Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 03:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://enoc-proposal.com
Resource
win10v2004-20240226-en
General
-
Target
http://enoc-proposal.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133541692626140309" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1608 chrome.exe 1608 chrome.exe 4300 chrome.exe 4300 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe Token: SeShutdownPrivilege 1608 chrome.exe Token: SeCreatePagefilePrivilege 1608 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe 1608 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1608 wrote to memory of 2388 1608 chrome.exe 87 PID 1608 wrote to memory of 2388 1608 chrome.exe 87 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2280 1608 chrome.exe 89 PID 1608 wrote to memory of 2112 1608 chrome.exe 90 PID 1608 wrote to memory of 2112 1608 chrome.exe 90 PID 1608 wrote to memory of 4004 1608 chrome.exe 91 PID 1608 wrote to memory of 4004 1608 chrome.exe 91 PID 1608 wrote to memory of 4004 1608 chrome.exe 91 PID 1608 wrote to memory of 4004 1608 chrome.exe 91 PID 1608 wrote to memory of 4004 1608 chrome.exe 91 PID 1608 wrote to memory of 4004 1608 chrome.exe 91 PID 1608 wrote to memory of 4004 1608 chrome.exe 91 PID 1608 wrote to memory of 4004 1608 chrome.exe 91 PID 1608 wrote to memory of 4004 1608 chrome.exe 91 PID 1608 wrote to memory of 4004 1608 chrome.exe 91 PID 1608 wrote to memory of 4004 1608 chrome.exe 91 PID 1608 wrote to memory of 4004 1608 chrome.exe 91 PID 1608 wrote to memory of 4004 1608 chrome.exe 91 PID 1608 wrote to memory of 4004 1608 chrome.exe 91 PID 1608 wrote to memory of 4004 1608 chrome.exe 91 PID 1608 wrote to memory of 4004 1608 chrome.exe 91 PID 1608 wrote to memory of 4004 1608 chrome.exe 91 PID 1608 wrote to memory of 4004 1608 chrome.exe 91 PID 1608 wrote to memory of 4004 1608 chrome.exe 91 PID 1608 wrote to memory of 4004 1608 chrome.exe 91 PID 1608 wrote to memory of 4004 1608 chrome.exe 91 PID 1608 wrote to memory of 4004 1608 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://enoc-proposal.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc2a669758,0x7ffc2a669768,0x7ffc2a6697782⤵PID:2388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1864,i,8117959547897557055,2181922396462526197,131072 /prefetch:22⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1864,i,8117959547897557055,2181922396462526197,131072 /prefetch:82⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2256 --field-trial-handle=1864,i,8117959547897557055,2181922396462526197,131072 /prefetch:82⤵PID:4004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2864 --field-trial-handle=1864,i,8117959547897557055,2181922396462526197,131072 /prefetch:12⤵PID:3308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2876 --field-trial-handle=1864,i,8117959547897557055,2181922396462526197,131072 /prefetch:12⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4000 --field-trial-handle=1864,i,8117959547897557055,2181922396462526197,131072 /prefetch:12⤵PID:2628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3000 --field-trial-handle=1864,i,8117959547897557055,2181922396462526197,131072 /prefetch:12⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 --field-trial-handle=1864,i,8117959547897557055,2181922396462526197,131072 /prefetch:82⤵PID:3140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 --field-trial-handle=1864,i,8117959547897557055,2181922396462526197,131072 /prefetch:82⤵PID:1280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=1632 --field-trial-handle=1864,i,8117959547897557055,2181922396462526197,131072 /prefetch:12⤵PID:4348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2732 --field-trial-handle=1864,i,8117959547897557055,2181922396462526197,131072 /prefetch:12⤵PID:892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=1248 --field-trial-handle=1864,i,8117959547897557055,2181922396462526197,131072 /prefetch:12⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4044 --field-trial-handle=1864,i,8117959547897557055,2181922396462526197,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5011e146488d335bbc8dd4be896bc9a49
SHA11f26e848b8b371418f8b73b0beb99b922e9778fa
SHA25611dd84ee95120b5bd373b35bf1b101103936bcf45da8480aacc5371fae56191a
SHA512b027f570c0c80c2cfec7d9b8e74970495ba7f3c71cafda97bedd5d32d8c13cfb07cece2d973d201920a21dbdab55749f6ed1887b4421e7c89aa749b440ed552f
-
Filesize
6KB
MD5a7fe71746e8ae2e3fbe106728750d921
SHA1d73beccdfb7531aac89c151c945dee7bb86c7be8
SHA256d3be38c4547e69179b9acf65ebaea629bdf75da7c0abdbaa6986735bf7a4ea4b
SHA5124378b88174308edcbed04f95606196dff483d219dafe498a103edfc0710ac1a26b5da685e78e26c9445b69ccc4c7b18f5a3e28b64a2934f13ff170f80599a5ce
-
Filesize
128KB
MD5290552781b21cc988539327160a6ae78
SHA1d7e9aeecb382c589061df7d965bbc95b28d4a75c
SHA256731d90cec5afb29def66083569f60ab7347940062bd75fa091e732cd81008248
SHA51211b93c58e22480818a7ff8f364545413eb9a069f2b92941e91302b88d3b1b1812e18fd0419d034c5d9f986dddcca949a3f8ec7c021659c6c1b127cdc4dcd3b8e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e