Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
23/01/2024, 22:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://nnygoventry.online/au/MyGov
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://nnygoventry.online/au/MyGov
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
http://nnygoventry.online/au/MyGov
Resource
macos-20231201-en
General
-
Target
http://nnygoventry.online/au/MyGov
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133505241453564050" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4092 chrome.exe 4092 chrome.exe 1108 chrome.exe 1108 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4092 wrote to memory of 1672 4092 chrome.exe 85 PID 4092 wrote to memory of 1672 4092 chrome.exe 85 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 1368 4092 chrome.exe 88 PID 4092 wrote to memory of 2884 4092 chrome.exe 89 PID 4092 wrote to memory of 2884 4092 chrome.exe 89 PID 4092 wrote to memory of 1420 4092 chrome.exe 90 PID 4092 wrote to memory of 1420 4092 chrome.exe 90 PID 4092 wrote to memory of 1420 4092 chrome.exe 90 PID 4092 wrote to memory of 1420 4092 chrome.exe 90 PID 4092 wrote to memory of 1420 4092 chrome.exe 90 PID 4092 wrote to memory of 1420 4092 chrome.exe 90 PID 4092 wrote to memory of 1420 4092 chrome.exe 90 PID 4092 wrote to memory of 1420 4092 chrome.exe 90 PID 4092 wrote to memory of 1420 4092 chrome.exe 90 PID 4092 wrote to memory of 1420 4092 chrome.exe 90 PID 4092 wrote to memory of 1420 4092 chrome.exe 90 PID 4092 wrote to memory of 1420 4092 chrome.exe 90 PID 4092 wrote to memory of 1420 4092 chrome.exe 90 PID 4092 wrote to memory of 1420 4092 chrome.exe 90 PID 4092 wrote to memory of 1420 4092 chrome.exe 90 PID 4092 wrote to memory of 1420 4092 chrome.exe 90 PID 4092 wrote to memory of 1420 4092 chrome.exe 90 PID 4092 wrote to memory of 1420 4092 chrome.exe 90 PID 4092 wrote to memory of 1420 4092 chrome.exe 90 PID 4092 wrote to memory of 1420 4092 chrome.exe 90 PID 4092 wrote to memory of 1420 4092 chrome.exe 90 PID 4092 wrote to memory of 1420 4092 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://nnygoventry.online/au/MyGov1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff20d89758,0x7fff20d89768,0x7fff20d897782⤵PID:1672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1876,i,15324353067632881294,5728696794389197650,131072 /prefetch:22⤵PID:1368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1876,i,15324353067632881294,5728696794389197650,131072 /prefetch:82⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1876,i,15324353067632881294,5728696794389197650,131072 /prefetch:82⤵PID:1420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2716 --field-trial-handle=1876,i,15324353067632881294,5728696794389197650,131072 /prefetch:12⤵PID:1256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2724 --field-trial-handle=1876,i,15324353067632881294,5728696794389197650,131072 /prefetch:12⤵PID:3828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4864 --field-trial-handle=1876,i,15324353067632881294,5728696794389197650,131072 /prefetch:12⤵PID:732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4648 --field-trial-handle=1876,i,15324353067632881294,5728696794389197650,131072 /prefetch:12⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3436 --field-trial-handle=1876,i,15324353067632881294,5728696794389197650,131072 /prefetch:12⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 --field-trial-handle=1876,i,15324353067632881294,5728696794389197650,131072 /prefetch:82⤵PID:2008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5480 --field-trial-handle=1876,i,15324353067632881294,5728696794389197650,131072 /prefetch:82⤵PID:428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1876,i,15324353067632881294,5728696794389197650,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2432 --field-trial-handle=1876,i,15324353067632881294,5728696794389197650,131072 /prefetch:12⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD53df9bde9bd02dc3b17710a5552d8491e
SHA1fce1e810583a991545ed9fc27a6e370860e7b5ce
SHA25695c7d1d7773598d6eb234518d0028ee734e8bb29f95ea040870362bd125751b9
SHA5123416d98104e34ea25a3360007aec592f890394efd2e4f213d5ffe0aa72f612d84e26cfc62e49eb96f41a73ad85c54096d7be285f0a34b967279edd65a638d63f
-
Filesize
120B
MD52118843b5a634c96d766124aa42b9e31
SHA13791324ca326c04e9a199067f0c9596c63b91489
SHA25659e1bfc0f35ca9c2e3c597da1e8299e8dedbe2515e501443ef762cac2ee5ed8b
SHA51233004d1626b08a68c07e7033cfd00345d61349c212e8c98278a23de59b90fd65edcd26ad6db6ed3c1c6ba7de98cc787a881354814c5154121cbf4e53745f5656
-
Filesize
1KB
MD514d98f33dfecf61fac7385295e787736
SHA1448ed0a8c85cbe0786dccf98ae4d9810226da936
SHA256a8bc047e87b3350d15f5c6e1c178f5277e8a2579e7690c11228d168df364e390
SHA5126818c25ef9b33bde2b95e1e66562aae98f61083b3a5262102e86279a11ae6150618745436e27713aefb04eeb732b40baa3b1e9a0fab0a7a4c031cc8a3de44bfb
-
Filesize
6KB
MD5f9bb0b422467603f699674b443b5dd1f
SHA14f2e80c77fa03a7706417340773a0fe0e94e3658
SHA256f65275734269ecef1dada8f1e7f58de9ca27ed23e9dfa5f5130231fa89bb176c
SHA512df058640aa6818b045f7fad128fd687fbd6d401c10ab6887f5ce7df2e98f0ca4b0cc115002fb435d64a5bc83f9c30c3cd94d8403e42b6c7a5b3ddbfce4a6256f
-
Filesize
6KB
MD558d1f681896c92915d371488555bce10
SHA1ef6fb8e450611bc1fa9d5a4a5de37509eb9cd5a1
SHA256ac61663fda0b3e0a1fe0187b88c7a893e8e18c3d19e76e9ab089157a84be35c7
SHA512cee03304a43f9e13e1daa37ea8bcf294d015f21729d4b4edc3e6027cf18df9f9b054655201e8bef243e53b96663a661d5504f6b6c38f3b0d20f9ac77fa582473
-
Filesize
114KB
MD5269d2aee5932ac90442efe5a7620993c
SHA12a37a110e76619449d8772921c553cdf16486c57
SHA2562b5e727f1823a8d0e5fb7f72e4132c8c967ca9ac193482b5e549d420dba68943
SHA512645568a87ab45c8735d484da20c652452f5f5de00f4d386d79dc1989fba3f5d0449a42213b50727ee9577a57ee3424d24ef195b459725f0bc66292f1557ba27e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd