Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2024 21:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://atomyonlineshopping.com
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://atomyonlineshopping.com
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
http://atomyonlineshopping.com
Resource
macos-20231201-en
General
-
Target
http://atomyonlineshopping.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133509495700631386" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 324 chrome.exe 324 chrome.exe 3228 chrome.exe 3228 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 324 chrome.exe 324 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe Token: SeShutdownPrivilege 324 chrome.exe Token: SeCreatePagefilePrivilege 324 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe 324 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 324 wrote to memory of 3136 324 chrome.exe 82 PID 324 wrote to memory of 3136 324 chrome.exe 82 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 60 324 chrome.exe 84 PID 324 wrote to memory of 3080 324 chrome.exe 85 PID 324 wrote to memory of 3080 324 chrome.exe 85 PID 324 wrote to memory of 4288 324 chrome.exe 86 PID 324 wrote to memory of 4288 324 chrome.exe 86 PID 324 wrote to memory of 4288 324 chrome.exe 86 PID 324 wrote to memory of 4288 324 chrome.exe 86 PID 324 wrote to memory of 4288 324 chrome.exe 86 PID 324 wrote to memory of 4288 324 chrome.exe 86 PID 324 wrote to memory of 4288 324 chrome.exe 86 PID 324 wrote to memory of 4288 324 chrome.exe 86 PID 324 wrote to memory of 4288 324 chrome.exe 86 PID 324 wrote to memory of 4288 324 chrome.exe 86 PID 324 wrote to memory of 4288 324 chrome.exe 86 PID 324 wrote to memory of 4288 324 chrome.exe 86 PID 324 wrote to memory of 4288 324 chrome.exe 86 PID 324 wrote to memory of 4288 324 chrome.exe 86 PID 324 wrote to memory of 4288 324 chrome.exe 86 PID 324 wrote to memory of 4288 324 chrome.exe 86 PID 324 wrote to memory of 4288 324 chrome.exe 86 PID 324 wrote to memory of 4288 324 chrome.exe 86 PID 324 wrote to memory of 4288 324 chrome.exe 86 PID 324 wrote to memory of 4288 324 chrome.exe 86 PID 324 wrote to memory of 4288 324 chrome.exe 86 PID 324 wrote to memory of 4288 324 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://atomyonlineshopping.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9eb39758,0x7ffd9eb39768,0x7ffd9eb397782⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1884,i,9690756545530924365,14697756059950843342,131072 /prefetch:22⤵PID:60
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1884,i,9690756545530924365,14697756059950843342,131072 /prefetch:82⤵PID:3080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1884,i,9690756545530924365,14697756059950843342,131072 /prefetch:82⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3020 --field-trial-handle=1884,i,9690756545530924365,14697756059950843342,131072 /prefetch:12⤵PID:4020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3004 --field-trial-handle=1884,i,9690756545530924365,14697756059950843342,131072 /prefetch:12⤵PID:560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4140 --field-trial-handle=1884,i,9690756545530924365,14697756059950843342,131072 /prefetch:82⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4412 --field-trial-handle=1884,i,9690756545530924365,14697756059950843342,131072 /prefetch:82⤵PID:408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3764 --field-trial-handle=1884,i,9690756545530924365,14697756059950843342,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3228
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5de12c712660e96e47c428f7a56bddb1d
SHA1aebfd17302c88ec8e8646b3ac4499078067e2150
SHA2560d7603fe63cca8237b50e660db3d35f190645a7233fac3ffe9007b14262709d6
SHA51261ea754b0d514cc18395e97572c75053c5b8cbb64e370950e64926ae4e849d67794a46df2d29f0b72cfbaf1fe087b28571fd707822e6d56b7865adbec634b9d3
-
Filesize
6KB
MD5d1f2f6f489a9d8d00fc02ff837664521
SHA12942fe134514681e3c9f71f4c84954c9f9568a0b
SHA2563a32d334664dfc97875b9ae7cc74bc4e5d862afacfa386ceece1541763338618
SHA5129dfe13cf7eed767622c4abda494ec424150e9408515a7700204e6bc0d99604f2940f4db2f360f0efc81aaf1c060be69de1890b398935b92ed5ffdaa10aa0c56c
-
Filesize
6KB
MD57ff7fcaf0262e5822cc0cb90a584e610
SHA1a26c31cef980f4d6de912636c0e00b69f2c1e14c
SHA25665d7a3bac7f709021fbc6832e77d977b549c828be69da652dfd822482a8ebde8
SHA5126d729cf65d5366ec4335a79017a5967bfe0cfead0f98b15ece8952aca1e35775609b083ba479514e94322ef4807a3a63599e3c1db035493803b2d731cc11982f
-
Filesize
6KB
MD54eccc3aed6b07fd2ad32de9be5e39048
SHA16efc6b030b1dbebaaee060b6c8f211f0b1d8e7f4
SHA256346a57f0adc24188e64f7964ed8d7a6ab41b978fddfc4348e43d14364820e0fd
SHA512dec2a96bc61d2050976e703835c4c951e93a1e31cebdc9ac0a99d12d0f62cca09f052085c9cfa1d9851b3e3d427457abd808e054a5c296a5a17662b93e9b7a73
-
Filesize
114KB
MD51157cbd2fd6a04ac38cb89ff72feea1c
SHA14dadeaf6e549ffec4f8f6406e0f25da7afdec15a
SHA25685802bbcc56ed97304f9e34804d095249101c7563a6a02ae3bd1f7b5406a56a5
SHA51223b1f331eeca7b4bc6df87bad6bf75b9a2f16fff1b6f21f610eb3c84c95cd83cb1067cbce3347cb1b620325e939e804642a10d8e4bc9a43bd51623d30d378c63
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd