Analysis
-
max time kernel
300s -
max time network
286s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
09/01/2024, 17:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://olfaprops.in/mnevery/
Resource
win10-20231215-en
General
-
Target
https://olfaprops.in/mnevery/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133492953416201450" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2512 chrome.exe 2512 chrome.exe 1248 chrome.exe 1248 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe Token: SeShutdownPrivilege 2512 chrome.exe Token: SeCreatePagefilePrivilege 2512 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2512 wrote to memory of 4184 2512 chrome.exe 72 PID 2512 wrote to memory of 4184 2512 chrome.exe 72 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 1312 2512 chrome.exe 76 PID 2512 wrote to memory of 3404 2512 chrome.exe 74 PID 2512 wrote to memory of 3404 2512 chrome.exe 74 PID 2512 wrote to memory of 652 2512 chrome.exe 75 PID 2512 wrote to memory of 652 2512 chrome.exe 75 PID 2512 wrote to memory of 652 2512 chrome.exe 75 PID 2512 wrote to memory of 652 2512 chrome.exe 75 PID 2512 wrote to memory of 652 2512 chrome.exe 75 PID 2512 wrote to memory of 652 2512 chrome.exe 75 PID 2512 wrote to memory of 652 2512 chrome.exe 75 PID 2512 wrote to memory of 652 2512 chrome.exe 75 PID 2512 wrote to memory of 652 2512 chrome.exe 75 PID 2512 wrote to memory of 652 2512 chrome.exe 75 PID 2512 wrote to memory of 652 2512 chrome.exe 75 PID 2512 wrote to memory of 652 2512 chrome.exe 75 PID 2512 wrote to memory of 652 2512 chrome.exe 75 PID 2512 wrote to memory of 652 2512 chrome.exe 75 PID 2512 wrote to memory of 652 2512 chrome.exe 75 PID 2512 wrote to memory of 652 2512 chrome.exe 75 PID 2512 wrote to memory of 652 2512 chrome.exe 75 PID 2512 wrote to memory of 652 2512 chrome.exe 75 PID 2512 wrote to memory of 652 2512 chrome.exe 75 PID 2512 wrote to memory of 652 2512 chrome.exe 75 PID 2512 wrote to memory of 652 2512 chrome.exe 75 PID 2512 wrote to memory of 652 2512 chrome.exe 75
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://olfaprops.in/mnevery/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffc8c359758,0x7ffc8c359768,0x7ffc8c3597782⤵PID:4184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1808 --field-trial-handle=1848,i,7051195032839910520,13139538529460996227,131072 /prefetch:82⤵PID:3404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2104 --field-trial-handle=1848,i,7051195032839910520,13139538529460996227,131072 /prefetch:82⤵PID:652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1848,i,7051195032839910520,13139538529460996227,131072 /prefetch:22⤵PID:1312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2960 --field-trial-handle=1848,i,7051195032839910520,13139538529460996227,131072 /prefetch:12⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2100 --field-trial-handle=1848,i,7051195032839910520,13139538529460996227,131072 /prefetch:12⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 --field-trial-handle=1848,i,7051195032839910520,13139538529460996227,131072 /prefetch:82⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 --field-trial-handle=1848,i,7051195032839910520,13139538529460996227,131072 /prefetch:82⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5216 --field-trial-handle=1848,i,7051195032839910520,13139538529460996227,131072 /prefetch:12⤵PID:1640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5208 --field-trial-handle=1848,i,7051195032839910520,13139538529460996227,131072 /prefetch:12⤵PID:1720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1512 --field-trial-handle=1848,i,7051195032839910520,13139538529460996227,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1248
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD542fae0a085d2ae08220ceb9952d089f6
SHA1e55e412a151098c53c0a3594b8fec434546901d0
SHA256bdc55b677b5c748a07351cf572f9a7ad9053e6bc1c05e9adfd3fab96169cb192
SHA512d87b7bc6671fb175f1074189ae1c79ee4b5c7e7c03b4b3f36dee3f3ef2701f5796afd4433af82a11770b53bd46e4ddd31cfb83f4e912dd18178605cdd1b20a46
-
Filesize
1KB
MD57af4c0fde6ac04fa3478d7af55386c49
SHA1b7dc6659c54c1663afa008d3cc34ddce8e9e30e0
SHA2564163c215a5bcfd4c524c124b8470843dc389854f2c9cde1cfb6397c2823e6000
SHA512321dbe19c3fe2ed7b522952a846b34696766ee7bd2833cdbaa2cd371c738b025cdbb03c38c89dd12325da4cd9c915000e358fac6141fe930893e1f52e1ee03b0
-
Filesize
1KB
MD5cf92699dc267ba54d4e73a4c62799bfe
SHA1c84798f72723fee6c599bb2f5835a1886f02dc39
SHA256026ac9cca0773a6a69408f98677a171d84ac54f5685a09c34cd4c5bad8be9a23
SHA51290738f4e343cdb26a0e30caf94cd70461830063d840bbf48dde6f112d13fd1c5a41bbe7644d334e08c5fd704e11bb00daff9cd6556ca0b2fa5bbec5bf113b96c
-
Filesize
5KB
MD59a49b143843b551a50d8e14087708272
SHA1c64ed31524b859e0234c8836b5519d3740654fc8
SHA25692304c2c554833f977cbc735e7161c6a08b0c3c1aa9a670af4c724030cb4a2d9
SHA512bb13859032362f89cc265ee76069bb9459e2452ebf21a62125129d36fc9aca2df3cc3a9c0568463d21ee1225a0487aa096a3fa797b540dc713cb5f566bf010c2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\d76088aa-7e9b-4f7f-80b0-334be26dbfca.tmp
Filesize5KB
MD591526c464489dcdb05754e836ea9e400
SHA1ca2801d53b25446a28a161c47fdae7679f258c52
SHA2560cebf7c44881d15e4ddd02d631d5306b9ce98606170d0bdbc070e815b3b1fae5
SHA5129441ad106745ee551f13f5a92b01f4ad4e00feb678d994dc0d789e7f9fe553670665487871baeb1a8c81a9f236ebc1473fa54ededa424bce870677ce832c246a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\f073a94b-9f81-4a1c-9f49-79faf62ed6e7.tmp
Filesize8KB
MD5ef1939bdc42a6a44730382489ada4d1d
SHA134c74ad38c7e389d599a6048cb1569e33dc51fdb
SHA256a0131586d25fc817d6bf592995c24d1848e118381a3678a4b5460c271e7ee71a
SHA512c9984665d6cf2e1751be008adb6c7ba0960c678578c8c6d0e42c221e708b49e446257f6954b7da5d533338b0e6edf28e2a6b3c777d1f7b2ea042c72a1dd01e66
-
Filesize
114KB
MD500ddd62a0a5824c669bd0f9cf72c60c8
SHA184c267a0fe9276e03d7ac802ee3754781eec9370
SHA2562d189b693c96f700465dd70e49cc6e291d68334b8de0cc22077dc466d1e268c2
SHA512ab7d45866550e69c47da94fea155ff87265ca16ca54550b000b1a1833a6c8e284e8a23e784554b8fa51a1683cd735f602f0660dc03154c469a6e6bee625384d6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd