Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 01:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.victoriaharbourmedicalcentre.com.au
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://www.victoriaharbourmedicalcentre.com.au
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
https://www.victoriaharbourmedicalcentre.com.au
Resource
macos-20231201-en
General
-
Target
https://www.victoriaharbourmedicalcentre.com.au
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133506198706599345" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2420 chrome.exe 2420 chrome.exe 1028 chrome.exe 1028 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe Token: SeShutdownPrivilege 2420 chrome.exe Token: SeCreatePagefilePrivilege 2420 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe 2420 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2420 wrote to memory of 4696 2420 chrome.exe 65 PID 2420 wrote to memory of 4696 2420 chrome.exe 65 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 212 2420 chrome.exe 88 PID 2420 wrote to memory of 1796 2420 chrome.exe 90 PID 2420 wrote to memory of 1796 2420 chrome.exe 90 PID 2420 wrote to memory of 220 2420 chrome.exe 89 PID 2420 wrote to memory of 220 2420 chrome.exe 89 PID 2420 wrote to memory of 220 2420 chrome.exe 89 PID 2420 wrote to memory of 220 2420 chrome.exe 89 PID 2420 wrote to memory of 220 2420 chrome.exe 89 PID 2420 wrote to memory of 220 2420 chrome.exe 89 PID 2420 wrote to memory of 220 2420 chrome.exe 89 PID 2420 wrote to memory of 220 2420 chrome.exe 89 PID 2420 wrote to memory of 220 2420 chrome.exe 89 PID 2420 wrote to memory of 220 2420 chrome.exe 89 PID 2420 wrote to memory of 220 2420 chrome.exe 89 PID 2420 wrote to memory of 220 2420 chrome.exe 89 PID 2420 wrote to memory of 220 2420 chrome.exe 89 PID 2420 wrote to memory of 220 2420 chrome.exe 89 PID 2420 wrote to memory of 220 2420 chrome.exe 89 PID 2420 wrote to memory of 220 2420 chrome.exe 89 PID 2420 wrote to memory of 220 2420 chrome.exe 89 PID 2420 wrote to memory of 220 2420 chrome.exe 89 PID 2420 wrote to memory of 220 2420 chrome.exe 89 PID 2420 wrote to memory of 220 2420 chrome.exe 89 PID 2420 wrote to memory of 220 2420 chrome.exe 89 PID 2420 wrote to memory of 220 2420 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.victoriaharbourmedicalcentre.com.au1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd92e19758,0x7ffd92e19768,0x7ffd92e197782⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1868,i,18283489141974208768,11185474650171065740,131072 /prefetch:22⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2180 --field-trial-handle=1868,i,18283489141974208768,11185474650171065740,131072 /prefetch:82⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1868,i,18283489141974208768,11185474650171065740,131072 /prefetch:82⤵PID:1796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2976 --field-trial-handle=1868,i,18283489141974208768,11185474650171065740,131072 /prefetch:12⤵PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2968 --field-trial-handle=1868,i,18283489141974208768,11185474650171065740,131072 /prefetch:12⤵PID:3100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4928 --field-trial-handle=1868,i,18283489141974208768,11185474650171065740,131072 /prefetch:12⤵PID:3500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 --field-trial-handle=1868,i,18283489141974208768,11185474650171065740,131072 /prefetch:82⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 --field-trial-handle=1868,i,18283489141974208768,11185474650171065740,131072 /prefetch:82⤵PID:184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4744 --field-trial-handle=1868,i,18283489141974208768,11185474650171065740,131072 /prefetch:12⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5028 --field-trial-handle=1868,i,18283489141974208768,11185474650171065740,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD508b878ab15afc604cff729c8828eab30
SHA18496c5a50c6ae4a38d47c7571703c51789ee521f
SHA256132047516ab5505191f4b0a42f75e141d2803da3fc8879b9eca9131a60438dd2
SHA51200a7a291e733d65dc924b1b580e028d84c6d8c083992a52cf179bb8ad73cc008b741df2e285c314cdcfa403601187f51f11824ac192bf1d8fcc9d1ebde4ea209
-
Filesize
2KB
MD506144dcd7b9eaba070dea0af849f7624
SHA1d76b5d2fa878ee2b7872398b7f01dc2fb7224c75
SHA25669413ed58015b577633fa48aa2ca40511cdb339821d1f2e387104915bf0e358a
SHA512be4df24574a0dad49614b0edccdcd3fc5076fc2c8ad850685e3667d6c10b397028f2652e2dfbd226e7a70df8c06b68297aea3099f931a1ecaf9806d8187eb2fe
-
Filesize
1KB
MD5fcc831745f89d3497d007b8bdb800118
SHA1d2ed057b473f3dfb49cad0a115cdda4da8ea8acb
SHA2568797004552300984dea82db9a2e3f68ec8eea279fbe3fcd6eac6bc0b9a581718
SHA5127994c55d9d7b186168015066c339890b83685cac4f029851fc65c56f83bda812e11da1926f45db11ade9d6f20a6aa07cfc662dedaa07205c336b281d4b1eb384
-
Filesize
1KB
MD5a4e4ca19080d1e94deaf1c9c7a6b7427
SHA1a3aee29fbdb0bf2ff45ff8203fcc008a1976f8ca
SHA2562dd705d45d06a5fa686bff09f9a8623d631ef1e9b85243e8b6e701c6d13e187f
SHA512e434d80569a67245de9f8e4d7c0b05c9e2fc3b3c5252e3b8ba44add079d8e0ca727d1ee4deb47dd8061997f774df6085dbc03769022c4b0ed2e254ed274f820f
-
Filesize
704B
MD56230103eb0e037e559cc119474896e81
SHA17b8d3e1cefc32b9316ddc9a5d42b6ecde7ffad72
SHA256f031cf9bce30b4d65f6c3ea38da6e4de0abe8a5a564a6f70af5580b7b4bbb09b
SHA512f986072e873bc636cea252acc55b8433f3160382213264320272ea66003c6db51af214ebd5b6c248416dd26e1d4294babcaa2d34d71efe130a1957cd18bcd278
-
Filesize
1KB
MD5864b75b0e6fccaa79bc03bde16600788
SHA1fd8b053a10151c0f70820a3031e2ff62a89c20ae
SHA256a77c41110caced71718df04cbd38332baf0d2d0c8a462c1d242ff0ff7d76075a
SHA51210c49f26cf9f6bdc0e60eaf55246f81951beb676a9ad49f954a9eb0984805e22d6f7928bcfae34db61ef3307c802acaf4553d58519d60faaee53cb3ef988e4b7
-
Filesize
6KB
MD54331f48ad24811181a496d702535824b
SHA1178bd14f43c8ab06baf8592599f99e817cd7806c
SHA256693198bbc86d02f6b575322074de8d6785132487e0872c94ad3e69bf6493e4cf
SHA5126de3faf7c3c4b78012020733f892e833f965e9d196be80a1025d92a6fba377ee10ad5497bd27e7fc4914637710289afbcc78062650bf75fab8ff0ea9cf977fdf
-
Filesize
114KB
MD527aeb9133b173236cf2b1b3b1b5e9659
SHA1fa2aec3061d1d34231f5bd9d41337196c196580f
SHA2567dac935428e8eb4c491c7d46b696ca08b802d9059452a516241c073e60bfeba5
SHA512c6698ffa898b083ce9725c252be5bfa25396699b1708a5d2829468e7d6b0a5eb4c9aba6a7fd4c20485da3b051a46b8ccef20a6dbb9c2f2d496ac225ed4a45d2f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd