Analysis
-
max time kernel
90s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2023, 18:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.site-trk.com
Resource
win10v2004-20231023-en
General
-
Target
https://www.site-trk.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133455837632561312" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 920 chrome.exe 920 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 920 wrote to memory of 1148 920 chrome.exe 30 PID 920 wrote to memory of 1148 920 chrome.exe 30 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 2888 920 chrome.exe 86 PID 920 wrote to memory of 1696 920 chrome.exe 87 PID 920 wrote to memory of 1696 920 chrome.exe 87 PID 920 wrote to memory of 3160 920 chrome.exe 88 PID 920 wrote to memory of 3160 920 chrome.exe 88 PID 920 wrote to memory of 3160 920 chrome.exe 88 PID 920 wrote to memory of 3160 920 chrome.exe 88 PID 920 wrote to memory of 3160 920 chrome.exe 88 PID 920 wrote to memory of 3160 920 chrome.exe 88 PID 920 wrote to memory of 3160 920 chrome.exe 88 PID 920 wrote to memory of 3160 920 chrome.exe 88 PID 920 wrote to memory of 3160 920 chrome.exe 88 PID 920 wrote to memory of 3160 920 chrome.exe 88 PID 920 wrote to memory of 3160 920 chrome.exe 88 PID 920 wrote to memory of 3160 920 chrome.exe 88 PID 920 wrote to memory of 3160 920 chrome.exe 88 PID 920 wrote to memory of 3160 920 chrome.exe 88 PID 920 wrote to memory of 3160 920 chrome.exe 88 PID 920 wrote to memory of 3160 920 chrome.exe 88 PID 920 wrote to memory of 3160 920 chrome.exe 88 PID 920 wrote to memory of 3160 920 chrome.exe 88 PID 920 wrote to memory of 3160 920 chrome.exe 88 PID 920 wrote to memory of 3160 920 chrome.exe 88 PID 920 wrote to memory of 3160 920 chrome.exe 88 PID 920 wrote to memory of 3160 920 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.site-trk.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa97029758,0x7ffa97029768,0x7ffa970297782⤵PID:1148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1884,i,16512625415092528500,4485088523347595935,131072 /prefetch:22⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1884,i,16512625415092528500,4485088523347595935,131072 /prefetch:82⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1884,i,16512625415092528500,4485088523347595935,131072 /prefetch:82⤵PID:3160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3148 --field-trial-handle=1884,i,16512625415092528500,4485088523347595935,131072 /prefetch:12⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3164 --field-trial-handle=1884,i,16512625415092528500,4485088523347595935,131072 /prefetch:12⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3972 --field-trial-handle=1884,i,16512625415092528500,4485088523347595935,131072 /prefetch:12⤵PID:3500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3340 --field-trial-handle=1884,i,16512625415092528500,4485088523347595935,131072 /prefetch:12⤵PID:1084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 --field-trial-handle=1884,i,16512625415092528500,4485088523347595935,131072 /prefetch:82⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4720 --field-trial-handle=1884,i,16512625415092528500,4485088523347595935,131072 /prefetch:82⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4032 --field-trial-handle=1884,i,16512625415092528500,4485088523347595935,131072 /prefetch:12⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2304 --field-trial-handle=1884,i,16512625415092528500,4485088523347595935,131072 /prefetch:12⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824B
MD5cf61995c1ed72fe566bb161a9ba7bb31
SHA18d4d9de6a7cbe2b63e13c12e37c7a4723f9cc305
SHA25623f98cb15e18e8c03bbee4daa6180371c61a7be2b5f44a85438f955f7816c720
SHA512a2593c0272fab9bf0963b5f30536bc120d6fb77ca1d81a509cf217149174005eea113b17728cf909b42953b4360a3c659db79dd57d28151da3be4ca4890d6ac7
-
Filesize
6KB
MD56c91c6d7f096ee1fa980dfe3088e5e9d
SHA1340c257abc32f8d7f8a8f6b053a0c4ecf8e99c81
SHA256a0805d3516eb4ecc2be2de11fe87a96fea2a9c82b2bb756b67650d5bf11564ce
SHA5122e65864407660bf48737ca1b6322d3730a4dff554e1fb72d06bc66a5873070f06900e2a620e291d0f81c0640d03ff40613717b4a10bce472105779c27ecd15ca
-
Filesize
6KB
MD594fd74872f2cd9ca7f134b517fb685fb
SHA1c3b2e73562f3f00bea0fffb402f8ddcaf5aeb123
SHA25664c6c55a3ba830e0d4c76d4d42c462ba3c01f9c5062da3e7b647539a1632911f
SHA512c6e084ccf880e943cb25216d32c7d147feecc52525126f1036c12968350657108660d2832cb725495c9f5d9b379fcc0b91df1eaedf2165bd376c8c168193a788
-
Filesize
214KB
MD500bea908deac3a3c08d8725b37161edb
SHA124627f63429b8256b320f93f94aafc9875b361ec
SHA256b8c5385c961d43aaf485a89df221ee4ff1fdf0b739d83eeadeff12853e32b680
SHA5122bda8307e1da2605570213d43c94b2e370f91d3d90fd5a50920cee179d7b73569fed17c67679ae4ef07718c2debc8a2c7eaf997275f5902d05a1b2021a7ffedb
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd