Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2023, 04:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://thanhthaiweb.com/-/us/shipment
Resource
win10v2004-20231020-en
General
-
Target
https://thanhthaiweb.com/-/us/shipment
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133451884327040636" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4740 chrome.exe 4740 chrome.exe 2216 chrome.exe 2216 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4740 wrote to memory of 892 4740 chrome.exe 66 PID 4740 wrote to memory of 892 4740 chrome.exe 66 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 2000 4740 chrome.exe 86 PID 4740 wrote to memory of 1092 4740 chrome.exe 87 PID 4740 wrote to memory of 1092 4740 chrome.exe 87 PID 4740 wrote to memory of 3472 4740 chrome.exe 88 PID 4740 wrote to memory of 3472 4740 chrome.exe 88 PID 4740 wrote to memory of 3472 4740 chrome.exe 88 PID 4740 wrote to memory of 3472 4740 chrome.exe 88 PID 4740 wrote to memory of 3472 4740 chrome.exe 88 PID 4740 wrote to memory of 3472 4740 chrome.exe 88 PID 4740 wrote to memory of 3472 4740 chrome.exe 88 PID 4740 wrote to memory of 3472 4740 chrome.exe 88 PID 4740 wrote to memory of 3472 4740 chrome.exe 88 PID 4740 wrote to memory of 3472 4740 chrome.exe 88 PID 4740 wrote to memory of 3472 4740 chrome.exe 88 PID 4740 wrote to memory of 3472 4740 chrome.exe 88 PID 4740 wrote to memory of 3472 4740 chrome.exe 88 PID 4740 wrote to memory of 3472 4740 chrome.exe 88 PID 4740 wrote to memory of 3472 4740 chrome.exe 88 PID 4740 wrote to memory of 3472 4740 chrome.exe 88 PID 4740 wrote to memory of 3472 4740 chrome.exe 88 PID 4740 wrote to memory of 3472 4740 chrome.exe 88 PID 4740 wrote to memory of 3472 4740 chrome.exe 88 PID 4740 wrote to memory of 3472 4740 chrome.exe 88 PID 4740 wrote to memory of 3472 4740 chrome.exe 88 PID 4740 wrote to memory of 3472 4740 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://thanhthaiweb.com/-/us/shipment1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xe0,0xe4,0xd8,0xdc,0x108,0x7fff71539758,0x7fff71539768,0x7fff715397782⤵PID:892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1668,i,12961214056576003104,5649412338949115932,131072 /prefetch:22⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1668,i,12961214056576003104,5649412338949115932,131072 /prefetch:82⤵PID:1092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1668,i,12961214056576003104,5649412338949115932,131072 /prefetch:82⤵PID:3472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1668,i,12961214056576003104,5649412338949115932,131072 /prefetch:12⤵PID:2120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2912 --field-trial-handle=1668,i,12961214056576003104,5649412338949115932,131072 /prefetch:12⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4548 --field-trial-handle=1668,i,12961214056576003104,5649412338949115932,131072 /prefetch:82⤵PID:1584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 --field-trial-handle=1668,i,12961214056576003104,5649412338949115932,131072 /prefetch:82⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5232 --field-trial-handle=1668,i,12961214056576003104,5649412338949115932,131072 /prefetch:12⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4592 --field-trial-handle=1668,i,12961214056576003104,5649412338949115932,131072 /prefetch:12⤵PID:1476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3912 --field-trial-handle=1668,i,12961214056576003104,5649412338949115932,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58013f2c704f8ae39782dbc26ca07b9f8
SHA1cab2460aafb00ff7b4cf6228e8210351d7fa064e
SHA256b6c3857c647b83e7137f2c73e63d4f77f82594a348bd148b34126928fc62a5a2
SHA512b963e0b97c2f92fb7d20ef0e01832a7f709c74db89dbf4f53885a51b94f8d50e224db3877681f2756c130e6c3e8010ee172aca3c8df13ce6796491eaf4b32c04
-
Filesize
1KB
MD51adc10fbdcd489a30dd24343b63e372d
SHA10169f2da6d5d443c76273ae6c37f0d3e30ec940f
SHA256d81399357dcfb6813ee7b5cfeaceb683383751b53211a8d64d9ab274a21e58d6
SHA512bf8ffab8f110c14c97fdbf53178988b4d4b7681a9b8e28c30aeb51894c4b8a8622cb890a7c82fa8fbdbe6392e20d93abf71cce9e88b2fcc16533e0e92f442dc4
-
Filesize
6KB
MD55aedf393b01da254e3da7fccd9dbd425
SHA1efb6d75c97edf19ecb5b8912e17a64fa077ff4b5
SHA25651fb9b3063be0e11f979deff20b6d8edf98a27f6914117bbca1719da42fdc1a3
SHA512deac2116afab6bb06543d7bafad280a37a9a0864a3370b37f964c190b96ede83534ed818d35e4875feabd93fbc68da13a449b049ed762dd8deb191d073439ec2
-
Filesize
6KB
MD5937b8add49f5bb1c804967afff82b671
SHA1cc5f63f7363a8b33949db463d358ecb1af62d297
SHA25674d1178c8f560d041d297ffe18b20eb79270bb0b6416c487d942a1a3c3582fc3
SHA5121447f71489b13cdfff06ddb38386ab7569176eb5ad4aac906ec46c8d060baada08de2b900451f90b0e271db72144acab52ab1464a01e31ff1294db6425ead536
-
Filesize
109KB
MD58d4a376e285db759b4190967e041fbdc
SHA1a9b911af41c29549013239d0aa2b6da0c7e72bdf
SHA256d1e7650930752787b3d8339fd9227b5d2c99e3079987ff382dd711c20b5ba4c8
SHA512d3d9517d502ab7624a98ab2fa3b98517400b614e7f880489c40d5e148a036e908fec1cd3fbb39b48eba41cbb9461da357b0c3c5f5b0e8c02694e3b652c7a6592
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd