Analysis
-
max time kernel
301s -
max time network
288s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/02/2024, 04:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://pro.weatherzone.com.au/password_resets/eC18gbtClBwGwNxpLcBixA/edit
Resource
win10v2004-20240226-en
General
-
Target
http://pro.weatherzone.com.au/password_resets/eC18gbtClBwGwNxpLcBixA/edit
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133536544364521941" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4940 chrome.exe 4940 chrome.exe 3020 chrome.exe 3020 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4940 wrote to memory of 3508 4940 chrome.exe 84 PID 4940 wrote to memory of 3508 4940 chrome.exe 84 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1628 4940 chrome.exe 87 PID 4940 wrote to memory of 1792 4940 chrome.exe 88 PID 4940 wrote to memory of 1792 4940 chrome.exe 88 PID 4940 wrote to memory of 4644 4940 chrome.exe 89 PID 4940 wrote to memory of 4644 4940 chrome.exe 89 PID 4940 wrote to memory of 4644 4940 chrome.exe 89 PID 4940 wrote to memory of 4644 4940 chrome.exe 89 PID 4940 wrote to memory of 4644 4940 chrome.exe 89 PID 4940 wrote to memory of 4644 4940 chrome.exe 89 PID 4940 wrote to memory of 4644 4940 chrome.exe 89 PID 4940 wrote to memory of 4644 4940 chrome.exe 89 PID 4940 wrote to memory of 4644 4940 chrome.exe 89 PID 4940 wrote to memory of 4644 4940 chrome.exe 89 PID 4940 wrote to memory of 4644 4940 chrome.exe 89 PID 4940 wrote to memory of 4644 4940 chrome.exe 89 PID 4940 wrote to memory of 4644 4940 chrome.exe 89 PID 4940 wrote to memory of 4644 4940 chrome.exe 89 PID 4940 wrote to memory of 4644 4940 chrome.exe 89 PID 4940 wrote to memory of 4644 4940 chrome.exe 89 PID 4940 wrote to memory of 4644 4940 chrome.exe 89 PID 4940 wrote to memory of 4644 4940 chrome.exe 89 PID 4940 wrote to memory of 4644 4940 chrome.exe 89 PID 4940 wrote to memory of 4644 4940 chrome.exe 89 PID 4940 wrote to memory of 4644 4940 chrome.exe 89 PID 4940 wrote to memory of 4644 4940 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://pro.weatherzone.com.au/password_resets/eC18gbtClBwGwNxpLcBixA/edit1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff842ab9758,0x7ff842ab9768,0x7ff842ab97782⤵PID:3508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1884,i,8198017038361518756,14052113459034729079,131072 /prefetch:22⤵PID:1628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1884,i,8198017038361518756,14052113459034729079,131072 /prefetch:82⤵PID:1792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1884,i,8198017038361518756,14052113459034729079,131072 /prefetch:82⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2884 --field-trial-handle=1884,i,8198017038361518756,14052113459034729079,131072 /prefetch:12⤵PID:3584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2904 --field-trial-handle=1884,i,8198017038361518756,14052113459034729079,131072 /prefetch:12⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4776 --field-trial-handle=1884,i,8198017038361518756,14052113459034729079,131072 /prefetch:12⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 --field-trial-handle=1884,i,8198017038361518756,14052113459034729079,131072 /prefetch:82⤵PID:1704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 --field-trial-handle=1884,i,8198017038361518756,14052113459034729079,131072 /prefetch:82⤵PID:744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5216 --field-trial-handle=1884,i,8198017038361518756,14052113459034729079,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3020
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD598a9042a974fc90d673bd1f063afec1a
SHA17584c704b2d353b2da7def237828b3b016eb1753
SHA256be7298793e8dcbdb2aa7a458b28bdd95cc6ae2518405e118e1c65141769511f7
SHA51204b388a0a7729e7970ff153969689e0386edeff4a6cb1164c007950d838e4ec2e0164726d0f6aa7353b02380e292ee5863ecd24967bd3d9f99c76a3909ac5595
-
Filesize
1KB
MD508a36685c74c3b50c00278cf8b1d0c4f
SHA11064c6b987ea9090fe7bd51bf06096b053faeea2
SHA256ae5af6cafb430bec6a895ad80e69e3f127761a87c22106987edc6f332b4972aa
SHA5125102b93060f59acbcbce64957e2c197b75033aef4394b10d831562d47a2023528e5b542821f1c5283d14df8b52c997f5e6ef0e226e677ccf671d431fc5b6bf12
-
Filesize
2KB
MD5d0dd0b325c36e3d4b8fdb4152f87d144
SHA158c26a82c2a63869cf4f3d8b8b2402da55ddaab9
SHA256d1161da386a89df8aa193b6639ca3c36549343c843fe2c2c415f47f1ccd27a63
SHA512708a8b28fd104b6fc48fde800bdc1b20bc796969d336e004a963178ca84f540e339b1d6ee0cbbeaf2d763dd128864dca5322f17c018241c10ea5f2e6dffc5ecf
-
Filesize
703B
MD561672f1c01b9cb2464e06a1aee340b79
SHA1f2810039981a314cd5d2a1f77542d59499333901
SHA256e8cda6e137edf274225d49c0ceb52c7d459837eead044f3a491fb7717a62b6dd
SHA5125edd2d79aeca6ab0bd337dd57a85feb80ec083078e03739a7d63f3b3581fda22e53e342a5cf93652a831f599aa5c33194c15ad72d31dbcd8f127479a0e5261c2
-
Filesize
6KB
MD5abf8cadd4eb9b2cf2c5a2a9d59261d93
SHA105d10e35c4a0efd9cf5b80b31ce78b189debfd80
SHA2565823d287a8809bc64babc9216dfa3a468c72b7194c3c36bcf5197df8fa49a71c
SHA512c597e561f3c54159e43758291195701174b4cc010e8f2d27496a559faa55612bed9a4c5cefe5bb770cf54471317ec440fd777679c4d22b89ed7e6b4ff15d4d2f
-
Filesize
128KB
MD5b87e8932b8d9b6fa0b99b0785101f804
SHA1a7b922141bbeb190814388dcb843128d1da69b44
SHA256371cb78844b1af834aa2eb7fa2a9a791e0e97f9ac5acba22fa5c3e52278a7f3f
SHA51214e22264911c370d4917f93f1077cceaea39af44905b11188fd82a743b351ff9730863efb697ef3c7de8858b5f60d9e336a02b582e840fcf8a87d15e05d1bcfa
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd