Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2023, 18:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ambitious-wave-08c0cb203.4.azurestaticapps.net/
Resource
win10v2004-20231025-en
General
-
Target
https://ambitious-wave-08c0cb203.4.azurestaticapps.net/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133453224312668759" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 1892 chrome.exe 1892 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4412 chrome.exe 4412 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4412 wrote to memory of 5036 4412 chrome.exe 57 PID 4412 wrote to memory of 5036 4412 chrome.exe 57 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 3200 4412 chrome.exe 85 PID 4412 wrote to memory of 492 4412 chrome.exe 88 PID 4412 wrote to memory of 492 4412 chrome.exe 88 PID 4412 wrote to memory of 2908 4412 chrome.exe 86 PID 4412 wrote to memory of 2908 4412 chrome.exe 86 PID 4412 wrote to memory of 2908 4412 chrome.exe 86 PID 4412 wrote to memory of 2908 4412 chrome.exe 86 PID 4412 wrote to memory of 2908 4412 chrome.exe 86 PID 4412 wrote to memory of 2908 4412 chrome.exe 86 PID 4412 wrote to memory of 2908 4412 chrome.exe 86 PID 4412 wrote to memory of 2908 4412 chrome.exe 86 PID 4412 wrote to memory of 2908 4412 chrome.exe 86 PID 4412 wrote to memory of 2908 4412 chrome.exe 86 PID 4412 wrote to memory of 2908 4412 chrome.exe 86 PID 4412 wrote to memory of 2908 4412 chrome.exe 86 PID 4412 wrote to memory of 2908 4412 chrome.exe 86 PID 4412 wrote to memory of 2908 4412 chrome.exe 86 PID 4412 wrote to memory of 2908 4412 chrome.exe 86 PID 4412 wrote to memory of 2908 4412 chrome.exe 86 PID 4412 wrote to memory of 2908 4412 chrome.exe 86 PID 4412 wrote to memory of 2908 4412 chrome.exe 86 PID 4412 wrote to memory of 2908 4412 chrome.exe 86 PID 4412 wrote to memory of 2908 4412 chrome.exe 86 PID 4412 wrote to memory of 2908 4412 chrome.exe 86 PID 4412 wrote to memory of 2908 4412 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ambitious-wave-08c0cb203.4.azurestaticapps.net/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9f36f9758,0x7ff9f36f9768,0x7ff9f36f97782⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1880,i,2956694386819535466,7203338079181045908,131072 /prefetch:22⤵PID:3200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1880,i,2956694386819535466,7203338079181045908,131072 /prefetch:82⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2928 --field-trial-handle=1880,i,2956694386819535466,7203338079181045908,131072 /prefetch:12⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1880,i,2956694386819535466,7203338079181045908,131072 /prefetch:82⤵PID:492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2936 --field-trial-handle=1880,i,2956694386819535466,7203338079181045908,131072 /prefetch:12⤵PID:3884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 --field-trial-handle=1880,i,2956694386819535466,7203338079181045908,131072 /prefetch:82⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 --field-trial-handle=1880,i,2956694386819535466,7203338079181045908,131072 /prefetch:82⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2524 --field-trial-handle=1880,i,2956694386819535466,7203338079181045908,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1892
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD51f7c8fc879182290885921fe7b01f7c8
SHA1f4ca5050a68efdaaac21c48a63c679ac785dc615
SHA256ae4d3c4bfbe2e7eaaa4385d9cd278886e99d4c3bc2ec32998b37fa8d8340cbcd
SHA512368aa38d3c6887086e3846de8c136b0fb0b537527ff2732aa2cc8617bde4afdb0ad5e5c09f96f86cbf74dcddf903add6ae1b54142be194b66b58340fb141d34f
-
Filesize
1KB
MD5a1e497a5391008fea1bd6c9d53b9fe24
SHA142d729b7957abcbfd7cbaa66c242f8abcf46cee4
SHA2568292bca7946b12451b11a2394ba5b5d035fbf7268a29b822ced068c851667050
SHA5122a2640a8dbafc6887138212f78cff59f650068facac335dabcd25cbc9c7a03833877b51b312a59fa3600b8d2c73703c6a7a38175dd4004c4f647427d3f78c05e
-
Filesize
6KB
MD504ae54ff6d62e342a05db3173d37bff5
SHA1ae4ff8ea35518c3ac993ca7a38a612a290852e0a
SHA2561de5ae416e3724499873af45f12292d24adfe9e91278ea7b74c46b0507e7c4dd
SHA512a24ec69acc7dfc630ca5192e5794617c2bb80995bfcae7d949ff4e5ebd1a92194f711755017a5ea799ebd389c4988abaf01a1c9b48799980ba48112bb8ba671a
-
Filesize
6KB
MD529fe20c9b85e400ffe5607b9115bfaf3
SHA15d5e9ed543ef3a1ab2089ab483ec41681ab103d4
SHA25674dfae92875db2185799d35d807f5f125a6aff5cbc4b633b69bcb7444f95753a
SHA5124953e12b4560da2ee13a80a0dd9eec53f27e2e4adf470603d3b91ebeda62aee2c088e310a2ab8dc4a27551323a3dc123b004cf52371a212f2d3868900dbd580c
-
Filesize
109KB
MD5a762d88d7b13474492d5980619b31e5f
SHA1918cf0d0e50ade86944acdbb11124c7f6a733845
SHA2564a7c07cc8853d4273ad2105531c1c072e510bcaeb3d16519f9d08a78a3947d6e
SHA5122730fe075fb42a8c9a7029399b88fe1c4a8a27f849a2fb106204c040ed63e35edb885b5a4ec17194a884541afae4e93839bc6a2fbf139b333557e229da573824
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd