Analysis
-
max time kernel
582s -
max time network
600s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2024 00:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://africapolicythink.com/Message%20Centre/mc.php
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
https://africapolicythink.com/Message%20Centre/mc.php
Resource
win10v2004-20231215-en
General
-
Target
https://africapolicythink.com/Message%20Centre/mc.php
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133500122260349313" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 880 chrome.exe 880 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 880 chrome.exe 880 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 880 wrote to memory of 3796 880 chrome.exe 19 PID 880 wrote to memory of 3796 880 chrome.exe 19 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 2932 880 chrome.exe 52 PID 880 wrote to memory of 4648 880 chrome.exe 48 PID 880 wrote to memory of 4648 880 chrome.exe 48 PID 880 wrote to memory of 4712 880 chrome.exe 51 PID 880 wrote to memory of 4712 880 chrome.exe 51 PID 880 wrote to memory of 4712 880 chrome.exe 51 PID 880 wrote to memory of 4712 880 chrome.exe 51 PID 880 wrote to memory of 4712 880 chrome.exe 51 PID 880 wrote to memory of 4712 880 chrome.exe 51 PID 880 wrote to memory of 4712 880 chrome.exe 51 PID 880 wrote to memory of 4712 880 chrome.exe 51 PID 880 wrote to memory of 4712 880 chrome.exe 51 PID 880 wrote to memory of 4712 880 chrome.exe 51 PID 880 wrote to memory of 4712 880 chrome.exe 51 PID 880 wrote to memory of 4712 880 chrome.exe 51 PID 880 wrote to memory of 4712 880 chrome.exe 51 PID 880 wrote to memory of 4712 880 chrome.exe 51 PID 880 wrote to memory of 4712 880 chrome.exe 51 PID 880 wrote to memory of 4712 880 chrome.exe 51 PID 880 wrote to memory of 4712 880 chrome.exe 51 PID 880 wrote to memory of 4712 880 chrome.exe 51 PID 880 wrote to memory of 4712 880 chrome.exe 51 PID 880 wrote to memory of 4712 880 chrome.exe 51 PID 880 wrote to memory of 4712 880 chrome.exe 51 PID 880 wrote to memory of 4712 880 chrome.exe 51
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://africapolicythink.com/Message%20Centre/mc.php1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff968c69758,0x7ff968c69768,0x7ff968c697782⤵PID:3796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1936 --field-trial-handle=1820,i,6299470230257391790,7762607453290260898,131072 /prefetch:82⤵PID:4648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2840 --field-trial-handle=1820,i,6299470230257391790,7762607453290260898,131072 /prefetch:12⤵PID:672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2832 --field-trial-handle=1820,i,6299470230257391790,7762607453290260898,131072 /prefetch:12⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1820,i,6299470230257391790,7762607453290260898,131072 /prefetch:82⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1820,i,6299470230257391790,7762607453290260898,131072 /prefetch:22⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 --field-trial-handle=1820,i,6299470230257391790,7762607453290260898,131072 /prefetch:82⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3816 --field-trial-handle=1820,i,6299470230257391790,7762607453290260898,131072 /prefetch:82⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5614ace8f38d89da39e1c481d66c798d7
SHA1cf03d4969d24020464fb7a25ed18b652075e3980
SHA256b216f23c4da46c27510c54595c1932838f6e0b0718ad67249c774cce33e2f56f
SHA5125ad4e72e4076985730097c7f98084354065edf1a0bf36b2a50325b224879d17d28961a911c9475a80da872f7e3295602352ed656be1d8315d4ff0056b627d862
-
Filesize
539B
MD571c3cdd82054661fb1cbe526aa9f9f01
SHA1f89891f612747da37660acc6ba9bee5ee8a2c4b7
SHA2565a154ac1dac0effab48c5d62eb258dd9714c2abcb2d827d3ffbcbd7125c0a47e
SHA5127d36b0e290c5441976da74c6461670c053a61f54d6f1eccc335d336f49b348f47cc8d050161cb586d269dc2e17a7eb292a4f0662efbebe80e4905751d29e06ce
-
Filesize
7KB
MD5b9530336b2ce8ce0353e853cc435f44f
SHA1ef784365dbd49d2a4bfeb946a1d5f52bdabc20e5
SHA256d174eb03770e5e6ed0f5d4d4c12a1297c1dfe9a25e77c7447e72495fc0794c9b
SHA512ba305fe430c97f3ba3448b26232b106668a8be24df5376845e950dab101f079275635506b05bdf9d1019997dbebe8341991d7089a67929fc521e8c93bb95cd39
-
Filesize
6KB
MD572986189198d491145b89f2b1606389d
SHA1e81fd2945ce1a9a4f21f6342ae96634ec6ff3c96
SHA256909acd6ff77b975e61eab53023a02d304151bc824c1e1454a62e7a329fccb6d3
SHA5129d1a480c7a3dbe04e9deab20d44a6e506c806ad7234322a3c6b6080cb1913bcd2b7849f985e2508dd02d27631e2677ab283f7d9bc7e132a024b20e1f8a83c76c
-
Filesize
114KB
MD5da6d2b292f1aa579a618cc0d14633254
SHA1cdb477aed3afbe798427812edf446d44696e2952
SHA256c4f801a415e00b714f58442b5857f894b257b3cf5e721a31cbeaa52eb9706851
SHA51233fb68808513dbbcc98fdcd540dcf456bd32074cf68919cbe238fb0ecc005d0cb3737bdb5c4bc0af75efd881dbddec692a443b4edfcda7fbf89f318f2bcb83b5
-
Filesize
114KB
MD540a3b9ae440d7ce0bc649b095b9a711b
SHA12749c5d5dfed7f96f28130ba4e08cb088b3c3920
SHA256c933aeba674c31ef11e488705fcc24c84eebc21074a00f66342db4abad47a252
SHA5129ba1949a52363861308c989b4c2ded89cf94f5da779428c52ca615f990e427959794f0f5fc142c92eb9d5a7bbb81baf42263b00993116c4d747d301c67e964e6
-
Filesize
264KB
MD5800ee09ad1bed0cd2da03f4797c5d865
SHA1939f95578185bb96a310d4b3bf3aeca7e1f8492a
SHA256344b11029850bd2d3976966c8cd5c273a98de61669ddbebe5450f3c51f3543c5
SHA512d0f8e40bef4a1d666f7c3c21fd060d7a8f642b340f56c29005b316c5b4d2ad06e2e42113a34ba4bbe86ca96bb17e1c1e1cb57e73c54370d1d0d61cecc6de4ca4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd