Analysis
-
max time kernel
116s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2024 22:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.itexams.com/info/CCFR-201
Resource
win10v2004-20231215-en
General
-
Target
https://www.itexams.com/info/CCFR-201
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133506101838360389" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3988 chrome.exe 3988 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3988 wrote to memory of 2348 3988 chrome.exe 85 PID 3988 wrote to memory of 2348 3988 chrome.exe 85 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 2252 3988 chrome.exe 89 PID 3988 wrote to memory of 5088 3988 chrome.exe 94 PID 3988 wrote to memory of 5088 3988 chrome.exe 94 PID 3988 wrote to memory of 1104 3988 chrome.exe 90 PID 3988 wrote to memory of 1104 3988 chrome.exe 90 PID 3988 wrote to memory of 1104 3988 chrome.exe 90 PID 3988 wrote to memory of 1104 3988 chrome.exe 90 PID 3988 wrote to memory of 1104 3988 chrome.exe 90 PID 3988 wrote to memory of 1104 3988 chrome.exe 90 PID 3988 wrote to memory of 1104 3988 chrome.exe 90 PID 3988 wrote to memory of 1104 3988 chrome.exe 90 PID 3988 wrote to memory of 1104 3988 chrome.exe 90 PID 3988 wrote to memory of 1104 3988 chrome.exe 90 PID 3988 wrote to memory of 1104 3988 chrome.exe 90 PID 3988 wrote to memory of 1104 3988 chrome.exe 90 PID 3988 wrote to memory of 1104 3988 chrome.exe 90 PID 3988 wrote to memory of 1104 3988 chrome.exe 90 PID 3988 wrote to memory of 1104 3988 chrome.exe 90 PID 3988 wrote to memory of 1104 3988 chrome.exe 90 PID 3988 wrote to memory of 1104 3988 chrome.exe 90 PID 3988 wrote to memory of 1104 3988 chrome.exe 90 PID 3988 wrote to memory of 1104 3988 chrome.exe 90 PID 3988 wrote to memory of 1104 3988 chrome.exe 90 PID 3988 wrote to memory of 1104 3988 chrome.exe 90 PID 3988 wrote to memory of 1104 3988 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.itexams.com/info/CCFR-2011⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6a1b9758,0x7fff6a1b9768,0x7fff6a1b97782⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=1896,i,10258187933367138552,4830903200888183810,131072 /prefetch:22⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1896,i,10258187933367138552,4830903200888183810,131072 /prefetch:82⤵PID:1104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2928 --field-trial-handle=1896,i,10258187933367138552,4830903200888183810,131072 /prefetch:12⤵PID:4120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2920 --field-trial-handle=1896,i,10258187933367138552,4830903200888183810,131072 /prefetch:12⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1896,i,10258187933367138552,4830903200888183810,131072 /prefetch:82⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=1896,i,10258187933367138552,4830903200888183810,131072 /prefetch:82⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 --field-trial-handle=1896,i,10258187933367138552,4830903200888183810,131072 /prefetch:82⤵PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 --field-trial-handle=1896,i,10258187933367138552,4830903200888183810,131072 /prefetch:82⤵PID:3880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 --field-trial-handle=1896,i,10258187933367138552,4830903200888183810,131072 /prefetch:82⤵PID:692
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
432B
MD5a0b2d3e01c304914804795e1a04d3e1d
SHA11fcd2d2019168dca1e55bda991ab1b2fd7615da9
SHA256f2bcbf31f2007616ab9aa42b632b0bf682705dbd144ec862e11473d7bccdeb33
SHA51281df298736655147165cd388d112084f28ccc5eb38eb25de972d096458c195c98205cd4e13685e52c56ace985e36adaf7c44702f10c61171e1b5e1d0c80c6a0d
-
Filesize
2KB
MD558e2db15c2556a98231fb816ae018148
SHA128ae3b920b67e2eabf2272cf393d9412f4f7b28d
SHA25650f077dfe567e645fc495a3ede99398b48693dbeb00b17a4c098886368ecf915
SHA5121f99b4f21527bad63b2ebb89c4badc324178481b1e56fa5b694803f929f594c992425746423a2c6ef901adffb8a496001389a30d587e8efc8344da90f9b28f54
-
Filesize
1KB
MD5e66bd6510e4bde426559fe68b62c2121
SHA128041dd71118b1c672e21bfbe5fbf58c0eb5be37
SHA25619f49430f0e17539274751d91429cc342810df3c43aecbd9dc7b901896111966
SHA512f0394cbafb0143db632e6f6a20006019463a892b8315631fead9d4dc1f17c79517e9a46565ea50aedc5124c4c2246c28d89d8619e6b90fc949f463365912ff69
-
Filesize
6KB
MD5d8ea286131bdd0a28335d69b7794f469
SHA12135e4ef8322ee130982f54ee1acf29fc981af54
SHA256b547c5e13f23305240c7a47e3186adab2e028be0fe26adcd417515a74e913efb
SHA51297218bc8226ce371d74575620f9bbfc99d22db9a6b5131dff1d75cea9e2f23235cb3d3eda9796588b0a424f5858cb85e732cfd16c34f7cb7798e3888158a9dca
-
Filesize
6KB
MD5c97097baea2b44e750b8ae1534d3c001
SHA15f00bbced4ee40886a3d4ca4d2d6bdf28e34ee97
SHA256cfdc9bf39a071cfba3fba75e34188fa02af11a32993cb527e206b997dd23c1de
SHA51299193968d2f43748486d1cceaca1a37c1fab79244fe521cab39751f688e1e236c2bf57d8fa1a40b8814bd5c9780378f1c44210a7d478c305796e34798f41a44c
-
Filesize
6KB
MD5e0be00f5cf07a62fd46db392110fd77a
SHA16d01f1a0fadccb4a1569e84030e0fa99670014b2
SHA256eff86d35883daa895247332491d262a358d5eb4886ba3b11b3e6a6326789cd0e
SHA5122f2a9285804fd7bd0e6aefd6e2421550861bf57bc272bd9022832024a952158474cfc53827c3c8135727eb4ed331d360129a3538bd51a4f19df7a99ff89a2da1
-
Filesize
135KB
MD54fe642ffd138ef4c03d1d52b5c261a8f
SHA1622f1e90edd65daa445974251530ceb5638f32a7
SHA2565f71b663c9e1462d967fb5aec90625afc3d67f8979acc611f35d4d2f0453a241
SHA5124629eb481e9350a80612e4870b02c04983a1f39fa0ffde2ec4b0e6adc8fdae12914773ad8f9dcc79498bcdd79263ed97e6482e32d86fc9824c80fde6c87fb265
-
Filesize
115KB
MD5cff2fa276073ea381eb950d498a15678
SHA1681531135219e780f219b36d0e06f51c940f6920
SHA256d954b20779ce7d02ba821ad3fb9db5beef8649dfc62dd454c01456566745f898
SHA512062a6a493d4e2e9c32a91e3daa75993f7cb4d85501e2407960a11253e663060d1bb8f6be9b3271a80f9b0dfeb87c5d973cc8a1d9dac5460f3fb8c86ec74240a8
-
Filesize
115KB
MD551c2ac0ed457eb9540f9dd081b978ea4
SHA1497120dde2436334921a13961782f0e5e4f49c9c
SHA2563aa43020ff8713c3a1278f94ac1143ce88e822f8a702da49d356496033f8c5f6
SHA5126affd73a7e620d413b178b89430099e7d6f916cdffd0b20fb4a0035659c345b6228cdb96e85f20d3e5d4619973781f2e857795d787fc2e7a1eb0c72ba6bb7aa7
-
Filesize
116KB
MD5434f762deab4dffbc0ec4d647dcfdea7
SHA13d31da21a0e0bc2317af1f3cbda06735365f743e
SHA256b6e1ff5579f44bd53340705072104bcea07620d9e2248dab18885cfe711f6f65
SHA512c4e7b0625a4911845820f8c084598c5fc092ed0386b4e0d2d777c2a63df855e2440588aa32725a5b33dc7e746943560db9b0ad02349c613201a8b8b980e4832d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd