Analysis
-
max time kernel
148s -
max time network
141s -
platform
windows11-21h2_x64 -
resource
win11-20231222-en -
resource tags
arch:x64arch:x86image:win11-20231222-enlocale:en-usos:windows11-21h2-x64system -
submitted
18/01/2024, 06:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://alzeducate.ca/course/view.php?id=336
Resource
win11-20231222-en
General
-
Target
https://alzeducate.ca/course/view.php?id=336
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133500329659649855" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4936 chrome.exe 4936 chrome.exe 4136 chrome.exe 4136 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4936 chrome.exe 4936 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4936 wrote to memory of 1064 4936 chrome.exe 68 PID 4936 wrote to memory of 1064 4936 chrome.exe 68 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 128 4936 chrome.exe 83 PID 4936 wrote to memory of 4116 4936 chrome.exe 87 PID 4936 wrote to memory of 4116 4936 chrome.exe 87 PID 4936 wrote to memory of 1480 4936 chrome.exe 84 PID 4936 wrote to memory of 1480 4936 chrome.exe 84 PID 4936 wrote to memory of 1480 4936 chrome.exe 84 PID 4936 wrote to memory of 1480 4936 chrome.exe 84 PID 4936 wrote to memory of 1480 4936 chrome.exe 84 PID 4936 wrote to memory of 1480 4936 chrome.exe 84 PID 4936 wrote to memory of 1480 4936 chrome.exe 84 PID 4936 wrote to memory of 1480 4936 chrome.exe 84 PID 4936 wrote to memory of 1480 4936 chrome.exe 84 PID 4936 wrote to memory of 1480 4936 chrome.exe 84 PID 4936 wrote to memory of 1480 4936 chrome.exe 84 PID 4936 wrote to memory of 1480 4936 chrome.exe 84 PID 4936 wrote to memory of 1480 4936 chrome.exe 84 PID 4936 wrote to memory of 1480 4936 chrome.exe 84 PID 4936 wrote to memory of 1480 4936 chrome.exe 84 PID 4936 wrote to memory of 1480 4936 chrome.exe 84 PID 4936 wrote to memory of 1480 4936 chrome.exe 84 PID 4936 wrote to memory of 1480 4936 chrome.exe 84 PID 4936 wrote to memory of 1480 4936 chrome.exe 84 PID 4936 wrote to memory of 1480 4936 chrome.exe 84 PID 4936 wrote to memory of 1480 4936 chrome.exe 84 PID 4936 wrote to memory of 1480 4936 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://alzeducate.ca/course/view.php?id=3361⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff996439758,0x7ff996439768,0x7ff9964397782⤵PID:1064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1564 --field-trial-handle=1816,i,17557768406042838183,7301454651515109054,131072 /prefetch:22⤵PID:128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2172 --field-trial-handle=1816,i,17557768406042838183,7301454651515109054,131072 /prefetch:82⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3032 --field-trial-handle=1816,i,17557768406042838183,7301454651515109054,131072 /prefetch:12⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1816,i,17557768406042838183,7301454651515109054,131072 /prefetch:12⤵PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=1816,i,17557768406042838183,7301454651515109054,131072 /prefetch:82⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 --field-trial-handle=1816,i,17557768406042838183,7301454651515109054,131072 /prefetch:82⤵PID:3472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 --field-trial-handle=1816,i,17557768406042838183,7301454651515109054,131072 /prefetch:82⤵PID:3184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4700 --field-trial-handle=1816,i,17557768406042838183,7301454651515109054,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4136
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336B
MD518e986dc0f8a2acb9d995c239d2e8da9
SHA19ae3ab66630bb1c2ad59306491a858aaee6beeb1
SHA25607999dde34dbd8e020307227390d3c9f49556ca1f1dec768d6bdf8bc1cd09a3f
SHA51285199022a81b3add4b03f0e5638fa6a1d0e10bb46c1d6c69ea97670e15c5a4316001aaadc6d6c9755b927406977e9a9f17da55f82a7aecfd5adf8b422b8829b0
-
Filesize
2KB
MD5bd99564bf88fa30c26f52ecf07988886
SHA1e7235139973afd238e062327ba06bccfa8234be7
SHA256a62115b2a1a3094f88aa9f13fb30768e7d4a626361c426fef01e199c0d51b9a6
SHA512973955cee033f8fb8cb10cdf563c7f61340c2c6ba3653046d1f7c9fa0e8839cb49034c23d227f7ea9de962b384cc5b10e112ea8fdf29973a3f1bbcc1fc55abeb
-
Filesize
706B
MD56b5354d2c7da74e9ff16478c3d953bab
SHA12ee5b12e7310d8d6c85fdf4e8eda84ab9678e38b
SHA256b7deb693ea1f689674a7b9fa7b047475d54bccab7d1f3bd473a655bc802ff7ab
SHA512b9f7fac03ccc3cf3517b8577ebe8abefbe2cdd412b13ac7403122054b47be88c1962ca6cf05af4b6f2af0d07bea48b33847cefc6494d6e9b037274289051ced3
-
Filesize
6KB
MD532f83e480d45be481722bc61144e9d20
SHA14a50ad2906f0da173da204971ccc42f5efa9b7bf
SHA256167aec4821ecd27fa29cffc870ec815592e5b1fef927ff5e702bbe557026f553
SHA512aa1a4e7ba6587e5956fdb7ad8d51e224bb52a62d506df2b816068f49c44cb236313eec7f2310d8005f6db28ecd8ed1c2a5be202a8e17ba2b48a37e38f2d627fc
-
Filesize
114KB
MD52d7e9d054dcbf051d2054b7bbce7995a
SHA156a9891c36f8b5ee2cea9d84e29ea598a1510ea4
SHA256b0c444124c40dc493da753fb216098c06b7ad4769d7739fd0aa5784c26ffc026
SHA512009cba38ecdd0c96d098481562b4dae5bb67fd71b2fe0b6f7d7c2ddcd86df607f6e84482ae575e6d26ac822d85c730b972b322ed9cf0ca6d7bcf021740d9e30b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd