Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2024 21:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.sfmcinc.com
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
http://www.sfmcinc.com
Resource
win10v2004-20231222-en
General
-
Target
http://www.sfmcinc.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133506050631597069" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4848 chrome.exe 4848 chrome.exe 516 chrome.exe 516 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4848 wrote to memory of 4648 4848 chrome.exe 84 PID 4848 wrote to memory of 4648 4848 chrome.exe 84 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5024 4848 chrome.exe 88 PID 4848 wrote to memory of 5072 4848 chrome.exe 91 PID 4848 wrote to memory of 5072 4848 chrome.exe 91 PID 4848 wrote to memory of 4408 4848 chrome.exe 90 PID 4848 wrote to memory of 4408 4848 chrome.exe 90 PID 4848 wrote to memory of 4408 4848 chrome.exe 90 PID 4848 wrote to memory of 4408 4848 chrome.exe 90 PID 4848 wrote to memory of 4408 4848 chrome.exe 90 PID 4848 wrote to memory of 4408 4848 chrome.exe 90 PID 4848 wrote to memory of 4408 4848 chrome.exe 90 PID 4848 wrote to memory of 4408 4848 chrome.exe 90 PID 4848 wrote to memory of 4408 4848 chrome.exe 90 PID 4848 wrote to memory of 4408 4848 chrome.exe 90 PID 4848 wrote to memory of 4408 4848 chrome.exe 90 PID 4848 wrote to memory of 4408 4848 chrome.exe 90 PID 4848 wrote to memory of 4408 4848 chrome.exe 90 PID 4848 wrote to memory of 4408 4848 chrome.exe 90 PID 4848 wrote to memory of 4408 4848 chrome.exe 90 PID 4848 wrote to memory of 4408 4848 chrome.exe 90 PID 4848 wrote to memory of 4408 4848 chrome.exe 90 PID 4848 wrote to memory of 4408 4848 chrome.exe 90 PID 4848 wrote to memory of 4408 4848 chrome.exe 90 PID 4848 wrote to memory of 4408 4848 chrome.exe 90 PID 4848 wrote to memory of 4408 4848 chrome.exe 90 PID 4848 wrote to memory of 4408 4848 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.sfmcinc.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e8129758,0x7ff9e8129768,0x7ff9e81297782⤵PID:4648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1928,i,4578007523394958912,7480585508498043901,131072 /prefetch:22⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2852 --field-trial-handle=1928,i,4578007523394958912,7480585508498043901,131072 /prefetch:12⤵PID:3148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2276 --field-trial-handle=1928,i,4578007523394958912,7480585508498043901,131072 /prefetch:82⤵PID:4408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1928,i,4578007523394958912,7480585508498043901,131072 /prefetch:82⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2860 --field-trial-handle=1928,i,4578007523394958912,7480585508498043901,131072 /prefetch:12⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4684 --field-trial-handle=1928,i,4578007523394958912,7480585508498043901,131072 /prefetch:12⤵PID:3448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 --field-trial-handle=1928,i,4578007523394958912,7480585508498043901,131072 /prefetch:82⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3756 --field-trial-handle=1928,i,4578007523394958912,7480585508498043901,131072 /prefetch:82⤵PID:2504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 --field-trial-handle=1928,i,4578007523394958912,7480585508498043901,131072 /prefetch:82⤵PID:3576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1936 --field-trial-handle=1928,i,4578007523394958912,7480585508498043901,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:516
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
960B
MD5175bcee40d3b252cb89e56ade6541ece
SHA1c9c5038a45b778974d8bfb334938fb36049d6b17
SHA2563ee28c456ced88a56e54afb8df0d769da354cb08235b718a24254d5b4cbbf8ce
SHA512b29ec9570dcf55b86780350b3572f215fb9537fd3b6eaf33abad60d4ccda48de450b7dc424a1741118a94ab4a4f11b4f0fe0857ae816c2379713fddf0a620915
-
Filesize
1KB
MD5ef640c2f61126bcc2e337594f11665dc
SHA10167841145690fc4cb5ce2400b4f0dd22c36ebc0
SHA256ff8cdb6218000a99052e8aa175c482b72644d98bc383164a4049377322b26b84
SHA51201cf03060dd88d780a802555a3e92b71eab1bb4f30658e845be5aaece8d238b830eec0de32fbab9effad44ddbc9a7c2e92160aecdb52fbfe5d84f9acb640e0e7
-
Filesize
875B
MD5b46b0a09fbe8203903088e8e1918d80d
SHA1527acc430a5cb846d56f83882a2361b919c1436c
SHA256cd960c4f8b091dc6c842ada5133577e1fb56f9f76035884cc7153688b2f96956
SHA512a8767080a5ab300e0974e1921749415531361b4bc7b9994616fd36a8125d3ee418687902366aab9dd35e9b3480bc5c953b062132443e5ef7ad7ad588d1ee46c8
-
Filesize
6KB
MD551323add8513371c7bdf0179a37eb349
SHA1f85c2d5cb88a22d725084affbe49a525c45e9667
SHA256106cea1f598b95b6e0ded9d2f87965561f73cb1e2fd7a868bb817d2c25fdba15
SHA51202efb4d5810324524963ce4d54cf67868380142240f5af279c4fd1f450395f112b3888e8dfdd7f6046e423470e49af2dc033148596354529e55a7dc22c8ca35e
-
Filesize
114KB
MD5801dc2679e27ca715f556acac9d8f8de
SHA1ba9db1c749cc37120ced9d46fc22a32d7962127a
SHA2569a6d34c5d94de707245cb14b494ba1baa09a371b880249769e12d7704b896499
SHA5122a3aa548958482cb67c68d78c6fe6fc0810c43e07c247877d3c929abc0b0e95c008fb4cd9db2b52ecd207a98e5110da82a216b47192b90867118d33ed65918f9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd