Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2024, 20:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.himawari-int.com/estate_news/7129
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://www.himawari-int.com/estate_news/7129
Resource
win10v2004-20231222-en
General
-
Target
https://www.himawari-int.com/estate_news/7129
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133504293509704273" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3344 chrome.exe 3344 chrome.exe 1432 chrome.exe 1432 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe Token: SeShutdownPrivilege 3344 chrome.exe Token: SeCreatePagefilePrivilege 3344 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe 3344 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3344 wrote to memory of 4920 3344 chrome.exe 40 PID 3344 wrote to memory of 4920 3344 chrome.exe 40 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 2172 3344 chrome.exe 88 PID 3344 wrote to memory of 3332 3344 chrome.exe 89 PID 3344 wrote to memory of 3332 3344 chrome.exe 89 PID 3344 wrote to memory of 3876 3344 chrome.exe 90 PID 3344 wrote to memory of 3876 3344 chrome.exe 90 PID 3344 wrote to memory of 3876 3344 chrome.exe 90 PID 3344 wrote to memory of 3876 3344 chrome.exe 90 PID 3344 wrote to memory of 3876 3344 chrome.exe 90 PID 3344 wrote to memory of 3876 3344 chrome.exe 90 PID 3344 wrote to memory of 3876 3344 chrome.exe 90 PID 3344 wrote to memory of 3876 3344 chrome.exe 90 PID 3344 wrote to memory of 3876 3344 chrome.exe 90 PID 3344 wrote to memory of 3876 3344 chrome.exe 90 PID 3344 wrote to memory of 3876 3344 chrome.exe 90 PID 3344 wrote to memory of 3876 3344 chrome.exe 90 PID 3344 wrote to memory of 3876 3344 chrome.exe 90 PID 3344 wrote to memory of 3876 3344 chrome.exe 90 PID 3344 wrote to memory of 3876 3344 chrome.exe 90 PID 3344 wrote to memory of 3876 3344 chrome.exe 90 PID 3344 wrote to memory of 3876 3344 chrome.exe 90 PID 3344 wrote to memory of 3876 3344 chrome.exe 90 PID 3344 wrote to memory of 3876 3344 chrome.exe 90 PID 3344 wrote to memory of 3876 3344 chrome.exe 90 PID 3344 wrote to memory of 3876 3344 chrome.exe 90 PID 3344 wrote to memory of 3876 3344 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.himawari-int.com/estate_news/71291⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e8129758,0x7ff9e8129768,0x7ff9e81297782⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1864,i,8381942762305381303,1839945483578384098,131072 /prefetch:22⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2028 --field-trial-handle=1864,i,8381942762305381303,1839945483578384098,131072 /prefetch:82⤵PID:3332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1864,i,8381942762305381303,1839945483578384098,131072 /prefetch:82⤵PID:3876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3008 --field-trial-handle=1864,i,8381942762305381303,1839945483578384098,131072 /prefetch:12⤵PID:3576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1864,i,8381942762305381303,1839945483578384098,131072 /prefetch:12⤵PID:2428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 --field-trial-handle=1864,i,8381942762305381303,1839945483578384098,131072 /prefetch:82⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4032 --field-trial-handle=1864,i,8381942762305381303,1839945483578384098,131072 /prefetch:82⤵PID:1072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4020 --field-trial-handle=1864,i,8381942762305381303,1839945483578384098,131072 /prefetch:12⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2232 --field-trial-handle=1864,i,8381942762305381303,1839945483578384098,131072 /prefetch:12⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3772 --field-trial-handle=1864,i,8381942762305381303,1839945483578384098,131072 /prefetch:12⤵PID:724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3904 --field-trial-handle=1864,i,8381942762305381303,1839945483578384098,131072 /prefetch:12⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3308 --field-trial-handle=1864,i,8381942762305381303,1839945483578384098,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1432
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cc2bb55d795c1c9e1f3f13f55657c5ed
SHA133c8b7520ab4c1f11d76cc283aa116db1bf0a849
SHA256aeb9b4f49188c647a4496602dc172778ee20265e7222778e8f53629bcccfbaff
SHA5121588c404c28022a1292c779195abccc4a4d746530e04e72d52f6695ca3412c2b1c458aa40e84d19e6424590fa2a9506f3924c1cace247e50cf0d7afe77521743
-
Filesize
824B
MD55d5abb4b626421b529364c2e686f2c80
SHA1e4e6a60276423db2ed515423d2a9274d243183d1
SHA256ab3b280f11c2e524d3169a26e39233da2723566a05ac1ba1f73f53a9651588e3
SHA512b10fdf6490745db8e6154f71617451ce4f73a5ad053bd9571eb194d1a1bbfbfd41eae472ccc2aebb1cc68f3d653766303a204305fdcd0a00f763b145d18c53c5
-
Filesize
6KB
MD54886c5505dbdd950b69fb617dae1bc19
SHA115ed414453c6cb0b62faf0fd906d422b2ea67c6e
SHA2564f3a709c008e2c56a1fdf730611792a85e37856fa1d492da436bb68f4183d709
SHA5124efc5e949e9bf395762ae5ff949a1750b6383db47583f16628d77ba7e045af117f838612fe1d50f8de83115f8edf0adef03fd38b4e8056a9219aabb4af9b3e80
-
Filesize
6KB
MD51b3eaa4605974f665357a733c6211177
SHA16e75acfb88cc38ea21de6e860e7a39136b526f6b
SHA2565bafccfed17e80e51225d7e75a257bc70cf0cb9144b64b742ab89723e7b64dbe
SHA5121fef417b13cae3a8d96207acb3ede7c9ca59d8c3429f4f707beaa57adcaccc0283ab52c650c666d39f3fc215226b050d266a5570765213854a7a8c6a02e9a188
-
Filesize
114KB
MD50376ca85d9d4e2fe7fb0793ec194b07a
SHA1ccc5536596e6e053f7f09bc2a9edd2fd58a194a3
SHA256cd4a4585a60dedbf325fb3c02d230bfedc62a2f55288dab8b9fc2d7854347511
SHA51297d04bf54729b222a013629abf4f91ad2ad23348eb972b9c8b2011e01b2baf92bbcbedc3d6332cae0d76495f1a3098478779f40da620895e07147a37af8e64db
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd