Analysis
-
max time kernel
48s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2024, 19:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://oflcee.pages.dev/
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://oflcee.pages.dev/
Resource
win10v2004-20231215-en
General
-
Target
https://oflcee.pages.dev/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133504268157171471" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1392 chrome.exe 1392 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1392 chrome.exe 1392 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1392 wrote to memory of 3048 1392 chrome.exe 85 PID 1392 wrote to memory of 3048 1392 chrome.exe 85 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 3824 1392 chrome.exe 88 PID 1392 wrote to memory of 1640 1392 chrome.exe 90 PID 1392 wrote to memory of 1640 1392 chrome.exe 90 PID 1392 wrote to memory of 3952 1392 chrome.exe 89 PID 1392 wrote to memory of 3952 1392 chrome.exe 89 PID 1392 wrote to memory of 3952 1392 chrome.exe 89 PID 1392 wrote to memory of 3952 1392 chrome.exe 89 PID 1392 wrote to memory of 3952 1392 chrome.exe 89 PID 1392 wrote to memory of 3952 1392 chrome.exe 89 PID 1392 wrote to memory of 3952 1392 chrome.exe 89 PID 1392 wrote to memory of 3952 1392 chrome.exe 89 PID 1392 wrote to memory of 3952 1392 chrome.exe 89 PID 1392 wrote to memory of 3952 1392 chrome.exe 89 PID 1392 wrote to memory of 3952 1392 chrome.exe 89 PID 1392 wrote to memory of 3952 1392 chrome.exe 89 PID 1392 wrote to memory of 3952 1392 chrome.exe 89 PID 1392 wrote to memory of 3952 1392 chrome.exe 89 PID 1392 wrote to memory of 3952 1392 chrome.exe 89 PID 1392 wrote to memory of 3952 1392 chrome.exe 89 PID 1392 wrote to memory of 3952 1392 chrome.exe 89 PID 1392 wrote to memory of 3952 1392 chrome.exe 89 PID 1392 wrote to memory of 3952 1392 chrome.exe 89 PID 1392 wrote to memory of 3952 1392 chrome.exe 89 PID 1392 wrote to memory of 3952 1392 chrome.exe 89 PID 1392 wrote to memory of 3952 1392 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://oflcee.pages.dev/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c6ae9758,0x7ff9c6ae9768,0x7ff9c6ae97782⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1756,i,16341577825986941488,17662670481283381350,131072 /prefetch:22⤵PID:3824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2072 --field-trial-handle=1756,i,16341577825986941488,17662670481283381350,131072 /prefetch:82⤵PID:3952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2024 --field-trial-handle=1756,i,16341577825986941488,17662670481283381350,131072 /prefetch:82⤵PID:1640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3016 --field-trial-handle=1756,i,16341577825986941488,17662670481283381350,131072 /prefetch:12⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3008 --field-trial-handle=1756,i,16341577825986941488,17662670481283381350,131072 /prefetch:12⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5060 --field-trial-handle=1756,i,16341577825986941488,17662670481283381350,131072 /prefetch:82⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 --field-trial-handle=1756,i,16341577825986941488,17662670481283381350,131072 /prefetch:82⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2620 --field-trial-handle=1756,i,16341577825986941488,17662670481283381350,131072 /prefetch:82⤵PID:3904
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5c901376a3f9a9aa9e62eb249b7998588
SHA11964e30e4bcc2b84f2534490181c740db2897247
SHA256471fa5e08d011f90173da1541caa2e11565bc1fa1242761462c6b03ff9e62744
SHA51221758ebffdaf975c1efec829e9bf36551e33cd1d3a344b9a7bc04ceb9b1f7c9fc5418f0ba41ef96a0d7fd4ebec826bb01473a4d23e85a6873dc80d3fa85edede
-
Filesize
537B
MD5b275b4e27d57e177b44c0a48efad0d10
SHA182ebaa017289b10830c646bcea8490588a3f43f2
SHA256a6ef21aa66e690f086ab146a497c03d992c87f8c02cc94ec6a94dc719cb29bca
SHA5126e640cd041ea72832c4575d8d014694d210889c7efcaeb76b15f29a2aacd072f05acd728cab07243432bb76cb8d940b079039f2f6973849c593b7ed827dac976
-
Filesize
6KB
MD5e032f311f575d0d1776d5960831db86f
SHA13856783e622188768e09435fce71c9f5d787d075
SHA2568096b290b7cc2904fa55c5a1d776a4d2f0519677746155b5beb70638b8327fcf
SHA512a0b1ed23614a6b750b7884fa28a59c21abc5ee04ea7b777dc3e456cd18088019c856a3025d53b07fbd13f0dcbcf4fcf7afa9ead94ab36d094b62e60dfdb66b26
-
Filesize
5KB
MD5716650deef7db704b913293cc3667e46
SHA18a9107f3c455530547623eb687f147aa6d9fdecc
SHA256f121be87753b670991c8deeb82833e8378bfcc686c27202d68ebddb55316c9c5
SHA512fab99a23555b77c6de336119f5142a87b6a88077b9819642c345f9092027378e1c2297276159757bbce18715684f54fb8259bd9fae0de53807aa11780a2fb934
-
Filesize
114KB
MD54302d90c489558ed5d329f31146bf97f
SHA11ff80d44ad7e1deae583338a3a1d3fb8f02168ed
SHA25643df596fc02d32428b0642ccbc975d3c6b728c67ee9cb861772b0fdd7dc3c332
SHA512cb89fbf9fce804b1d5938c96e6fc60a27c9cacf60efff69ac953fdbc9e1484b7de45fc7169b7d575e4c8321d377392cce496bd50fe912b58ed855ee8a9065143
-
Filesize
103KB
MD5381054d76b6098dcca95b8a72f81c560
SHA13f1018f7af85ad76f1f542d25ac222b968b03420
SHA256b3aeea8c071db3ab630cb17e4f3b122a78964df4d0cb8a322a471b8ba6d24d07
SHA51280f7869cf43167ea1a88b80cb8c4328ce77cab308dbb0c1eb9a8f6489ad80f4d85b887d0bb893d65a1e4b60d59e3759c0b9fe390357b5e381d11ea3d6b66b978
-
Filesize
101KB
MD59b67c634e03defcfe00a95628fa5c3d5
SHA1782f0b445c96086a09d3fa9c108f935f74e648e0
SHA2562df3ac71135b0885aaf1a7c22cfab7201837a7610d83733589f01f622695569d
SHA512dca813e5c9badc0c67da7a55c1878994f1fe501ccc5a9e866c6ee463bb0713791ce0eeae8fd31ee00df67074e98d82b930655e791fc08cfbaa15ad549688398c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84