Analysis
-
max time kernel
301s -
max time network
256s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 04:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://samascorah.com/الفرنسي
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://samascorah.com/الفرنسي
Resource
win10v2004-20231215-en
General
-
Target
http://samascorah.com/الفرنسي
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133492475367703742" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1148 chrome.exe 1148 chrome.exe 2316 chrome.exe 2316 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1148 wrote to memory of 3156 1148 chrome.exe 87 PID 1148 wrote to memory of 3156 1148 chrome.exe 87 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 1844 1148 chrome.exe 91 PID 1148 wrote to memory of 2920 1148 chrome.exe 92 PID 1148 wrote to memory of 2920 1148 chrome.exe 92 PID 1148 wrote to memory of 2500 1148 chrome.exe 93 PID 1148 wrote to memory of 2500 1148 chrome.exe 93 PID 1148 wrote to memory of 2500 1148 chrome.exe 93 PID 1148 wrote to memory of 2500 1148 chrome.exe 93 PID 1148 wrote to memory of 2500 1148 chrome.exe 93 PID 1148 wrote to memory of 2500 1148 chrome.exe 93 PID 1148 wrote to memory of 2500 1148 chrome.exe 93 PID 1148 wrote to memory of 2500 1148 chrome.exe 93 PID 1148 wrote to memory of 2500 1148 chrome.exe 93 PID 1148 wrote to memory of 2500 1148 chrome.exe 93 PID 1148 wrote to memory of 2500 1148 chrome.exe 93 PID 1148 wrote to memory of 2500 1148 chrome.exe 93 PID 1148 wrote to memory of 2500 1148 chrome.exe 93 PID 1148 wrote to memory of 2500 1148 chrome.exe 93 PID 1148 wrote to memory of 2500 1148 chrome.exe 93 PID 1148 wrote to memory of 2500 1148 chrome.exe 93 PID 1148 wrote to memory of 2500 1148 chrome.exe 93 PID 1148 wrote to memory of 2500 1148 chrome.exe 93 PID 1148 wrote to memory of 2500 1148 chrome.exe 93 PID 1148 wrote to memory of 2500 1148 chrome.exe 93 PID 1148 wrote to memory of 2500 1148 chrome.exe 93 PID 1148 wrote to memory of 2500 1148 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://samascorah.com/الفرنسي1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc9dc39758,0x7ffc9dc39768,0x7ffc9dc397782⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1812,i,8862943766237838927,15138002773027661757,131072 /prefetch:22⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2024 --field-trial-handle=1812,i,8862943766237838927,15138002773027661757,131072 /prefetch:82⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2068 --field-trial-handle=1812,i,8862943766237838927,15138002773027661757,131072 /prefetch:82⤵PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2944 --field-trial-handle=1812,i,8862943766237838927,15138002773027661757,131072 /prefetch:12⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2936 --field-trial-handle=1812,i,8862943766237838927,15138002773027661757,131072 /prefetch:12⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4024 --field-trial-handle=1812,i,8862943766237838927,15138002773027661757,131072 /prefetch:12⤵PID:664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2944 --field-trial-handle=1812,i,8862943766237838927,15138002773027661757,131072 /prefetch:12⤵PID:3968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4348 --field-trial-handle=1812,i,8862943766237838927,15138002773027661757,131072 /prefetch:82⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4428 --field-trial-handle=1812,i,8862943766237838927,15138002773027661757,131072 /prefetch:12⤵PID:976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3868 --field-trial-handle=1812,i,8862943766237838927,15138002773027661757,131072 /prefetch:82⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1788 --field-trial-handle=1812,i,8862943766237838927,15138002773027661757,131072 /prefetch:12⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3504 --field-trial-handle=1812,i,8862943766237838927,15138002773027661757,131072 /prefetch:12⤵PID:4792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4176 --field-trial-handle=1812,i,8862943766237838927,15138002773027661757,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2316
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5075459b3f98c7ffc4747af4f8a52a5db
SHA1b32a8ada03f9da8f6679ad94081effe97a971dff
SHA256f5560de87dad4cb97f310555a8fc5e190c0703ab61a194d3a7e8db43a6b8eb6c
SHA512bd279dfbdd9c16427d99a43a12ab9ac295670c740ec9ff00754dc75f5e7a8dcad2587ee334c7531077c6038d71fa25fd70c178156714a554348803285eb50aea
-
Filesize
5KB
MD5a1164471d516ed4058f58bd856f233be
SHA11d7bf533b1bee9ce0cd6bc8c5b9c1d2d573fda46
SHA256661c20c2ab4bd0b6b41c9a5c30f83fdbf5604a64571f9d46b028763ad1c2a1ab
SHA512d942582f39c182998f650c65a5ca99830fb15b9657b2408dfe5d7424b13020c8efcb60c7b2ce8416cf0386caaaa8483200f7b687c248cf5410defae9e424500c
-
Filesize
5KB
MD55d3d64e7656bcc2973f893a22e9d4216
SHA1b0979b42c9b2f16d3dfa8f5446e8cd545cbac48a
SHA256d3d6356b8555e932ad414e0d5782f82dffd8f21f042d256c2a349415460cff1c
SHA512cdf90377b6c903de1c0b999ca521b6726b27fc5cd0bed06f89623823c8f33bcd63711dc1b1223b2c25c2c753c22b1fc659d826490b5e6b78ad4b8052f66c96e8
-
Filesize
114KB
MD586e101b32b56a47d78df58b44ca7a317
SHA15d35bb61a267e493ceeb75ad139096b09e2be9e5
SHA256bc5e2cbc02c7919a17b5e326fdd79ab15d48993ce56d185928b5d4e9a9c4c0d6
SHA512f43c13f96ae6e1cc023f42d09795c0390b60992fdc48c4f6d95c72eb3533d8b28515a2a7d4ab66d95c7c261de439fff44762dbf37fb34476f900afcab8c92503
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd