Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2024 11:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mm-bergkvistsiljan.com/migration-login
Resource
win10v2004-20231215-en
General
-
Target
https://mm-bergkvistsiljan.com/migration-login
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133492746534019902" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4676 chrome.exe 4676 chrome.exe 6116 chrome.exe 6116 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4676 chrome.exe 4676 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4676 wrote to memory of 460 4676 chrome.exe 14 PID 4676 wrote to memory of 460 4676 chrome.exe 14 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 1492 4676 chrome.exe 28 PID 4676 wrote to memory of 2580 4676 chrome.exe 27 PID 4676 wrote to memory of 2580 4676 chrome.exe 27 PID 4676 wrote to memory of 4092 4676 chrome.exe 26 PID 4676 wrote to memory of 4092 4676 chrome.exe 26 PID 4676 wrote to memory of 4092 4676 chrome.exe 26 PID 4676 wrote to memory of 4092 4676 chrome.exe 26 PID 4676 wrote to memory of 4092 4676 chrome.exe 26 PID 4676 wrote to memory of 4092 4676 chrome.exe 26 PID 4676 wrote to memory of 4092 4676 chrome.exe 26 PID 4676 wrote to memory of 4092 4676 chrome.exe 26 PID 4676 wrote to memory of 4092 4676 chrome.exe 26 PID 4676 wrote to memory of 4092 4676 chrome.exe 26 PID 4676 wrote to memory of 4092 4676 chrome.exe 26 PID 4676 wrote to memory of 4092 4676 chrome.exe 26 PID 4676 wrote to memory of 4092 4676 chrome.exe 26 PID 4676 wrote to memory of 4092 4676 chrome.exe 26 PID 4676 wrote to memory of 4092 4676 chrome.exe 26 PID 4676 wrote to memory of 4092 4676 chrome.exe 26 PID 4676 wrote to memory of 4092 4676 chrome.exe 26 PID 4676 wrote to memory of 4092 4676 chrome.exe 26 PID 4676 wrote to memory of 4092 4676 chrome.exe 26 PID 4676 wrote to memory of 4092 4676 chrome.exe 26 PID 4676 wrote to memory of 4092 4676 chrome.exe 26 PID 4676 wrote to memory of 4092 4676 chrome.exe 26
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffdb6a39758,0x7ffdb6a39768,0x7ffdb6a397781⤵PID:460
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mm-bergkvistsiljan.com/migration-login1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2916 --field-trial-handle=1852,i,14798840559545016960,14464172171773080606,131072 /prefetch:12⤵PID:912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2908 --field-trial-handle=1852,i,14798840559545016960,14464172171773080606,131072 /prefetch:12⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1852,i,14798840559545016960,14464172171773080606,131072 /prefetch:82⤵PID:4092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1852,i,14798840559545016960,14464172171773080606,131072 /prefetch:82⤵PID:2580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1852,i,14798840559545016960,14464172171773080606,131072 /prefetch:22⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 --field-trial-handle=1852,i,14798840559545016960,14464172171773080606,131072 /prefetch:82⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4056 --field-trial-handle=1852,i,14798840559545016960,14464172171773080606,131072 /prefetch:82⤵PID:3184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4060 --field-trial-handle=1852,i,14798840559545016960,14464172171773080606,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6116
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a3f635bf1b65037e7af914d543b13667
SHA166b6118923872a5c413316152d0b2c7491e5c94c
SHA2567895f548ab03f22019770c670b7c1ed480c54d7cb60bcbf411b919a2eba0c599
SHA51207711fc738bda7905f78e8943e35241a9adcaf21157625ec5936f48fd64cf7238f9db163e114291dffeb8295967b1e32e9d6c95e59e7be32cff2bfb815c40639
-
Filesize
6KB
MD535e26682f568acc48cec4f19a444dadc
SHA107257d12452a79d78c88e1b84b0e5b4d12e0ce08
SHA256a2b544f9a06272b38a3be6481ae3dfab685e16cbc2c7b6082b43d71f0a4b884b
SHA5126388c52ff7faef0557db847d396d85018e627656e78fcffa1cb6446e118d7145ec3adb10b44b23ab96f289f006a1c1eb01ede829c41276fb158b21d379746992
-
Filesize
6KB
MD5a1cbf7e03e770c47d8f62866234370c7
SHA11bcfbc296169a851f0d668bfbf68629e7ecac452
SHA2566d4163e3177044c5128348c4679fc58cde0c0aae9c896e1ebd5ab23acaf67356
SHA512597fa90e31daea5099af2665f604d7ff66ab0bfaee899a0d05b31f5ba617ff1ec4684afd6de424d4e5312ea25f24f2ac6bcf584945034cae72fd8395fadea379
-
Filesize
92KB
MD50b32944e7f51a45e68f3951b7b1db4f7
SHA191f943cb810c53eb5751dc15ad5583f4afa1e2a6
SHA2564dddda89b01742f103ae5780e626a262cdeb91266d08fcbbcb87321eae7429d9
SHA5126ff22d24b46ab94fc4f8e05621a743b87461df3c97fc4becc191de717275db8414989d92865ad1300be6b30d9fb13a5ce3684356695434eaa9d9373e1103f660