Analysis
-
max time kernel
600s -
max time network
596s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 09:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://metasupport-portal.com
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://metasupport-portal.com
Resource
win10v2004-20231215-en
General
-
Target
http://metasupport-portal.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133501291073048525" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2040 chrome.exe 2040 chrome.exe 4404 chrome.exe 4404 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1296 2040 chrome.exe 75 PID 2040 wrote to memory of 1296 2040 chrome.exe 75 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 4552 2040 chrome.exe 86 PID 2040 wrote to memory of 2904 2040 chrome.exe 87 PID 2040 wrote to memory of 2904 2040 chrome.exe 87 PID 2040 wrote to memory of 1612 2040 chrome.exe 88 PID 2040 wrote to memory of 1612 2040 chrome.exe 88 PID 2040 wrote to memory of 1612 2040 chrome.exe 88 PID 2040 wrote to memory of 1612 2040 chrome.exe 88 PID 2040 wrote to memory of 1612 2040 chrome.exe 88 PID 2040 wrote to memory of 1612 2040 chrome.exe 88 PID 2040 wrote to memory of 1612 2040 chrome.exe 88 PID 2040 wrote to memory of 1612 2040 chrome.exe 88 PID 2040 wrote to memory of 1612 2040 chrome.exe 88 PID 2040 wrote to memory of 1612 2040 chrome.exe 88 PID 2040 wrote to memory of 1612 2040 chrome.exe 88 PID 2040 wrote to memory of 1612 2040 chrome.exe 88 PID 2040 wrote to memory of 1612 2040 chrome.exe 88 PID 2040 wrote to memory of 1612 2040 chrome.exe 88 PID 2040 wrote to memory of 1612 2040 chrome.exe 88 PID 2040 wrote to memory of 1612 2040 chrome.exe 88 PID 2040 wrote to memory of 1612 2040 chrome.exe 88 PID 2040 wrote to memory of 1612 2040 chrome.exe 88 PID 2040 wrote to memory of 1612 2040 chrome.exe 88 PID 2040 wrote to memory of 1612 2040 chrome.exe 88 PID 2040 wrote to memory of 1612 2040 chrome.exe 88 PID 2040 wrote to memory of 1612 2040 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://metasupport-portal.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc94499758,0x7ffc94499768,0x7ffc944997782⤵PID:1296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1660 --field-trial-handle=1784,i,17625678292643270829,12154054556119516233,131072 /prefetch:22⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1784,i,17625678292643270829,12154054556119516233,131072 /prefetch:82⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1784,i,17625678292643270829,12154054556119516233,131072 /prefetch:82⤵PID:1612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3196 --field-trial-handle=1784,i,17625678292643270829,12154054556119516233,131072 /prefetch:12⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1784,i,17625678292643270829,12154054556119516233,131072 /prefetch:12⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4988 --field-trial-handle=1784,i,17625678292643270829,12154054556119516233,131072 /prefetch:12⤵PID:3872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 --field-trial-handle=1784,i,17625678292643270829,12154054556119516233,131072 /prefetch:82⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 --field-trial-handle=1784,i,17625678292643270829,12154054556119516233,131072 /prefetch:82⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3284 --field-trial-handle=1784,i,17625678292643270829,12154054556119516233,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4404
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5115ee984682ef3a0e9088f3f83b72c0d
SHA16f47ff9488acbed53044378282e3efc771567820
SHA256dce2df839a4cc90485fe4b11cd3e4f05ae8d2b052a797ebae4a0d21d94a095c5
SHA512bab0924ea674b750bd403bef79a017b8519aa81cdeb9bca84e996c4ada9dcc3f7f09bdd3780a6edb224dba2664f9bf738c35a1e98e50d2db50d36049464e0d01
-
Filesize
1KB
MD536a9c33533e2e2927e069b9ed81bfd02
SHA18e8f3cbd83609b825594dbbdd433baee24d772fe
SHA2566f0c9aa6e34b45350fc5f1e14f289668b05167994d43dc390046342ee4e71cf7
SHA512611f8a85ae10ced54fd3f6f43004f112e3ac54eaaa3d2ed25a284950be7c717bc6a78a0cc4116cbcb5c5eb39860702db57a8f30f34ab4b839da816f9f16cf8b5
-
Filesize
706B
MD56c05f5de57f1a9ce6b6a85ee2e950996
SHA15c92c7b27d824fb502d366c14ef03d49d41dae32
SHA2562452d72d2c89481161a1d30b89601862a0fa03b4bddcd7f4aa16e66cb0eca2e7
SHA51203709658667081d80881aa6707f7ad801a48befef5b018cd5187bdfac3ca47499e2e1df4c5b62623656ce148e61f3c0cdcbaec8ecdff6c9b83a0c4aaa38e8047
-
Filesize
6KB
MD53ecfd41d96a38fd969bdb9358460e6e7
SHA14bd1d39cf3b0e93e1a8a7e3360e6ce17a4fc0291
SHA2565a7e7157e4f76e6d2dcbb020c46dc4e53ff50578cc08de59b0f69c08186e9818
SHA5123269014788595430ef2074e32ddf9b80e65c70087f177cb01332f577395429683a5d12a001bcb3dd35550d4d1176dde5a5d79c1caa3597394358a042c89e544f
-
Filesize
114KB
MD5327f4a7e8084307ec95a8b6ad5cfbc48
SHA1a73fd0c7e37674cb043df957f691f11e52f83859
SHA256ec3d9b117e9986d376d8214abcfb8fe870c3a26dd434337a4e9288fb8aa7ec48
SHA51245a4797c5ddfdd92bd62e1d36ab08b59a38dc774e37c5e49e446593b17b33d9b840c0792a611ea42bb4886347dd469b19d0976f13f15c2246d816bca590eb035
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd