Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2024 07:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ivalua.ad.lefrak.com/page.aspx/en/wfl/wfl_validate/NTcyN3xMZUZyYWtfb3JkZXJfbmV3X2Fja25vd3xBUnx0X29yZF9vcmRlcnw2MDE1Nzd8cmVm?uid=d33b0e02-7ccf-4dbb-9543-1d4052ea2c4b
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://ivalua.ad.lefrak.com/page.aspx/en/wfl/wfl_validate/NTcyN3xMZUZyYWtfb3JkZXJfbmV3X2Fja25vd3xBUnx0X29yZF9vcmRlcnw2MDE1Nzd8cmVm?uid=d33b0e02-7ccf-4dbb-9543-1d4052ea2c4b
Resource
win10v2004-20231215-en
General
-
Target
https://ivalua.ad.lefrak.com/page.aspx/en/wfl/wfl_validate/NTcyN3xMZUZyYWtfb3JkZXJfbmV3X2Fja25vd3xBUnx0X29yZF9vcmRlcnw2MDE1Nzd8cmVm?uid=d33b0e02-7ccf-4dbb-9543-1d4052ea2c4b
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133494335558754218" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4380 chrome.exe 4380 chrome.exe 5024 chrome.exe 5024 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4380 wrote to memory of 4596 4380 chrome.exe 88 PID 4380 wrote to memory of 4596 4380 chrome.exe 88 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 456 4380 chrome.exe 90 PID 4380 wrote to memory of 672 4380 chrome.exe 91 PID 4380 wrote to memory of 672 4380 chrome.exe 91 PID 4380 wrote to memory of 1848 4380 chrome.exe 92 PID 4380 wrote to memory of 1848 4380 chrome.exe 92 PID 4380 wrote to memory of 1848 4380 chrome.exe 92 PID 4380 wrote to memory of 1848 4380 chrome.exe 92 PID 4380 wrote to memory of 1848 4380 chrome.exe 92 PID 4380 wrote to memory of 1848 4380 chrome.exe 92 PID 4380 wrote to memory of 1848 4380 chrome.exe 92 PID 4380 wrote to memory of 1848 4380 chrome.exe 92 PID 4380 wrote to memory of 1848 4380 chrome.exe 92 PID 4380 wrote to memory of 1848 4380 chrome.exe 92 PID 4380 wrote to memory of 1848 4380 chrome.exe 92 PID 4380 wrote to memory of 1848 4380 chrome.exe 92 PID 4380 wrote to memory of 1848 4380 chrome.exe 92 PID 4380 wrote to memory of 1848 4380 chrome.exe 92 PID 4380 wrote to memory of 1848 4380 chrome.exe 92 PID 4380 wrote to memory of 1848 4380 chrome.exe 92 PID 4380 wrote to memory of 1848 4380 chrome.exe 92 PID 4380 wrote to memory of 1848 4380 chrome.exe 92 PID 4380 wrote to memory of 1848 4380 chrome.exe 92 PID 4380 wrote to memory of 1848 4380 chrome.exe 92 PID 4380 wrote to memory of 1848 4380 chrome.exe 92 PID 4380 wrote to memory of 1848 4380 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ivalua.ad.lefrak.com/page.aspx/en/wfl/wfl_validate/NTcyN3xMZUZyYWtfb3JkZXJfbmV3X2Fja25vd3xBUnx0X29yZF9vcmRlcnw2MDE1Nzd8cmVm?uid=d33b0e02-7ccf-4dbb-9543-1d4052ea2c4b1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc00919758,0x7ffc00919768,0x7ffc009197782⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1832,i,17259412326768411309,7656659280519046414,131072 /prefetch:22⤵PID:456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=1832,i,17259412326768411309,7656659280519046414,131072 /prefetch:82⤵PID:672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2172 --field-trial-handle=1832,i,17259412326768411309,7656659280519046414,131072 /prefetch:82⤵PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3068 --field-trial-handle=1832,i,17259412326768411309,7656659280519046414,131072 /prefetch:12⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3080 --field-trial-handle=1832,i,17259412326768411309,7656659280519046414,131072 /prefetch:12⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4976 --field-trial-handle=1832,i,17259412326768411309,7656659280519046414,131072 /prefetch:12⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 --field-trial-handle=1832,i,17259412326768411309,7656659280519046414,131072 /prefetch:82⤵PID:1384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3936 --field-trial-handle=1832,i,17259412326768411309,7656659280519046414,131072 /prefetch:82⤵PID:2528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2364 --field-trial-handle=1832,i,17259412326768411309,7656659280519046414,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD5435eaac6da29c1b2651946501cb63b2e
SHA1afc52c71503ef1fd5b8f6cce7b1625abf153c819
SHA2564a572e607dc161fa89dbe3f81e6f70f51f101a709764a4200f5b3122b91b82c6
SHA5122a21f072530ff6304af0e780f35c0c02bc176c4845c280c7f0f9db6f402d7d8f2b0371a18f644c372a33b7701f7ad2ad3aab9d6c37695163f111344c8036f80c
-
Filesize
1KB
MD5c8d8de8fa5d33e614243dfa28f90b2f2
SHA1d577e7aa39d5ddd0d70127ada208a5c00eef866a
SHA256ef110957e861aed77196882520326d726a2144f8ae382ccde6692341092bbdd4
SHA512e9a4b3bd3b57bd15c95e6fea63bbbfe82b3a9ed7354497c2010ebd3d3ef1c01acd857d4ecc8e894a392c13b2b597e94fd62abfcb46e5f22c8a89b4c94209de56
-
Filesize
2KB
MD506d83b60f571919e6882f9d79e38ea97
SHA157154900544ce205b694ef9fbd9502f0b7ae3d43
SHA256f8a725bdb1d158a538e84d3b52b25b8ce89f0c061b47256dbc8b64069958464f
SHA512aeb2aad7956c8a7cf32fdd0d3083a958f00847d12e8e1f114ba3699b9f97446a1e8fe39ef27759e7bbea989ee399eae0855616a1a177d00617c184dab9c72fbe
-
Filesize
874B
MD55689d7859b5d5b6a9f612bc1aca6ee59
SHA1fe6b52208532a3c576e7a8e292334b33d7a2beb8
SHA256858aac8d2f896632e8a9ae5baaee46cb341244c87a085f9c82b0edbd1f36dcc3
SHA512841b2e3cd792d03248c0a2c17fdd372110b9a59409d830569442dd9bbd68fca9fc8e7f89e02b4961bc510004c5837c6b14224b2911492b1979b8637b28aa0dc1
-
Filesize
874B
MD5bda8c3ed85c3f5334467724f31268577
SHA1b9212b25e0c5a03bed5c74c26d89450dee4c5408
SHA2561e7286511f8d61715ef10ace035d072c7b5034094be6768838253ecbf66f6f4f
SHA512b4861a7968046f96dabf8853fc46536791a9078175dc38fa30770c86942d3e59be5a13098c85e29c5e15c113637303a3bf4134f4485a304ea70f6641ca0eb3fd
-
Filesize
6KB
MD57225ce281a2728e97f7622f060f6eb9c
SHA159e03f10decb49f7afbdd310aea5997a6951214a
SHA256a00b487a3092720b63db48cc1b89b5c3736d9daa74d7f50cc3edcc7b9afb7a57
SHA512c62b5f0bf8ebaa0ba5e69e0b446c1ad452dac98d002ace68c0646bfc721eede2b345a9e330cb3898fd4b0070991f130dd51bc1a730c2285cafce78fcdd3b884b
-
Filesize
114KB
MD504b22ab6a4411010e090f3b9d29039f3
SHA13286dc06b26014aa9a6bc1a866dddd65c15f7afe
SHA2568cfcd194a891b6a6a67aa0b07553d062aabaaddf43916c3ed953cabd94802c03
SHA5128df1596fb0be98ef0e420d422cee61f5c8b4ae900754d152f6838a73ebbe37de1038cb066f0c3187f6b8be3c8a4d97b1c15b0632696ab86d2006339f15a5e40c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd