Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2024 22:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://onlineserviceau.tech/signon/MyGov/
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
https://onlineserviceau.tech/signon/MyGov/
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
https://onlineserviceau.tech/signon/MyGov/
Resource
android-x64-20231215-en
Behavioral task
behavioral4
Sample
https://onlineserviceau.tech/signon/MyGov/
Resource
macos-20231201-en
General
-
Target
https://onlineserviceau.tech/signon/MyGov/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133509550406557319" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2892 chrome.exe 2892 chrome.exe 3360 chrome.exe 3360 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2892 wrote to memory of 4912 2892 chrome.exe 84 PID 2892 wrote to memory of 4912 2892 chrome.exe 84 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 5056 2892 chrome.exe 86 PID 2892 wrote to memory of 3492 2892 chrome.exe 87 PID 2892 wrote to memory of 3492 2892 chrome.exe 87 PID 2892 wrote to memory of 4560 2892 chrome.exe 88 PID 2892 wrote to memory of 4560 2892 chrome.exe 88 PID 2892 wrote to memory of 4560 2892 chrome.exe 88 PID 2892 wrote to memory of 4560 2892 chrome.exe 88 PID 2892 wrote to memory of 4560 2892 chrome.exe 88 PID 2892 wrote to memory of 4560 2892 chrome.exe 88 PID 2892 wrote to memory of 4560 2892 chrome.exe 88 PID 2892 wrote to memory of 4560 2892 chrome.exe 88 PID 2892 wrote to memory of 4560 2892 chrome.exe 88 PID 2892 wrote to memory of 4560 2892 chrome.exe 88 PID 2892 wrote to memory of 4560 2892 chrome.exe 88 PID 2892 wrote to memory of 4560 2892 chrome.exe 88 PID 2892 wrote to memory of 4560 2892 chrome.exe 88 PID 2892 wrote to memory of 4560 2892 chrome.exe 88 PID 2892 wrote to memory of 4560 2892 chrome.exe 88 PID 2892 wrote to memory of 4560 2892 chrome.exe 88 PID 2892 wrote to memory of 4560 2892 chrome.exe 88 PID 2892 wrote to memory of 4560 2892 chrome.exe 88 PID 2892 wrote to memory of 4560 2892 chrome.exe 88 PID 2892 wrote to memory of 4560 2892 chrome.exe 88 PID 2892 wrote to memory of 4560 2892 chrome.exe 88 PID 2892 wrote to memory of 4560 2892 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://onlineserviceau.tech/signon/MyGov/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcdfb19758,0x7ffcdfb19768,0x7ffcdfb197782⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1860,i,7916914154205281747,1877195160648965593,131072 /prefetch:22⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1860,i,7916914154205281747,1877195160648965593,131072 /prefetch:82⤵PID:3492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1860,i,7916914154205281747,1877195160648965593,131072 /prefetch:82⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2876 --field-trial-handle=1860,i,7916914154205281747,1877195160648965593,131072 /prefetch:12⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2868 --field-trial-handle=1860,i,7916914154205281747,1877195160648965593,131072 /prefetch:12⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4608 --field-trial-handle=1860,i,7916914154205281747,1877195160648965593,131072 /prefetch:12⤵PID:4072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3084 --field-trial-handle=1860,i,7916914154205281747,1877195160648965593,131072 /prefetch:12⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3100 --field-trial-handle=1860,i,7916914154205281747,1877195160648965593,131072 /prefetch:12⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 --field-trial-handle=1860,i,7916914154205281747,1877195160648965593,131072 /prefetch:82⤵PID:832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3800 --field-trial-handle=1860,i,7916914154205281747,1877195160648965593,131072 /prefetch:82⤵PID:4068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=1860,i,7916914154205281747,1877195160648965593,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5032 --field-trial-handle=1860,i,7916914154205281747,1877195160648965593,131072 /prefetch:12⤵PID:684
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
192B
MD5eadb00e27c66352f47a8144fa7a96d56
SHA1b1286c1a9f3a5e26282878342370bbfa44df143b
SHA2564f2d65971f516e9124c19b636818cd6c27e92e0867b674dc604f3a4cd87fd130
SHA5129783243e8ffcb717f7b9e12342a952e03ce1076337c0ff3ae83d2d8a2736f4287a7fe4baae93ddef687c1b7013524e666a7813ced641dc6c8e2906422f53914f
-
Filesize
120B
MD51cb60268b01c196b9c2a6b537b651e9c
SHA13c5e3e799935c790dbad2398534e302eb1c32fb7
SHA2565271541fb8b304df92975b4631061f9b715eb0c9cfa61ad475897838af9a1ac4
SHA5120a83ea713f3b5a4ed0610c5e0238caa79aa966f5087a2891c9f8dc30134495531b7c19d31f4b3d2e6e3570980dcfe801f2ef110a4e774857f7bda64207b2afef
-
Filesize
1KB
MD57788b9ed92db1312986f35fbf4820867
SHA11bb18172f11c262c454b6c0c4a46d48b8ba49604
SHA256cd8cf12b705e2f13d104f30c20142d87f9b215749d17cf7cf20b16ff2cd2bec1
SHA5122ee3a589845bc99ca9223bd41faf1d535d8ee6c87069e91c61a94c2926559515821602ec66994ac802677c25e52b0ef7aa3918a3407d43bd9a994f740abaed39
-
Filesize
6KB
MD5dc14843a20a11e321cfb3cfc4d8765a4
SHA1fd19bf30ba3185391113694e7ec7c772f3dc3356
SHA256e67a0cae7a3631fb96b7649fe42b06c07f711176658e2440a6708e599370a7ee
SHA5125ece41cbed0b56980b8c36ffede630e75b31b69285e98046b7c0da779ee5925fc86b7fc4e30d41f0a81a1641730235c581a7efa97434adb0a7d0556520ede409
-
Filesize
6KB
MD56c434f48e2f4a0cd2618b03be438687e
SHA1f4d442aae86c0929299183379396bba0c55d864a
SHA256b881841f253bf7d3ca3f58618e93d27bf34f0a5ae824ef2f488a0208f8658a3e
SHA5120640ce110e5618f16f7a414971498bf073daa1f95fa092790502320bf8f4d210e452a83e57793bce91e7f2d0ad57a7c10e98f857f99e4ed628067db1b76aef74
-
Filesize
114KB
MD5a4dbd16a27af3cb153bf55d4c408689c
SHA1463ec04883a2d73d122f4f598ce9794aa943a9e0
SHA2567cc7fe48e63f1067a920d9404ccadcf0ee912bd028df9224fa7c427ea93eb692
SHA51251bd73e6200f6a4214a6787622b97df6042074e753f60dc2646d0a7a74fcb62e727d121d94ce5776395ed6e738c42cf2129dc7d4e5af3b4f616f0f5ef1f9be5d