Analysis
-
max time kernel
1800s -
max time network
1687s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/02/2024, 20:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://womangathering.com/
Resource
win11-20240214-en
General
-
Target
https://womangathering.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133528526920997492" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5092 chrome.exe 5092 chrome.exe 3360 chrome.exe 3360 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe Token: SeShutdownPrivilege 5092 chrome.exe Token: SeCreatePagefilePrivilege 5092 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe 5092 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5092 wrote to memory of 1456 5092 chrome.exe 77 PID 5092 wrote to memory of 1456 5092 chrome.exe 77 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 4040 5092 chrome.exe 79 PID 5092 wrote to memory of 3400 5092 chrome.exe 80 PID 5092 wrote to memory of 3400 5092 chrome.exe 80 PID 5092 wrote to memory of 1968 5092 chrome.exe 81 PID 5092 wrote to memory of 1968 5092 chrome.exe 81 PID 5092 wrote to memory of 1968 5092 chrome.exe 81 PID 5092 wrote to memory of 1968 5092 chrome.exe 81 PID 5092 wrote to memory of 1968 5092 chrome.exe 81 PID 5092 wrote to memory of 1968 5092 chrome.exe 81 PID 5092 wrote to memory of 1968 5092 chrome.exe 81 PID 5092 wrote to memory of 1968 5092 chrome.exe 81 PID 5092 wrote to memory of 1968 5092 chrome.exe 81 PID 5092 wrote to memory of 1968 5092 chrome.exe 81 PID 5092 wrote to memory of 1968 5092 chrome.exe 81 PID 5092 wrote to memory of 1968 5092 chrome.exe 81 PID 5092 wrote to memory of 1968 5092 chrome.exe 81 PID 5092 wrote to memory of 1968 5092 chrome.exe 81 PID 5092 wrote to memory of 1968 5092 chrome.exe 81 PID 5092 wrote to memory of 1968 5092 chrome.exe 81 PID 5092 wrote to memory of 1968 5092 chrome.exe 81 PID 5092 wrote to memory of 1968 5092 chrome.exe 81 PID 5092 wrote to memory of 1968 5092 chrome.exe 81 PID 5092 wrote to memory of 1968 5092 chrome.exe 81 PID 5092 wrote to memory of 1968 5092 chrome.exe 81 PID 5092 wrote to memory of 1968 5092 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://womangathering.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb96d59758,0x7ffb96d59768,0x7ffb96d597782⤵PID:1456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1804,i,388112490478811627,11760269598929554382,131072 /prefetch:22⤵PID:4040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1804,i,388112490478811627,11760269598929554382,131072 /prefetch:82⤵PID:3400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2152 --field-trial-handle=1804,i,388112490478811627,11760269598929554382,131072 /prefetch:82⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1804,i,388112490478811627,11760269598929554382,131072 /prefetch:12⤵PID:228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1804,i,388112490478811627,11760269598929554382,131072 /prefetch:12⤵PID:1816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4572 --field-trial-handle=1804,i,388112490478811627,11760269598929554382,131072 /prefetch:12⤵PID:2560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 --field-trial-handle=1804,i,388112490478811627,11760269598929554382,131072 /prefetch:82⤵PID:896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3692 --field-trial-handle=1804,i,388112490478811627,11760269598929554382,131072 /prefetch:82⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2868 --field-trial-handle=1804,i,388112490478811627,11760269598929554382,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3360
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
194KB
MD5ac84f1282f8542dee07f8a1af421f2a7
SHA1261885284826281a99ff982428a765be30de9029
SHA256193b8f571f3fd65b98dc39601431ff6e91ade5f90ee7790bfc1fba8f7580a4b0
SHA5129f4f58ab43ddadad903cea3454d79b99a750f05e4d850de5f25371d5bec16fc312015a875b8f418154f1124c400ae1c82e2efd862870cd35c3f0961426c8cd82
-
Filesize
144B
MD5ec58516e5e58173dc2e59c8e0621972b
SHA152919a34ce23539e3977f1ed6bd4a92e587b78d8
SHA256e67f97481764c561c7b7097534a08d1ddacd0fb9b14cf36d0bcfa195d395ba9a
SHA5127b83004f52f4832f9a8042d1fbe468569ef278ccde833eaf613619a20465f53d14f567f20442b6ffed5e9f9b8a9b1616c28f5302690da534d5dedd2464440833
-
Filesize
1KB
MD5b634c031c30c48efce4540b38a77de5a
SHA18a2b12941baca0718f6398430002c6169a7196c7
SHA256e0992ca4d7fb3447878e4df940287fb2d4ba980ce9227445fb8c7b2fb886ee42
SHA5121a5b8a9ca5db82825b46b227317e991e7fa22ae4036aec1c6d743c7e9082de8b74ec564f93eacd933ed549b33498292be820c0ab931169492c1a257918e89d43
-
Filesize
2KB
MD5cb47a8711f177c48dbd4a98c34c8ec59
SHA190b548de12f4daaa81c65c3cedbffa26f04c7377
SHA2565f2e5a7791bb023ce732ed8b196006c1f29abc118126d35a5281934d6b71c87d
SHA512fb82e9317965c263a3358c5e2b6d8332c0b523e7ce2eec0da8a0c91ae099bc89588655b7ea1991739cf302a7f5ea7d9741a9acea4e91be4b029f9600724524f6
-
Filesize
2KB
MD5624aab711893c0ecf833f827f338402e
SHA16970f05c824a29b9150c317cf312f6ab42b44977
SHA256e0d0ed10e3219b7b34e0e2d514abc390c5baa8daec2682c9be47dd51d0b6d143
SHA51223ee3944ce652bedac23195e8cad5874888c925cb4ccf865bcf9e87648278ea3ed59d1535f00895a78f1ee6c94011325dc19fca73f05fdedcdfe3adbbd7589af
-
Filesize
2KB
MD5c4c1229b4e9c648e1ba0aa69ac30c4eb
SHA15f0315014c1e02a94c825e54b79277f027c7a099
SHA25625cd6139e57f99ab542e06a4856ee32bfcadad752586d4b05a8b129a479c7d4f
SHA5129eb05f48b8d5e8d2be7e5e0fd5c9b978c035a4f290fb5d579d7e53807507a9a162b8a25a1bd4a2923ff156803aeea11967f4690d55c0465494e079c162f21c4f
-
Filesize
371B
MD5ab5c05abb3f6a6f336f364c254c23edf
SHA1c6920cd416f06c1a10bedf0e66f716e9c21fcd50
SHA2564bacffc4846fb15d94d30a280c228d90baa8bf975ec28e8263c9af991116d5c3
SHA512e9d18fc52d370df5e3b9050e22455552a4cfa040b5f483f17f226b2fa93e2677e72a5d85b2bc2db2f4a5e8a842dd11c6415bcc659705a6bef1dee52bfe5940f5
-
Filesize
6KB
MD5bad94d8ac9a60e22d83d06da7be51107
SHA1c6a1841e9d2654a181dd1250ce4bad8693b38730
SHA256f1d7af6d073e79a68dabbed6de9e66b7ad39752744a938eec01ba6f5b4dd91bb
SHA512ff0209f90ae5a9095f50a1b811997fa925d87575fccab50502a4b37c7fed67a44ca9c3ea4ce175a6d8c0b1285eba2727c2d00b50c1168f23609c7ff168d68931
-
Filesize
129KB
MD590d798b41d2816cb6f86028de7fffd63
SHA1abdea7b85ea24072e6cf09026593abc441a082a2
SHA2569faa0715af35ee313694a8c7a6ff510f3ad76f75ad1017058c9cce658d820cbe
SHA512f66c2d2e197b7a24092d7bcb64b9cd7fe3c794773bff5b97414ba19ca17f1f67071f26efed24955009f5d09889ed9af58cb73c946de84ca4e275c641d3dda377
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd