Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 03:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://qantas.airlineticketingservice.com
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://qantas.airlineticketingservice.com
Resource
win10v2004-20231215-en
General
-
Target
http://qantas.airlineticketingservice.com
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 46 drive.google.com 47 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133509734860749021" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4792 chrome.exe 4792 chrome.exe 448 chrome.exe 448 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4792 wrote to memory of 3772 4792 chrome.exe 46 PID 4792 wrote to memory of 3772 4792 chrome.exe 46 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3168 4792 chrome.exe 86 PID 4792 wrote to memory of 3356 4792 chrome.exe 87 PID 4792 wrote to memory of 3356 4792 chrome.exe 87 PID 4792 wrote to memory of 2008 4792 chrome.exe 88 PID 4792 wrote to memory of 2008 4792 chrome.exe 88 PID 4792 wrote to memory of 2008 4792 chrome.exe 88 PID 4792 wrote to memory of 2008 4792 chrome.exe 88 PID 4792 wrote to memory of 2008 4792 chrome.exe 88 PID 4792 wrote to memory of 2008 4792 chrome.exe 88 PID 4792 wrote to memory of 2008 4792 chrome.exe 88 PID 4792 wrote to memory of 2008 4792 chrome.exe 88 PID 4792 wrote to memory of 2008 4792 chrome.exe 88 PID 4792 wrote to memory of 2008 4792 chrome.exe 88 PID 4792 wrote to memory of 2008 4792 chrome.exe 88 PID 4792 wrote to memory of 2008 4792 chrome.exe 88 PID 4792 wrote to memory of 2008 4792 chrome.exe 88 PID 4792 wrote to memory of 2008 4792 chrome.exe 88 PID 4792 wrote to memory of 2008 4792 chrome.exe 88 PID 4792 wrote to memory of 2008 4792 chrome.exe 88 PID 4792 wrote to memory of 2008 4792 chrome.exe 88 PID 4792 wrote to memory of 2008 4792 chrome.exe 88 PID 4792 wrote to memory of 2008 4792 chrome.exe 88 PID 4792 wrote to memory of 2008 4792 chrome.exe 88 PID 4792 wrote to memory of 2008 4792 chrome.exe 88 PID 4792 wrote to memory of 2008 4792 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://qantas.airlineticketingservice.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf3529758,0x7ffaf3529768,0x7ffaf35297782⤵PID:3772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1872,i,1856005391424714388,10028401587684731203,131072 /prefetch:22⤵PID:3168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1872,i,1856005391424714388,10028401587684731203,131072 /prefetch:82⤵PID:3356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1872,i,1856005391424714388,10028401587684731203,131072 /prefetch:82⤵PID:2008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1872,i,1856005391424714388,10028401587684731203,131072 /prefetch:12⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2948 --field-trial-handle=1872,i,1856005391424714388,10028401587684731203,131072 /prefetch:12⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3664 --field-trial-handle=1872,i,1856005391424714388,10028401587684731203,131072 /prefetch:12⤵PID:1336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4848 --field-trial-handle=1872,i,1856005391424714388,10028401587684731203,131072 /prefetch:12⤵PID:392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3644 --field-trial-handle=1872,i,1856005391424714388,10028401587684731203,131072 /prefetch:12⤵PID:752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3260 --field-trial-handle=1872,i,1856005391424714388,10028401587684731203,131072 /prefetch:12⤵PID:3816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 --field-trial-handle=1872,i,1856005391424714388,10028401587684731203,131072 /prefetch:82⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 --field-trial-handle=1872,i,1856005391424714388,10028401587684731203,131072 /prefetch:82⤵PID:3660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2608 --field-trial-handle=1872,i,1856005391424714388,10028401587684731203,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:448
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD556d3ffb60e80463b25846ed37ba33f0d
SHA1740f00f48b949babea69a4fadbfaa2247c747942
SHA2569a0b0971cdfa8b0766085510debfc69cffda9b430c28506b50c85e9165873140
SHA5124fac9fcc8c53cc49a5e69e0aace993c6152cce8bb4920758b038273f659a9cbffd3d4d9b8fb4af32a987b7897d1cff37de6bf3d23ac9855e94a9058f1f6f5da9
-
Filesize
336B
MD57a30fce09eb1bc99e39874dfe9e1e8a4
SHA1f1c7cbdf7db788d55ea91061f14df12cee3cc7d7
SHA2560bfad3875c31f8d7c73e39a2a3ff910da6f5c4c2b0b1c454dd63d20050ca3af4
SHA5122d5bf366e367b076b588bda8617b5ff475d2e85944c0905e4d5a1f7a3635f2cb5c40affb6adeea3b931df2c660e750f4df4bff2c8a2b27a1a8e6df5f940b9d64
-
Filesize
2KB
MD5808b5fad12b9ffe83e5f6844e41a0398
SHA15ef413046226b47983451e920928bf8c3a318ca1
SHA2568c230c2b331079e54161de10c7aac7e7ccf2c3d25cdc64c55e4107aa39de0c69
SHA512ed0fe27c1d6351fe316f66b3b6db238fb082a65486063d4d509bbd1ed91ad79182a78936161a49225802d42f8ebe59a563ad99b87c111cd6c9399f7a92f1d704
-
Filesize
707B
MD534b0d0861aad50bd8c5a2afde6ce7373
SHA1094754a0eb7fcd63158c3353dffbde3f91088728
SHA2565f6d7046fd8f933ceaa89debdfc7a13332909e65be2f86ea8a62804a892a0c48
SHA512b4b43a22b8a15a21049dd84fa8fb49c59248436519441aaee8d41ed1d9edd239d3bf8b7378ddbc42eda64f3eebcb38a1ec7b15058ca9537caf54d8df68cdaa07
-
Filesize
6KB
MD521f8bc8e23149ae2fab898f97a8a4e64
SHA1cca8f230eb36c7d61a3444a6523d937c95e82bd4
SHA256c5885d0aa5b6b8bde24534b4d09e59dc5e2997138bf697d9e6d6d8bddfb421de
SHA5123b028c922e807c77e7242436441764f7c92d5941a569c111b30882ecc27c0699fa17ba2ff857e55a913d7acda7463fce22d7d6e71c67124002fcdb6477646656
-
Filesize
114KB
MD5a79363d3be3ca24281df0d135623c1bd
SHA1e15ec943578ce06496e6694309fefd669969d0c3
SHA256d7eea3f4806f828fed5b34f8af32efe2f2313e552a326c77f7f846d544d1239d
SHA5120d96630e30e92440b5adc900b83514d8c0dc94e681d4684d558c7ad4ac29513edf796e32e710870df32dd577215cceb5667587d53840695c1155ebb716555f41
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd