Analysis
-
max time kernel
153s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2023 03:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www2.ltaxgo.net/_excel_template/export_e_laas/S00001/CU-TaXGO_to_ELAAS.csv/40/
Resource
win10v2004-20231023-en
General
-
Target
https://www2.ltaxgo.net/_excel_template/export_e_laas/S00001/CU-TaXGO_to_ELAAS.csv/40/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133452684606794378" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4692 chrome.exe 4692 chrome.exe 5088 chrome.exe 5088 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4692 wrote to memory of 3204 4692 chrome.exe 52 PID 4692 wrote to memory of 3204 4692 chrome.exe 52 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2972 4692 chrome.exe 87 PID 4692 wrote to memory of 2128 4692 chrome.exe 88 PID 4692 wrote to memory of 2128 4692 chrome.exe 88 PID 4692 wrote to memory of 4188 4692 chrome.exe 89 PID 4692 wrote to memory of 4188 4692 chrome.exe 89 PID 4692 wrote to memory of 4188 4692 chrome.exe 89 PID 4692 wrote to memory of 4188 4692 chrome.exe 89 PID 4692 wrote to memory of 4188 4692 chrome.exe 89 PID 4692 wrote to memory of 4188 4692 chrome.exe 89 PID 4692 wrote to memory of 4188 4692 chrome.exe 89 PID 4692 wrote to memory of 4188 4692 chrome.exe 89 PID 4692 wrote to memory of 4188 4692 chrome.exe 89 PID 4692 wrote to memory of 4188 4692 chrome.exe 89 PID 4692 wrote to memory of 4188 4692 chrome.exe 89 PID 4692 wrote to memory of 4188 4692 chrome.exe 89 PID 4692 wrote to memory of 4188 4692 chrome.exe 89 PID 4692 wrote to memory of 4188 4692 chrome.exe 89 PID 4692 wrote to memory of 4188 4692 chrome.exe 89 PID 4692 wrote to memory of 4188 4692 chrome.exe 89 PID 4692 wrote to memory of 4188 4692 chrome.exe 89 PID 4692 wrote to memory of 4188 4692 chrome.exe 89 PID 4692 wrote to memory of 4188 4692 chrome.exe 89 PID 4692 wrote to memory of 4188 4692 chrome.exe 89 PID 4692 wrote to memory of 4188 4692 chrome.exe 89 PID 4692 wrote to memory of 4188 4692 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www2.ltaxgo.net/_excel_template/export_e_laas/S00001/CU-TaXGO_to_ELAAS.csv/40/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb86069758,0x7ffb86069768,0x7ffb860697782⤵PID:3204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1852,i,11338402843949580905,3878592669314153674,131072 /prefetch:22⤵PID:2972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1852,i,11338402843949580905,3878592669314153674,131072 /prefetch:82⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1852,i,11338402843949580905,3878592669314153674,131072 /prefetch:82⤵PID:4188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1852,i,11338402843949580905,3878592669314153674,131072 /prefetch:12⤵PID:3968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2912 --field-trial-handle=1852,i,11338402843949580905,3878592669314153674,131072 /prefetch:12⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4600 --field-trial-handle=1852,i,11338402843949580905,3878592669314153674,131072 /prefetch:12⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 --field-trial-handle=1852,i,11338402843949580905,3878592669314153674,131072 /prefetch:82⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1852,i,11338402843949580905,3878592669314153674,131072 /prefetch:82⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3696 --field-trial-handle=1852,i,11338402843949580905,3878592669314153674,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5088
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480B
MD51d1ca0b81635fca712f0d23939409352
SHA1fe8aafc6309e3e7f8a0165f0756d02f088db3838
SHA25621865cc86570fb018a4e553f13492991c7e100f08e9f890019d20ac1ea32d796
SHA512efe28541702e06e4ecd956794933ddd8f09059a339b06fd0b8445d8fdd2f240c1606304eefbce94a8eb406c68b2a255b8d3b5ab879d5c6f9167241d58f6382c0
-
Filesize
2KB
MD5bd6d8a55bb7999d0d5209af169e7e180
SHA114961e0acddd29ba742b93a1d807bfb133ab7ed9
SHA256795fc4cc402c1fc70ad8d6dd16441ac4eb11c4c684278a4b7e250896526eadb3
SHA512db90696ab69c3f3099e55535a8322807b40deb554c55edde9079146391b6ae99f0e6a037abb78b13c7aa8456a0e989b0d30252e3d092cc7039280b6bc4737dfc
-
Filesize
539B
MD51d8db3669d5ef6a08bf34215d2bd12be
SHA18d9748eb74f560f1e10a428478a246f9cec798af
SHA256586fd2a86f5be0ba0f390bb0102c692cc6a0fa791fa3f877497175d46749fae1
SHA512d48e578a4c6322ec8c232870b04b4d1a34a8948cde56a4425b355eaa8392a6ed1964db76dff550f93e33066869907e5280e7e431721c9f81d867ad014369e147
-
Filesize
6KB
MD5f9dbce75edc60540d09d7994ecfd9f89
SHA1ca5dacb386c3bf4f0d0782087e14adc04b689acc
SHA2567a8a38a7e079eeb92917c839d4139783d39ba0594b31cc5ea9fb860d9c42a204
SHA51239091e7dde2cc8607877851451d4f6f16a585f8bab6d995d837c0b6a548eb2ea361ad90e20e8c9a35145d451ebb421ef9af2da7fc9095ac486a4155296044a19
-
Filesize
214KB
MD500ac045f49fdc3899996fdfbf3629d76
SHA15cb82bfd3d275e40446044b8ea87dbcdfd89be56
SHA2564b23469a285458388f1ec6d4b7a787b7923bceef82e5d98d0f47fcb46428e429
SHA512d23170c1ce9bd2c559e0dc1dcd9cb755afcb2be2620bdc2bcea9982273b8f9816d5bbb007b071ec9325318b620ee73df23197148231c596102e1c49ddd241ee4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd