Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20231220-en -
resource tags
arch:x64arch:x86image:win10-20231220-enlocale:en-usos:windows10-1703-x64system -
submitted
22-01-2024 14:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://zefjnfjsdfqsdf345sdf.blob.core.windows.net/zefjnfjsdfqsdf345sdf/unsb.html
Resource
win10-20231220-en
Behavioral task
behavioral2
Sample
https://zefjnfjsdfqsdf345sdf.blob.core.windows.net/zefjnfjsdfqsdf345sdf/unsb.html
Resource
win11-20231215-en
General
-
Target
https://zefjnfjsdfqsdf345sdf.blob.core.windows.net/zefjnfjsdfqsdf345sdf/unsb.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133504084495551326" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2080 chrome.exe 2080 chrome.exe 3620 chrome.exe 3620 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe Token: SeShutdownPrivilege 2080 chrome.exe Token: SeCreatePagefilePrivilege 2080 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe 2080 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2076 2080 chrome.exe 54 PID 2080 wrote to memory of 2076 2080 chrome.exe 54 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 5032 2080 chrome.exe 79 PID 2080 wrote to memory of 2304 2080 chrome.exe 76 PID 2080 wrote to memory of 2304 2080 chrome.exe 76 PID 2080 wrote to memory of 2396 2080 chrome.exe 75 PID 2080 wrote to memory of 2396 2080 chrome.exe 75 PID 2080 wrote to memory of 2396 2080 chrome.exe 75 PID 2080 wrote to memory of 2396 2080 chrome.exe 75 PID 2080 wrote to memory of 2396 2080 chrome.exe 75 PID 2080 wrote to memory of 2396 2080 chrome.exe 75 PID 2080 wrote to memory of 2396 2080 chrome.exe 75 PID 2080 wrote to memory of 2396 2080 chrome.exe 75 PID 2080 wrote to memory of 2396 2080 chrome.exe 75 PID 2080 wrote to memory of 2396 2080 chrome.exe 75 PID 2080 wrote to memory of 2396 2080 chrome.exe 75 PID 2080 wrote to memory of 2396 2080 chrome.exe 75 PID 2080 wrote to memory of 2396 2080 chrome.exe 75 PID 2080 wrote to memory of 2396 2080 chrome.exe 75 PID 2080 wrote to memory of 2396 2080 chrome.exe 75 PID 2080 wrote to memory of 2396 2080 chrome.exe 75 PID 2080 wrote to memory of 2396 2080 chrome.exe 75 PID 2080 wrote to memory of 2396 2080 chrome.exe 75 PID 2080 wrote to memory of 2396 2080 chrome.exe 75 PID 2080 wrote to memory of 2396 2080 chrome.exe 75 PID 2080 wrote to memory of 2396 2080 chrome.exe 75 PID 2080 wrote to memory of 2396 2080 chrome.exe 75
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://zefjnfjsdfqsdf345sdf.blob.core.windows.net/zefjnfjsdfqsdf345sdf/unsb.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xd0,0xd4,0xd8,0xcc,0xdc,0x7ffc16ee9758,0x7ffc16ee9768,0x7ffc16ee97782⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2100 --field-trial-handle=1812,i,10702066749406562886,6291156506252565957,131072 /prefetch:82⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1804 --field-trial-handle=1812,i,10702066749406562886,6291156506252565957,131072 /prefetch:82⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2924 --field-trial-handle=1812,i,10702066749406562886,6291156506252565957,131072 /prefetch:12⤵PID:3312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2916 --field-trial-handle=1812,i,10702066749406562886,6291156506252565957,131072 /prefetch:12⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1812,i,10702066749406562886,6291156506252565957,131072 /prefetch:22⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4376 --field-trial-handle=1812,i,10702066749406562886,6291156506252565957,131072 /prefetch:12⤵PID:1288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3472 --field-trial-handle=1812,i,10702066749406562886,6291156506252565957,131072 /prefetch:12⤵PID:952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 --field-trial-handle=1812,i,10702066749406562886,6291156506252565957,131072 /prefetch:82⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 --field-trial-handle=1812,i,10702066749406562886,6291156506252565957,131072 /prefetch:82⤵PID:1292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4748 --field-trial-handle=1812,i,10702066749406562886,6291156506252565957,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD572454c32a6544bbeee6d30380373f96e
SHA162b580fd1c8714a634b0fe65c3fb417fd72ae3fe
SHA256218f75095c73bb6737fac98fa7a5463e7b8e48c47568cf7493f14da7eb6f6e6e
SHA512b77aadeb8baf4b8f992d4841d31899f0ba02957fd3775ba632eec64ffd6dd9a8ce3097b8b8963a54ed504ab4fec3ca479055acf748fe4f5186b48eab80f78d9c
-
Filesize
2KB
MD57c38f4fcdd223d1c48538aa2cb4481b1
SHA19c3cd0e26a9543e8a7d94853db42e1f64cbaeafc
SHA256adc37236960962e90af0e280c78f13d9050e30e673f8dd2d336fd1086dba618a
SHA5127f48100288d0105e56772b2da5e9c5a6b1ca5ce7ddf78b14985a2bba3de7a0d7188065c6d0906b9e890fb02316c78421f9ac5948ca3343ec165c26b6ae06c8e9
-
Filesize
706B
MD51dba35c5e14785f1fb8477d07e823b32
SHA1f72cfbd6a542afa5afe37f54b75a9c9156d4c38d
SHA2563fdc5056608c5133ad6ca02315ddbbcb4e3cb17616b3dfe445bc2fc35bb982a7
SHA512e1872d3ce44d1f9d28f5db505130b15643a08a0484995531c64cfaf2cedcc1ababed9470574e646e325c77615ab58320f5928f059724d37b81396ff5ec5d8f74
-
Filesize
6KB
MD57d363edafb1af22cd8ed209951094e5a
SHA13cb123794a8555190a562e95b552e9b12120018e
SHA256ec69902294dee174d538135dbe2db3deab86c0e8d5c699faf96f33fe5ca240aa
SHA512c4a2a1f53a97a01647c2d02a739d37d6335d9d354c2f03f88551b8b5b33bff011fc695b40f6f3e322bbc1416469a48501b89d2e28a8aed4cf37291495a38edfd
-
Filesize
114KB
MD5ec6e28122bd404cb446cfd7b9991623e
SHA1f0eb2e846344b94670f335b6b2c2ff722b1b7d53
SHA256e7f08874a3d671c2f2f564da9c0c7d9f578a5b78d1709cc99913d31725342cdc
SHA51234c2be41fe35bbf82818454d717de7e04ee3c56a3d6b6867914097f758bb0fd5aecad65d598611f9cfc200313e74d7311940738c7867d41e7eb2226351c4ceef
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd