Analysis
-
max time kernel
197s -
max time network
201s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 00:50
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://global-secure-manager-ckzns.ampfibian.co.nz/ml/?domain=alswh.org.au&[email protected]
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
https://global-secure-manager-ckzns.ampfibian.co.nz/ml/?domain=alswh.org.au&[email protected]
Resource
win11-20231215-en
Behavioral task
behavioral3
Sample
https://global-secure-manager-ckzns.ampfibian.co.nz/ml/?domain=alswh.org.au&[email protected]
Resource
android-33-x64-arm64-20231215-en
General
-
Target
https://global-secure-manager-ckzns.ampfibian.co.nz/ml/?domain=alswh.org.au&[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133494079318078683" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3320 chrome.exe 3320 chrome.exe 2068 chrome.exe 2068 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3320 wrote to memory of 3156 3320 chrome.exe 91 PID 3320 wrote to memory of 3156 3320 chrome.exe 91 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 3392 3320 chrome.exe 92 PID 3320 wrote to memory of 396 3320 chrome.exe 93 PID 3320 wrote to memory of 396 3320 chrome.exe 93 PID 3320 wrote to memory of 1636 3320 chrome.exe 94 PID 3320 wrote to memory of 1636 3320 chrome.exe 94 PID 3320 wrote to memory of 1636 3320 chrome.exe 94 PID 3320 wrote to memory of 1636 3320 chrome.exe 94 PID 3320 wrote to memory of 1636 3320 chrome.exe 94 PID 3320 wrote to memory of 1636 3320 chrome.exe 94 PID 3320 wrote to memory of 1636 3320 chrome.exe 94 PID 3320 wrote to memory of 1636 3320 chrome.exe 94 PID 3320 wrote to memory of 1636 3320 chrome.exe 94 PID 3320 wrote to memory of 1636 3320 chrome.exe 94 PID 3320 wrote to memory of 1636 3320 chrome.exe 94 PID 3320 wrote to memory of 1636 3320 chrome.exe 94 PID 3320 wrote to memory of 1636 3320 chrome.exe 94 PID 3320 wrote to memory of 1636 3320 chrome.exe 94 PID 3320 wrote to memory of 1636 3320 chrome.exe 94 PID 3320 wrote to memory of 1636 3320 chrome.exe 94 PID 3320 wrote to memory of 1636 3320 chrome.exe 94 PID 3320 wrote to memory of 1636 3320 chrome.exe 94 PID 3320 wrote to memory of 1636 3320 chrome.exe 94 PID 3320 wrote to memory of 1636 3320 chrome.exe 94 PID 3320 wrote to memory of 1636 3320 chrome.exe 94 PID 3320 wrote to memory of 1636 3320 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://global-secure-manager-ckzns.ampfibian.co.nz/ml/?domain=alswh.org.au&[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad5139758,0x7ffad5139768,0x7ffad51397782⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=272 --field-trial-handle=1888,i,1145963308504243267,17092734699832862438,131072 /prefetch:22⤵PID:3392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1888,i,1145963308504243267,17092734699832862438,131072 /prefetch:82⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1888,i,1145963308504243267,17092734699832862438,131072 /prefetch:82⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3012 --field-trial-handle=1888,i,1145963308504243267,17092734699832862438,131072 /prefetch:12⤵PID:1748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1888,i,1145963308504243267,17092734699832862438,131072 /prefetch:12⤵PID:804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3664 --field-trial-handle=1888,i,1145963308504243267,17092734699832862438,131072 /prefetch:12⤵PID:3776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3300 --field-trial-handle=1888,i,1145963308504243267,17092734699832862438,131072 /prefetch:12⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4432 --field-trial-handle=1888,i,1145963308504243267,17092734699832862438,131072 /prefetch:12⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 --field-trial-handle=1888,i,1145963308504243267,17092734699832862438,131072 /prefetch:82⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1888,i,1145963308504243267,17092734699832862438,131072 /prefetch:82⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5052 --field-trial-handle=1888,i,1145963308504243267,17092734699832862438,131072 /prefetch:12⤵PID:1388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2600 --field-trial-handle=1888,i,1145963308504243267,17092734699832862438,131072 /prefetch:12⤵PID:3912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3784 --field-trial-handle=1888,i,1145963308504243267,17092734699832862438,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2068
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56cd27488f7a09c09e6d658e79c4b0542
SHA1459b89737006de57a3b8e308a60e118ba1bee397
SHA25664eb651dc70a210a55451ca41245025031e245f6df25e7aeb23fdc5fdeff95d4
SHA5128ebe017b6425f1973905421df2c29d0fc419763318f6e65f0fe9c1be5029f234e4981da78305bc7ee8f1b458fbd70a1fb63b38e07d6c98c6a83cb8de1c5406d4
-
Filesize
6KB
MD529ea17dbb55ddba27e2b6af01ff08e09
SHA1238f6834956e3534048c50b9e86cde6b308fd7f7
SHA256c80bdedd6ad48618f74653730ef689dcdec5df6857bc3f1417d2b23890b06cae
SHA512982b0ed1b1cca0ff84d216fe04a6d8dd467f92bba7d40503cb9e06a97de50948cfe1211d404eab105ac38e5c41a5e7b49618b6749fafda6ce8da444660acfdc1
-
Filesize
6KB
MD52c428a787ae1384c49f6cffd0819b9da
SHA1577a5c4c6a3b2f88a821c38d8964dd67924b4641
SHA2565c1f21ab8b9ecded9e721c2266a8b61cf3cafe2be096bb77fcb793d9afd2d30c
SHA512aa34bc2328ad3b7edfb90807cf0d03ab217c367c18d12e3cca64953dc2b60d43e79c5a7f1d04c372db9f642ab73030d5f22ee5d5dfa67d818ca5a19f91483c4b
-
Filesize
114KB
MD56a824129670d81c27961a85298f22476
SHA12e330253583d0250b12628bbdff1f586a8f16e1b
SHA25604cf043c74bf9cfa574f7d3fd34fc8bf1647adb16e8c1659d1757fbc5f4e90ad
SHA512c96f6db0fcc03b702d21b7260ec157fdfd39fd750df955cc36640559793fc77df94c58951c4c221a5697e2b25b79f764c22189e6b76ad0bbf544a76b654de8f5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd