Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23/01/2024, 22:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.reliancematrix.com/
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://www.reliancematrix.com/
Resource
win10v2004-20231215-en
General
-
Target
https://www.reliancematrix.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133505228392263235" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3612 chrome.exe 3612 chrome.exe 4276 chrome.exe 4276 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe Token: SeShutdownPrivilege 3612 chrome.exe Token: SeCreatePagefilePrivilege 3612 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe 3612 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3612 wrote to memory of 4052 3612 chrome.exe 85 PID 3612 wrote to memory of 4052 3612 chrome.exe 85 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4316 3612 chrome.exe 87 PID 3612 wrote to memory of 4672 3612 chrome.exe 88 PID 3612 wrote to memory of 4672 3612 chrome.exe 88 PID 3612 wrote to memory of 1384 3612 chrome.exe 89 PID 3612 wrote to memory of 1384 3612 chrome.exe 89 PID 3612 wrote to memory of 1384 3612 chrome.exe 89 PID 3612 wrote to memory of 1384 3612 chrome.exe 89 PID 3612 wrote to memory of 1384 3612 chrome.exe 89 PID 3612 wrote to memory of 1384 3612 chrome.exe 89 PID 3612 wrote to memory of 1384 3612 chrome.exe 89 PID 3612 wrote to memory of 1384 3612 chrome.exe 89 PID 3612 wrote to memory of 1384 3612 chrome.exe 89 PID 3612 wrote to memory of 1384 3612 chrome.exe 89 PID 3612 wrote to memory of 1384 3612 chrome.exe 89 PID 3612 wrote to memory of 1384 3612 chrome.exe 89 PID 3612 wrote to memory of 1384 3612 chrome.exe 89 PID 3612 wrote to memory of 1384 3612 chrome.exe 89 PID 3612 wrote to memory of 1384 3612 chrome.exe 89 PID 3612 wrote to memory of 1384 3612 chrome.exe 89 PID 3612 wrote to memory of 1384 3612 chrome.exe 89 PID 3612 wrote to memory of 1384 3612 chrome.exe 89 PID 3612 wrote to memory of 1384 3612 chrome.exe 89 PID 3612 wrote to memory of 1384 3612 chrome.exe 89 PID 3612 wrote to memory of 1384 3612 chrome.exe 89 PID 3612 wrote to memory of 1384 3612 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.reliancematrix.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa3c949758,0x7ffa3c949768,0x7ffa3c9497782⤵PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1792,i,15768732856512923165,5632334844488434352,131072 /prefetch:22⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1792,i,15768732856512923165,5632334844488434352,131072 /prefetch:82⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1792,i,15768732856512923165,5632334844488434352,131072 /prefetch:82⤵PID:1384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3028 --field-trial-handle=1792,i,15768732856512923165,5632334844488434352,131072 /prefetch:12⤵PID:1892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3016 --field-trial-handle=1792,i,15768732856512923165,5632334844488434352,131072 /prefetch:12⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4864 --field-trial-handle=1792,i,15768732856512923165,5632334844488434352,131072 /prefetch:12⤵PID:1348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 --field-trial-handle=1792,i,15768732856512923165,5632334844488434352,131072 /prefetch:82⤵PID:64
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 --field-trial-handle=1792,i,15768732856512923165,5632334844488434352,131072 /prefetch:82⤵PID:632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1916 --field-trial-handle=1792,i,15768732856512923165,5632334844488434352,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4276
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336B
MD5c507cf4ee2b857a06abf1690a8d9035b
SHA1ba0fb1a143c4efcbb1fcb8e75c3c659a83dad243
SHA25670542129b6222612eb93f93babc3fcf35c3f29a4a3569603a00a27020f13dcce
SHA512b451c97e78c94606f629bf55384c2ff45251bcb97b61f804815de4923e3a845b4752786114688869405af16de91d279f7d28d9e7cb41a3f24da043558c379278
-
Filesize
1KB
MD5af965bdcbf9cb66c38251cfc3df2bb4a
SHA1a06158f35416af65a3d7319e6cf818241bfbf5b9
SHA2566b66f19cce7609fde33c5aeb7581a9065d4b12315d415a310a6975c5e6b0d98d
SHA512ef72a815100265615f2e64e63e2ebcec4129649fb110e19e3a9e3755ed1edb7994dfa4ea690b8f69d74e3dcf20ecf42fb80651e657911f748d6e235b8daae809
-
Filesize
867B
MD59d7cd827ae80bd08dcdfffc6a631db1e
SHA1c3df05571cdde045f1010c52d341032b5b95ffde
SHA25673c9c0a8d28b3b7b4266ae6433f136a0e4c7f668bb88292b0bfe530038c70ad3
SHA51232db77b0441c7545e240a3320db7b83e596e60f070b38cca19a1c20c7fcd184905b63e0561966624d55e4582ce3fa197b3c39230395611a930d311d430ad19f9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\cc169da3-6c16-4aa3-842d-21f9d6cfc5fd.tmp
Filesize1KB
MD5c653c301ae9853c65abeef3e37953c88
SHA11de3dbedede5b1911226860055d277ea614d6ab9
SHA2563c6d5045161f587356923c447553baac5584d7b864c573aee90a17a7aa1ed3e4
SHA51289cfda28b4963ae6afd53bd0a6156c9f76fbebb2b55ebfd73f4c4b26c0b60bc25871418fc2a659d3489e7bfa4b98ce9aa332e8365a54e869e61779c2f5270a0c
-
Filesize
6KB
MD522e8cbf956c5015ba59a87a4ea5e2d42
SHA17393cd9d4ccbfeb6dfbbf5a304ab47c66fe7ae7d
SHA2568cb9d1b0605f56752cab4d35cc37975ea57b977231543a887438d9f0d29d93b6
SHA5129c1e9a75868a4282583c2ef43be0a2a401b91fc5604cd2dcdccd14501804aa4220c224e7b5d44473caee0ed2552f3a2266c29d4a6c44aedf034302a7e5260eb8
-
Filesize
114KB
MD52596e34329fca597f01e55d8918f5cec
SHA1d32a0e76ce5e8f82a1c78068bb6f6abcf922c718
SHA25699fba8bc8ab4fc830fae931af7bcf2aa573880b17e63efe997752e1ade08cd61
SHA512add93894a612df23368c05f3078a992f32f70717369a0a018500dc48f97de5ee089cadf1e65d01c4433c85160b65e79fa097bbcb32f928a200f390b58969c27b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd