Analysis
-
max time kernel
82s -
max time network
90s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
07/03/2024, 18:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://usps.uspxstp.com
Resource
win10-20240221-en
General
-
Target
http://usps.uspxstp.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133543086624962203" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3168 chrome.exe 3168 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3168 wrote to memory of 800 3168 chrome.exe 73 PID 3168 wrote to memory of 800 3168 chrome.exe 73 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 1572 3168 chrome.exe 75 PID 3168 wrote to memory of 4340 3168 chrome.exe 76 PID 3168 wrote to memory of 4340 3168 chrome.exe 76 PID 3168 wrote to memory of 4936 3168 chrome.exe 77 PID 3168 wrote to memory of 4936 3168 chrome.exe 77 PID 3168 wrote to memory of 4936 3168 chrome.exe 77 PID 3168 wrote to memory of 4936 3168 chrome.exe 77 PID 3168 wrote to memory of 4936 3168 chrome.exe 77 PID 3168 wrote to memory of 4936 3168 chrome.exe 77 PID 3168 wrote to memory of 4936 3168 chrome.exe 77 PID 3168 wrote to memory of 4936 3168 chrome.exe 77 PID 3168 wrote to memory of 4936 3168 chrome.exe 77 PID 3168 wrote to memory of 4936 3168 chrome.exe 77 PID 3168 wrote to memory of 4936 3168 chrome.exe 77 PID 3168 wrote to memory of 4936 3168 chrome.exe 77 PID 3168 wrote to memory of 4936 3168 chrome.exe 77 PID 3168 wrote to memory of 4936 3168 chrome.exe 77 PID 3168 wrote to memory of 4936 3168 chrome.exe 77 PID 3168 wrote to memory of 4936 3168 chrome.exe 77 PID 3168 wrote to memory of 4936 3168 chrome.exe 77 PID 3168 wrote to memory of 4936 3168 chrome.exe 77 PID 3168 wrote to memory of 4936 3168 chrome.exe 77 PID 3168 wrote to memory of 4936 3168 chrome.exe 77 PID 3168 wrote to memory of 4936 3168 chrome.exe 77 PID 3168 wrote to memory of 4936 3168 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://usps.uspxstp.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff986439758,0x7ff986439768,0x7ff9864397782⤵PID:800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1504 --field-trial-handle=1744,i,7184492895298551904,10137305000416330197,131072 /prefetch:22⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1744,i,7184492895298551904,10137305000416330197,131072 /prefetch:82⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2100 --field-trial-handle=1744,i,7184492895298551904,10137305000416330197,131072 /prefetch:82⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2624 --field-trial-handle=1744,i,7184492895298551904,10137305000416330197,131072 /prefetch:12⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2640 --field-trial-handle=1744,i,7184492895298551904,10137305000416330197,131072 /prefetch:12⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4860 --field-trial-handle=1744,i,7184492895298551904,10137305000416330197,131072 /prefetch:12⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 --field-trial-handle=1744,i,7184492895298551904,10137305000416330197,131072 /prefetch:82⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4676 --field-trial-handle=1744,i,7184492895298551904,10137305000416330197,131072 /prefetch:82⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
987B
MD5dd10c38ecbaea04a8b5befa92122550f
SHA14c33b8a8d306ced2c8839159b464afd437cce569
SHA2561a42a46d263d882e2aa8af93da37856a3eb8c055b90bedd3d983c5122303b205
SHA512015216c7e176c532881b1317af8df14b9a666d578ddb20605686da813d6802155f33b7d8e2c52718bc195f7baad9e533ebb3f379ae7c091354d3f60de9de4f62
-
Filesize
1KB
MD5de3a5841009e41f2c823fb415261d3b8
SHA1307c5876282a64d2174ffeeeff8ed79a9fcc5239
SHA2561556441a4029c91b658836f6acb964037035f7549743c14684c67e41ce4c0f8c
SHA512978ba127a4692d7cb65f43afa372316a9cd51895c987324e6ca761860b82b6c9a67d01870498dd997685453aa635e037df0951564a71838bb36abcd0426156a0
-
Filesize
5KB
MD56614f2d3d6f1c2e9fac5dc1acded8225
SHA163eae782d7c316d2d7837e70a115f603a55621c3
SHA2560c0c351a8f0fa230cfc82911415a7ef15a43b5a8a76b3a234e028788c899b20f
SHA5120a20f45874086280a74bb057c56732e04e9302336337b8082049a867bc561cb4e236b4dccdc917ffcd26befc79d321297925baee92991d371cf50a29c51b93b5
-
Filesize
5KB
MD58eb2df554e55a5ba7f4373a37028c04e
SHA183a18e4013a2cab6c52f882e1c0f12bc263c34c6
SHA2561b9bc2b1f1a5fdd77dafc2411e0fe02053d72880966ea0f5643cd9e9be744b51
SHA512de2062842f1f0b5668b3e364fdcc3a664090fd025e59baf9c6683c320fc5c947280a013080aa364ae451eb00543f145b4717bace57f9758bf04eaa464900e6f3
-
Filesize
6KB
MD5b3dfb79adf4ee295eec70d7f59ad10f7
SHA187a85f178ba9f25f0fc643ea05db461ef8844d29
SHA2567c922e5b78f41ce0ea65f576c711d8042ac5bb24b60a4c05d2b84f07cf5a4d35
SHA512b6c9d5e7701ed143eaa13a3e1c4cc02cae0172aa1234ca8f8c1c1e0a8ad132c68b7c9695b788326d548c29e394095f7fd90b4fe12ac0da31b8b336b77f5c39f8
-
Filesize
130KB
MD505421650f08048dc9f57d0fe3365630d
SHA1d0d3af5cc625284da168289118198da4bdd8c307
SHA2566599d04ccaa90baaeeabff04bb9015f2a0398feb2c1926c036a3ec3a9e1a7d22
SHA51237e20ead04df887a31a92c93513b489c8fdc504b80015c2f8ec47b7a55a17f00c47a6c59c79846b6b3aa2f3a569fe2ef88ff1b544d61e3e4753466318d9cc4ef
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd