2369668435711852777,4997559622459383907,131072 /prefetch:82⤵PID:3640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 --field-trial-handle=1904,i,2369668435711852777,4997559622459383907,131072 /prefetch:82⤵PID:3796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2932 --field-trial-handle=1904,i,2369668435711852777,4997559622459383907,131072 /prefetch:12⤵PID:2600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2960 --field-trial-handle=1904,i,2369668435711852777,4997559622459383907,131072 /prefetch:12⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4548 --field-trial-handle=1904,i,2369668435711852777,4997559622459383907,131072 /prefetch:12⤵PID:3992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 --field-trial-handle=1904,i,2369668435711852777,4997559622459383907,131072 /prefetch:82⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 --field-trial-handle=1904,i,2369668435711852777,4997559622459383907,131072 /prefetch:82⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2756 --field-trial-handle=1904,i,2369668435711852777,4997559622459383907,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD553182e21b5b1b628953803454905b149
SHA13493576c000f569399bbad30dcb20c1584210d31
SHA2569c3f9cf9c325947e846595ff75df724320f8b85033627cc4f2eed16dfd9f66c1
SHA512a7950ee2228472149275f1ead8fc42a5f2796f1f2b53cd3345ca210d0efc546f0439e1c097f90f5690a91986c15d85f33e0d483eb3a711d84798d9c598c68d4d
-
Filesize
2KB
MD590e083bb8c16a623ef47438feb55e496
SHA1d188f446c562ac092941046f129264ce35871c20
SHA25665b043bd4339d3f13227095f3af062edf5a64663419cbd2284b68b5ff6d1330e
SHA51266b49a6770db9e4f383d6e5a6626c596379b0635b6404bad7f0c479879503a1f4df3a53d17fbd722fe4a21e5f1cf44f532f247848b216ebcf7d3d36b4ecfd488
-
Filesize
6KB
MD52552f663fa3cd04c69536aa28dcfc282
SHA17406e959ea296ae151f578d13cf02f38794a21e5
SHA256b0e0d8c2158085617fdaa4e7cacac4d19f22310b0539824dd1c9000fd4bbbbca
SHA512c3ecfd4e8da77a842805aeb104be7b3c82d721e56651a5203aacb57a95206c7c28678f4875c066eed983b11b894181fe7ea8838e4ee41dcb8b28110178246a03
-
Filesize
5KB
MD5c2d1f60374d1b0be0c617efe860a57b2
SHA1068e05972759d2e2adb3eb72b929e37c5b726a1e
SHA256cd9706019b5f779faf7e3a1ebd2fd3f0a963b353cc3fd48f6dd112119f3a3640
SHA51280e020c87e7e72e8a7eaebf71dd19d91a7b2acda1bfbec12777e1973577fda2a5bb61993b2b31630ef490a856eb811db703884ee021d575139fc96693d7df841
-
Filesize
6KB
MD5dc20b213d364e9444c40db3c9a4f52e7
SHA178344a221f6860a07551cd9fe201a4babf657cdc
SHA256f942111694f5ec5d8e4b89fc64a37063afef6c49ef08973254d30523ddfb035c
SHA5124e9bdf7426ab11268c1ac7df81cb97fe97528977afb69a909dad9264d0b172bcefb9764fad071051bda74f51de10c130cf8322d236c0e4fdb66aa8296c8dce8c
-
Filesize
5KB
MD51674915e6bca67f05bb1d3aa46968d31
SHA19d10bfeb2c58bd00f9027f09a8a6c7235fe7da46
SHA256267c9f3656d0b84a56b3b4d99359a2ccff7e0d21f98b7387e02b1bb580af4621
SHA512d97b0337eb39a068c039153f59fdcf315085223a7e28a4b5ad0f3dbd1e41a527f38d18d7efd82ce9afb5c5656c8f0ed735cdef209ac161949a8477f4843552fe
-
Filesize
109KB
MD5f02751e2803048de63c18f03cf1e824b
SHA161f7557e34b468e209850dacfc4be8220c3bcae2
SHA2568e5bd9651266456ea384eed5d9e906a17a4566b2199ce4a5cb51088090629901
SHA512dafd298bd5722949e47d5b6ab28bc07652e2455cd2d1c23e859e2872590a764e0929741c5efc3a7330c764d481fc5abe3f256b41ca55a3a16730fbd8fc8c2d79
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd