Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2024 22:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.cohesionib.com/
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
http://www.cohesionib.com/
Resource
win10v2004-20231222-en
General
-
Target
http://www.cohesionib.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133512991369026208" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1320 chrome.exe 1320 chrome.exe 3176 chrome.exe 3176 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: 33 4560 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4560 AUDIODG.EXE Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1320 wrote to memory of 1724 1320 chrome.exe 74 PID 1320 wrote to memory of 1724 1320 chrome.exe 74 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 2848 1320 chrome.exe 87 PID 1320 wrote to memory of 4480 1320 chrome.exe 89 PID 1320 wrote to memory of 4480 1320 chrome.exe 89 PID 1320 wrote to memory of 2276 1320 chrome.exe 88 PID 1320 wrote to memory of 2276 1320 chrome.exe 88 PID 1320 wrote to memory of 2276 1320 chrome.exe 88 PID 1320 wrote to memory of 2276 1320 chrome.exe 88 PID 1320 wrote to memory of 2276 1320 chrome.exe 88 PID 1320 wrote to memory of 2276 1320 chrome.exe 88 PID 1320 wrote to memory of 2276 1320 chrome.exe 88 PID 1320 wrote to memory of 2276 1320 chrome.exe 88 PID 1320 wrote to memory of 2276 1320 chrome.exe 88 PID 1320 wrote to memory of 2276 1320 chrome.exe 88 PID 1320 wrote to memory of 2276 1320 chrome.exe 88 PID 1320 wrote to memory of 2276 1320 chrome.exe 88 PID 1320 wrote to memory of 2276 1320 chrome.exe 88 PID 1320 wrote to memory of 2276 1320 chrome.exe 88 PID 1320 wrote to memory of 2276 1320 chrome.exe 88 PID 1320 wrote to memory of 2276 1320 chrome.exe 88 PID 1320 wrote to memory of 2276 1320 chrome.exe 88 PID 1320 wrote to memory of 2276 1320 chrome.exe 88 PID 1320 wrote to memory of 2276 1320 chrome.exe 88 PID 1320 wrote to memory of 2276 1320 chrome.exe 88 PID 1320 wrote to memory of 2276 1320 chrome.exe 88 PID 1320 wrote to memory of 2276 1320 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.cohesionib.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd92e19758,0x7ffd92e19768,0x7ffd92e197782⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1880,i,1984043132702986618,8785948402233906312,131072 /prefetch:22⤵PID:2848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1880,i,1984043132702986618,8785948402233906312,131072 /prefetch:82⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1880,i,1984043132702986618,8785948402233906312,131072 /prefetch:82⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2860 --field-trial-handle=1880,i,1984043132702986618,8785948402233906312,131072 /prefetch:12⤵PID:4932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2852 --field-trial-handle=1880,i,1984043132702986618,8785948402233906312,131072 /prefetch:12⤵PID:3864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4764 --field-trial-handle=1880,i,1984043132702986618,8785948402233906312,131072 /prefetch:12⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5104 --field-trial-handle=1880,i,1984043132702986618,8785948402233906312,131072 /prefetch:12⤵PID:4072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 --field-trial-handle=1880,i,1984043132702986618,8785948402233906312,131072 /prefetch:82⤵PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 --field-trial-handle=1880,i,1984043132702986618,8785948402233906312,131072 /prefetch:82⤵PID:1396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5164 --field-trial-handle=1880,i,1984043132702986618,8785948402233906312,131072 /prefetch:82⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2344 --field-trial-handle=1880,i,1984043132702986618,8785948402233906312,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3176
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1052
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2fc 0x3041⤵
- Suspicious use of AdjustPrivilegeToken
PID:4560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
193KB
MD57fe2c36271aa8065b034ce9efdbd2a07
SHA1e22ee654cb122d0d62393dd8d6753d2bcad148a3
SHA25602cf672988303d8fbdbc7625f54596ece6d83c78152ca6e1aa332fc8c75d5c34
SHA51245d53a09ced29138e2f99e0e8a293322050f8032e006df06315ac9af2f1ab64d1c767ea5db53289bb5881a4866061299e5a60cd83753fe6ba88e8de7562706ec
-
Filesize
1KB
MD5e6ca80f8b132bf1828faf4b66f4580e0
SHA19a48f88f9c54ec01e7908e343088ab2a6f7c8136
SHA2565186daeae91ba43a6e1942da9e52dcdfed062700dc5c455aa44bdd54e0a5d8bb
SHA51233073349703a9ce9c4d6cb72097b3469b130cbdb17ab4b888ea1153b175444a7278d3b11ead6daa401295eb2735ca9e9e6e9f5291cbe960fda2b4f38aaf1071f
-
Filesize
6KB
MD51a62d7fba830edb1d5e11381fff0e1d1
SHA19e50bb1a3e91366259d225edb0a9a1c918b86296
SHA25683968f30d75b3706af4f6af3f2aed720c74ffbec7fed0046b947a09e8001bbd2
SHA5127f86e0d8222d4d2184b304843390bb0b5e93de256f0416f83def461339dde0d4701e2b2ddc602bfecfaedb47f998a57a95254fc342c5583aa96f9a3aff3f5b14
-
Filesize
2KB
MD5cc1ed97810b24d4aaa01b7c8dba4dec5
SHA128f10511fc264aa4f467396a8bd376f7b45a94f3
SHA25670657e874bca7fe04794e0a31bffd6a4ac00dbd9a6865739e79a74c7a3cd84a9
SHA51283cd53d75d231e56e6f96f8f12e3fecf7320fe1ab21962821511481ab10168505ea3f97f2675c53b557fc1be44a0dce87a2f73cc95f4fedb4b682ba6d9e38dc6
-
Filesize
2KB
MD509684e86c643a21fa815a5e1a058b360
SHA1326c42f93fd594a577b41b138a72b929587762e6
SHA256d7ff2d55c6a19095d65bce755c7a1af57498003ce6ad68950d848bce29c7efc8
SHA51290bc53a8263ab7e70e1c5e68e2a0a941f5691a1d186dfd76987797957fd820a406a24249e5b510030eb1b9660b51a854680d21df6da93931939a21498d0964d5
-
Filesize
2KB
MD574b0531b0a82bd6a7f43c5b94ca0e515
SHA16cf8b5253ffac0c7aef21cab861cc2fd9a1ee00f
SHA2568a1102517ea5585bd18de7f098f51bed9c0cb0cb229a2cf0695c1da33305638e
SHA51254aa0bee2a3cd0c527f4e3270ace87c29bf77dedfc13155b7739eb574664e2dd759b4ac9e7c11b7a1ab1f44467dbc9dc3e0966cafde6b5aeeab7f08dc98f20d6
-
Filesize
6KB
MD535841e693c9653d7c912f87202eca94a
SHA1391bf3b49c01a9f8c338b51c0f21fcb193a6e95f
SHA25628e89c06620ca8b4894528f6fa38bb964c03b8dfeb0f5a5a2d757eb4c631b6c9
SHA51217f05bfdda95e7a434e0746bd2807cd482a830d1ff342224e49f7a9aee25d5645c8a5c924402d94abe6835475a9eacd5e8c4e838f29d2a652747ef76349fda32
-
Filesize
114KB
MD5a5736a57772b0956f30a1783efdf14c9
SHA13168a235333b17df02147fdd07214d05a72e02b8
SHA256a0653138c40c6fd9be8a1ce842919280ceba054d700a29fd1a830dc9e8052da0
SHA512574ddeb2649fe94aa6ac8205f8e69f68f4a40243038e2a10224bbd65d866b29433ed6f794e24b4dea38b086902112e91ac627d9be98cdf301d60afedc8652b49
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd