Analysis
-
max time kernel
600s -
max time network
603s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
07-03-2024 15:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://e5-nttdata-eloit-kl-in.azurewebsites.net/Account/Login?ReturnUrl=https%3A%2F%2Fe5-nttdata-eloit-kl-in.azurewebsites.net%2F
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
https://e5-nttdata-eloit-kl-in.azurewebsites.net/Account/Login?ReturnUrl=https%3A%2F%2Fe5-nttdata-eloit-kl-in.azurewebsites.net%2F
Resource
android-x64-20240221-en
General
-
Target
https://e5-nttdata-eloit-kl-in.azurewebsites.net/Account/Login?ReturnUrl=https%3A%2F%2Fe5-nttdata-eloit-kl-in.azurewebsites.net%2F
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133543001983371651" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4612 chrome.exe 4612 chrome.exe 2064 chrome.exe 2064 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4612 chrome.exe 4612 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4612 wrote to memory of 3892 4612 chrome.exe 73 PID 4612 wrote to memory of 3892 4612 chrome.exe 73 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 220 4612 chrome.exe 75 PID 4612 wrote to memory of 208 4612 chrome.exe 76 PID 4612 wrote to memory of 208 4612 chrome.exe 76 PID 4612 wrote to memory of 988 4612 chrome.exe 77 PID 4612 wrote to memory of 988 4612 chrome.exe 77 PID 4612 wrote to memory of 988 4612 chrome.exe 77 PID 4612 wrote to memory of 988 4612 chrome.exe 77 PID 4612 wrote to memory of 988 4612 chrome.exe 77 PID 4612 wrote to memory of 988 4612 chrome.exe 77 PID 4612 wrote to memory of 988 4612 chrome.exe 77 PID 4612 wrote to memory of 988 4612 chrome.exe 77 PID 4612 wrote to memory of 988 4612 chrome.exe 77 PID 4612 wrote to memory of 988 4612 chrome.exe 77 PID 4612 wrote to memory of 988 4612 chrome.exe 77 PID 4612 wrote to memory of 988 4612 chrome.exe 77 PID 4612 wrote to memory of 988 4612 chrome.exe 77 PID 4612 wrote to memory of 988 4612 chrome.exe 77 PID 4612 wrote to memory of 988 4612 chrome.exe 77 PID 4612 wrote to memory of 988 4612 chrome.exe 77 PID 4612 wrote to memory of 988 4612 chrome.exe 77 PID 4612 wrote to memory of 988 4612 chrome.exe 77 PID 4612 wrote to memory of 988 4612 chrome.exe 77 PID 4612 wrote to memory of 988 4612 chrome.exe 77 PID 4612 wrote to memory of 988 4612 chrome.exe 77 PID 4612 wrote to memory of 988 4612 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://e5-nttdata-eloit-kl-in.azurewebsites.net/Account/Login?ReturnUrl=https%3A%2F%2Fe5-nttdata-eloit-kl-in.azurewebsites.net%2F1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffaa4819758,0x7ffaa4819768,0x7ffaa48197782⤵PID:3892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1524 --field-trial-handle=1816,i,941462619100261794,13154161015322111028,131072 /prefetch:22⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1784 --field-trial-handle=1816,i,941462619100261794,13154161015322111028,131072 /prefetch:82⤵PID:208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 --field-trial-handle=1816,i,941462619100261794,13154161015322111028,131072 /prefetch:82⤵PID:988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2856 --field-trial-handle=1816,i,941462619100261794,13154161015322111028,131072 /prefetch:12⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2864 --field-trial-handle=1816,i,941462619100261794,13154161015322111028,131072 /prefetch:12⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4632 --field-trial-handle=1816,i,941462619100261794,13154161015322111028,131072 /prefetch:82⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4708 --field-trial-handle=1816,i,941462619100261794,13154161015322111028,131072 /prefetch:82⤵PID:1576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3232 --field-trial-handle=1816,i,941462619100261794,13154161015322111028,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD59a15c9494c418dd8315262a567412fff
SHA1ea2518b6401e26a872255fdc8e9d3dd87a2e0d37
SHA2568ed68aab97c8dd78dccbd86403a4410f6b53801ddfbeed40d19329d863b6e6d5
SHA512ee3d54e4242ea0754bd879db265ef08a1b849d4b240d9da3f2477451ac6448b435d3e5da521f1d0043ffa3fb1167553331135d622ca22bf9a4c9a4a26808a12f
-
Filesize
5KB
MD531be09a22e413e2f93c4fa1021fe2be8
SHA1b49f5b8bfb9a5d38e27d7e8b141ba470a44d8e0a
SHA256a70e7cc502b16a9e246a7e9e42ec4c7a4caab15e0f07a6d9da92862d92059893
SHA512ac4c6052e351ce084635850b6823922bcca78b871066782c24d7b13a3fd520de1a9481cea52dc6ce47dfb9ef902db3b0d42a4cafc19c583698a4623dc9568211
-
Filesize
5KB
MD5dfbc3a67676ced58be1a7bfccfc5a258
SHA14ef048dcd90b19458742c498363026ec7785cf58
SHA256217e3bb240a950944c495e3da0e95a3c29846a883cb716a9eb5fd8ed2de1cf23
SHA512c7763e87bedf45cc6fda6989ee42234b8b8fd8b677ee4121512b97d99a1702cb15b0f72d158d59a032bde207b37ef07ec47a7079e0fa068d392d467dc5ec8ca7
-
Filesize
6KB
MD59a9026d8a7637498987ed049a4935c80
SHA1467e390b37b34fe389d0edcce7e9073b823b223f
SHA256ef9ac148cdf3cacd3be2b64f0c63ec1713672f622917249f5f7b149316381713
SHA51290e30955fb578712126a6124353440a8e723fe7ade0d09d54714d306e270ba843ea8a66712bfbe2dfdf770f6752d133171390ab068af6b7145dae22eda5f4d56
-
Filesize
6KB
MD5f24f990d2ad66edf8f7f49aede20b6ac
SHA1307545cb39424c42bfdfda0c17dc7a0bdf7d1a41
SHA256bdbb3e22f74790fdba0cd3581d318dc2151bde3fa833b879956007ece350948e
SHA51265a88b882483a776eb9bce57b1985e812c2b5fdb378fccb48cee84a80528dda711ea8306bed4ae1dd036e5593de29d2627e435a5363a7a95959a71229f05bd84
-
Filesize
130KB
MD555081481b7ff5421b55b8ee86a5e453d
SHA18493573353a47dff97c2ba6a4056d153a30ef6b2
SHA2568783673cd320290938eade9e2ea969a7f4110aed8f43121e2386ee27e5992aa1
SHA5129a88e5d6b5999598053a4c04870f34684e868dc9d671964c85b4a9cf0979390bfe01a71165e0d6fbfb41ea275832ae99d1f5ceecc9c14c16bb9486bca00c577d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd