Analysis
-
max time kernel
1200s -
max time network
1199s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2023 02:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://woostermotorways.com
Resource
win10v2004-20231023-en
General
-
Target
http://woostermotorways.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133450928929094695" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 772 chrome.exe 772 chrome.exe 2420 chrome.exe 2420 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 772 chrome.exe 772 chrome.exe 772 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: 33 3724 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3724 AUDIODG.EXE Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe Token: SeShutdownPrivilege 772 chrome.exe Token: SeCreatePagefilePrivilege 772 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe 772 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 772 wrote to memory of 2100 772 chrome.exe 89 PID 772 wrote to memory of 2100 772 chrome.exe 89 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4564 772 chrome.exe 92 PID 772 wrote to memory of 4584 772 chrome.exe 93 PID 772 wrote to memory of 4584 772 chrome.exe 93 PID 772 wrote to memory of 1664 772 chrome.exe 94 PID 772 wrote to memory of 1664 772 chrome.exe 94 PID 772 wrote to memory of 1664 772 chrome.exe 94 PID 772 wrote to memory of 1664 772 chrome.exe 94 PID 772 wrote to memory of 1664 772 chrome.exe 94 PID 772 wrote to memory of 1664 772 chrome.exe 94 PID 772 wrote to memory of 1664 772 chrome.exe 94 PID 772 wrote to memory of 1664 772 chrome.exe 94 PID 772 wrote to memory of 1664 772 chrome.exe 94 PID 772 wrote to memory of 1664 772 chrome.exe 94 PID 772 wrote to memory of 1664 772 chrome.exe 94 PID 772 wrote to memory of 1664 772 chrome.exe 94 PID 772 wrote to memory of 1664 772 chrome.exe 94 PID 772 wrote to memory of 1664 772 chrome.exe 94 PID 772 wrote to memory of 1664 772 chrome.exe 94 PID 772 wrote to memory of 1664 772 chrome.exe 94 PID 772 wrote to memory of 1664 772 chrome.exe 94 PID 772 wrote to memory of 1664 772 chrome.exe 94 PID 772 wrote to memory of 1664 772 chrome.exe 94 PID 772 wrote to memory of 1664 772 chrome.exe 94 PID 772 wrote to memory of 1664 772 chrome.exe 94 PID 772 wrote to memory of 1664 772 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://woostermotorways.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeb0d19758,0x7ffeb0d19768,0x7ffeb0d197782⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1872,i,8195155329673949303,9320073925462373427,131072 /prefetch:22⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1872,i,8195155329673949303,9320073925462373427,131072 /prefetch:82⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1872,i,8195155329673949303,9320073925462373427,131072 /prefetch:82⤵PID:1664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1872,i,8195155329673949303,9320073925462373427,131072 /prefetch:12⤵PID:4684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1872,i,8195155329673949303,9320073925462373427,131072 /prefetch:12⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4988 --field-trial-handle=1872,i,8195155329673949303,9320073925462373427,131072 /prefetch:12⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 --field-trial-handle=1872,i,8195155329673949303,9320073925462373427,131072 /prefetch:82⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3972 --field-trial-handle=1872,i,8195155329673949303,9320073925462373427,131072 /prefetch:82⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5208 --field-trial-handle=1872,i,8195155329673949303,9320073925462373427,131072 /prefetch:82⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4724 --field-trial-handle=1872,i,8195155329673949303,9320073925462373427,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2432
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f8 0x3981⤵
- Suspicious use of AdjustPrivilegeToken
PID:3724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
936B
MD5ae865d21278ed833da801cffde12cb4a
SHA1f72ceeae1403b5ecaf6f56486b5c0a77e3144c59
SHA2561a38299397633aec54e62eece221acea5efa76d8be8981e4333f011e6302ce64
SHA5128b7d2cee8b08fc692576a03763b4106fa7e1645cb48237cd467bce1014c768f598cda3033e72fbbd725dd6ec0e852910c621a439af2b5f1cc5181022ca78922a
-
Filesize
3KB
MD5278ddaf55bf783aed5c269e7d5b14254
SHA19fe8cb5ccb134837e13e02d9433a3e05063b6035
SHA256c2f6d4dd2a8908d0fb902ce87868d58523e8f7c3c1206a2188a2a8c9c98c39cb
SHA512981470f390065e9d3978aa8f85c03d6630291fd919f132ab0f9193a8be7d40d4bcf253b4dcf85126af7b3e1eaece923a4bd6d0ac12b0e2189ea12d979d4828ad
-
Filesize
874B
MD5e1a630d59943ff977d55b0577ec4719c
SHA1aa0f8c19fcddf8459d050953200f102cfbac8f89
SHA256c0ec0b89ef0aaa4373545058b2147b703e4d5f9fefaf4398afcd01c56955ef95
SHA512b19ef45c9f406e89d637d0b656c37e937352a8664e80ef40898018ab4b4399a7f84de1614de451b74737a2df229f537670170fe7d5fa85f398536a10c7197c1a
-
Filesize
874B
MD5529f2f32b72ec18d847c39476790c872
SHA197cb4157a68cee20556bb62ba591f777f27e4b9f
SHA256d89723668f53e2b9b29a6db151a73fd86e1050c60cfa51042d00f98baab0075b
SHA512ef4819cd44077632ed02ef2cac1469d2ca3d042e3ec8b60f554b6d0980416e9548cb79f08dc10f43cb4ce67afccf057f749e15a7e39405c51263f0202845db0b
-
Filesize
6KB
MD5b18c589a55792d0b809522faf1447063
SHA172e6aa81e841dd2586cc70c3fe75631891e7de03
SHA2561c0eeb54654cdafa3cb5876f93b029486fc5a6dc341decc85fb4e318a440be64
SHA512bb3db2f91d2a363c59637804e47b2605cb30a09cacebe12ce3b67e19187a95a71691aac81a7399b5ef45f4a26fa19e742d0ef35e11006c6563bfe2d12e440824
-
Filesize
6KB
MD580026d0609df7e1fccf0c574ce8063a9
SHA1203e50b856b114adaafea37a9f5621706439e4bb
SHA256f2c973ad0854bc7203c892859f4726e2519f375200099bb57df6cd3bc2b36d57
SHA512a677158ff5e85f3557e77dabd2436f6144bdc811ca846dd8b8ba10914a4c2b4c33816cad1874e44ce502ba1eca764cf903ee568c46a3fec8ef5ea9ce54785286
-
Filesize
6KB
MD567f0aec0576ad92fb4b80a214dd02710
SHA175ea3985db414b9c186bcb9966b038bd8c59b128
SHA25609ff8a62e4766d39aed92e6466fcd1ce0c0582bb2b04f641b91197a662a03e53
SHA512e6b1fdc0d0bb93d4b57396039f2b9e6e69d93d1c72920e6917caa67c63452d34dbaa066a37252eb400694dc696a1377c38849b98385a69342691ff8b471c2cc5
-
Filesize
5KB
MD560ebf51c1bb189000d59b953a43fe5d2
SHA1fd68825daaaf5dbc7e8b0a92d47c4202c1c53e15
SHA2563718c77e6d5fec6fecc5838cc6f6a423208d77c7dc2620f9871cdbcfe2031838
SHA512c5ce253832aeab7acbb990cc2a840d1b6f6e782ca3bdafab38b70c2bd0051651e1927a9f7213acb4f79cc430ce67ab8fc8cefc1e0378316eeaf487b90c98ac08
-
Filesize
109KB
MD5e5cbb171c815332129d71b2b325dd1c0
SHA1abee3f43af97037609b7d6b71ed1351b05c69b6f
SHA2566ecbb62049dccab561a87009641451b0d59617109fcfb527e129ab842ebbd640
SHA51271d9514ef41aba79f608a9399b63857989efa5f6c92f4ddf63e0600e72a8f1380c25719c55e663af9939a324c59e82ad83f56079043ca48b79c776efbdb0dc53
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd