Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-02-2024 22:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://my.turkon.com/container-tracking
Resource
win10v2004-20240226-en
General
-
Target
https://my.turkon.com/container-tracking
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133535467360319519" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2460 chrome.exe 2460 chrome.exe 3364 chrome.exe 3364 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2460 wrote to memory of 1368 2460 chrome.exe 39 PID 2460 wrote to memory of 1368 2460 chrome.exe 39 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 3368 2460 chrome.exe 90 PID 2460 wrote to memory of 2488 2460 chrome.exe 89 PID 2460 wrote to memory of 2488 2460 chrome.exe 89 PID 2460 wrote to memory of 560 2460 chrome.exe 91 PID 2460 wrote to memory of 560 2460 chrome.exe 91 PID 2460 wrote to memory of 560 2460 chrome.exe 91 PID 2460 wrote to memory of 560 2460 chrome.exe 91 PID 2460 wrote to memory of 560 2460 chrome.exe 91 PID 2460 wrote to memory of 560 2460 chrome.exe 91 PID 2460 wrote to memory of 560 2460 chrome.exe 91 PID 2460 wrote to memory of 560 2460 chrome.exe 91 PID 2460 wrote to memory of 560 2460 chrome.exe 91 PID 2460 wrote to memory of 560 2460 chrome.exe 91 PID 2460 wrote to memory of 560 2460 chrome.exe 91 PID 2460 wrote to memory of 560 2460 chrome.exe 91 PID 2460 wrote to memory of 560 2460 chrome.exe 91 PID 2460 wrote to memory of 560 2460 chrome.exe 91 PID 2460 wrote to memory of 560 2460 chrome.exe 91 PID 2460 wrote to memory of 560 2460 chrome.exe 91 PID 2460 wrote to memory of 560 2460 chrome.exe 91 PID 2460 wrote to memory of 560 2460 chrome.exe 91 PID 2460 wrote to memory of 560 2460 chrome.exe 91 PID 2460 wrote to memory of 560 2460 chrome.exe 91 PID 2460 wrote to memory of 560 2460 chrome.exe 91 PID 2460 wrote to memory of 560 2460 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://my.turkon.com/container-tracking1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8ef29758,0x7ffd8ef29768,0x7ffd8ef297782⤵PID:1368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2028 --field-trial-handle=1904,i,4696011752774640781,5785071172682730654,131072 /prefetch:82⤵PID:2488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1904,i,4696011752774640781,5785071172682730654,131072 /prefetch:22⤵PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1904,i,4696011752774640781,5785071172682730654,131072 /prefetch:82⤵PID:560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3144 --field-trial-handle=1904,i,4696011752774640781,5785071172682730654,131072 /prefetch:12⤵PID:3804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3152 --field-trial-handle=1904,i,4696011752774640781,5785071172682730654,131072 /prefetch:12⤵PID:3592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 --field-trial-handle=1904,i,4696011752774640781,5785071172682730654,131072 /prefetch:82⤵PID:448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 --field-trial-handle=1904,i,4696011752774640781,5785071172682730654,131072 /prefetch:82⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5284 --field-trial-handle=1904,i,4696011752774640781,5785071172682730654,131072 /prefetch:12⤵PID:3268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5408 --field-trial-handle=1904,i,4696011752774640781,5785071172682730654,131072 /prefetch:12⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4752 --field-trial-handle=1904,i,4696011752774640781,5785071172682730654,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3364
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD588625588b67fca422bf1f10adf1f8ae0
SHA1350d637e317e4085bd990f69ed4b89bf97cb36ac
SHA256db56ae21c5703dc69d74ca1beae596558d4b9b42122455f9c3fcd0315866eff2
SHA512e69020402bdf98a10ce939433e4a654617aa0140efbc37eccfe022e1acdec194aed6399fba3c0c595ac535e1acaa5e35c7a08bcdf747e183124057ff151248c6
-
Filesize
1KB
MD5d556d6eba429e27bbc1724ad1301b6d9
SHA1b46431bbb721adcd14e07876eaed34a8a340ef36
SHA2563bd80a41c01fa4461088d0bdc1b907688d08f21a9a03c6f5ed3e1cd0c7cb495c
SHA512fdb2aaf3a6db1fb750a7101f14bafa6827936a3291172b3ef188b793121833711d9fea9a8dbd06446a50ff3862ebf83efb62592f84b0eed68a4315de7044a83b
-
Filesize
699B
MD53429a42abae3479e5f9622862993adf1
SHA1fa38f876f56c1dafe3d29eec3b1c8d67c4c1f04a
SHA256bccc278153456d2e79f206af900c68edc413213f4a7d7418c2279c8c82d98d1a
SHA512dc8bd31963e80378015997de2bc359fe57cb78d3c3bc08870eed99d8ce6ef3db0b796f1d50458f1b1ade5fb82c15fc67d95f8169f4b1241bc07e73de845f3e97
-
Filesize
6KB
MD547abcd00a20efb7360ff30a6ccee8b66
SHA1a2ecdd0c8dd749ee85d0ca724784b15e06a17e67
SHA2561ee8e104b57c934f694b672a4209b440abe828b3c11287b10a746721dfa4fb00
SHA512796fd86c1dc2c48d45c34d985a1c70f6af5ad9d3a285dd6749b584fe144faa6e68065d3c642e644b22ab3553b81d3dcf2adba69e09820ca04450441a81956e2f
-
Filesize
253KB
MD554bd473882c7d1cc83bc8c3a626d85af
SHA12d039092ede8fbc1e77610623cc02714e456fa1e
SHA256e34ae87aa42128f2db9776c082f176ab811cb26cf5944bb4ec57425ba112397a
SHA5126efb04eaa9562ba8ec0a456cb31405b29a840152c6e990ab26b812f07eae4d690a959a0d1767118034c4fb66cba56ba8accb772107582fb53d682842a018859e
-
Filesize
253KB
MD57a17fa757093584da26268a8c0cd59d4
SHA1232179508ebe58600f54e430a65e3436790ddea9
SHA256f1b105a79a147bf82685737f7815aa1a92bd9cc31dbd3dccb85090ebbd727821
SHA5122985a9b8000727a6b75996ade1ac43fbd6f81043b743df28e573a238d3b4cd4d8d4f4263968cfeb657a1c59e74dd21b63aab34873bf53a5034a39614efc25ea7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd