Analysis
-
max time kernel
180s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 18:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://perfectdatasoftware.com/
Resource
win10v2004-20240226-en
General
-
Target
https://perfectdatasoftware.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133543090645792743" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2624 chrome.exe 2624 chrome.exe 3252 chrome.exe 3252 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2624 chrome.exe 2624 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2380 2624 chrome.exe 94 PID 2624 wrote to memory of 2380 2624 chrome.exe 94 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 1248 2624 chrome.exe 96 PID 2624 wrote to memory of 4288 2624 chrome.exe 97 PID 2624 wrote to memory of 4288 2624 chrome.exe 97 PID 2624 wrote to memory of 896 2624 chrome.exe 98 PID 2624 wrote to memory of 896 2624 chrome.exe 98 PID 2624 wrote to memory of 896 2624 chrome.exe 98 PID 2624 wrote to memory of 896 2624 chrome.exe 98 PID 2624 wrote to memory of 896 2624 chrome.exe 98 PID 2624 wrote to memory of 896 2624 chrome.exe 98 PID 2624 wrote to memory of 896 2624 chrome.exe 98 PID 2624 wrote to memory of 896 2624 chrome.exe 98 PID 2624 wrote to memory of 896 2624 chrome.exe 98 PID 2624 wrote to memory of 896 2624 chrome.exe 98 PID 2624 wrote to memory of 896 2624 chrome.exe 98 PID 2624 wrote to memory of 896 2624 chrome.exe 98 PID 2624 wrote to memory of 896 2624 chrome.exe 98 PID 2624 wrote to memory of 896 2624 chrome.exe 98 PID 2624 wrote to memory of 896 2624 chrome.exe 98 PID 2624 wrote to memory of 896 2624 chrome.exe 98 PID 2624 wrote to memory of 896 2624 chrome.exe 98 PID 2624 wrote to memory of 896 2624 chrome.exe 98 PID 2624 wrote to memory of 896 2624 chrome.exe 98 PID 2624 wrote to memory of 896 2624 chrome.exe 98 PID 2624 wrote to memory of 896 2624 chrome.exe 98 PID 2624 wrote to memory of 896 2624 chrome.exe 98
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://perfectdatasoftware.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeab6d9758,0x7ffeab6d9768,0x7ffeab6d97782⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1888,i,14664142180097081571,3647933838502057951,131072 /prefetch:22⤵PID:1248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1888,i,14664142180097081571,3647933838502057951,131072 /prefetch:82⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1888,i,14664142180097081571,3647933838502057951,131072 /prefetch:82⤵PID:896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1828 --field-trial-handle=1888,i,14664142180097081571,3647933838502057951,131072 /prefetch:12⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3104 --field-trial-handle=1888,i,14664142180097081571,3647933838502057951,131072 /prefetch:12⤵PID:3716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 --field-trial-handle=1888,i,14664142180097081571,3647933838502057951,131072 /prefetch:82⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 --field-trial-handle=1888,i,14664142180097081571,3647933838502057951,131072 /prefetch:82⤵PID:4784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3488 --field-trial-handle=1888,i,14664142180097081571,3647933838502057951,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3252
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4820
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2136 --field-trial-handle=2588,i,4353937220825226770,7138584070663735671,262144 --variations-seed-version /prefetch:81⤵PID:4820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5a5f597b6e3f7b6a51a8c962fc9e9fabb
SHA1a5f01f1b24716c1c84ba877807c4c5c3d353ea3c
SHA25676abc4a29c5dc28fa116991fe90c3a1af53a6969b73b4d121692e76ebe455ba3
SHA51270192a4b50aadcaaca8431442ae5751fdf76d171cb06e7d3898099d2251aa079bdaf7eacdf4e76a9b54fe4e839a278388e62feaaf0f888a04bfe15636071b0aa
-
Filesize
1KB
MD569f94c4897790ea426bfbd8a1337f096
SHA1cfaa5045d6bfc24117694aa9c1b9480f342b1cee
SHA2567e628ff3b895ad4902cc8efb0b9cb105c023cb4da3f2860b945d072a208c527a
SHA5125ba3fdf8bccd7504152be7c79cfa18756abb80688df782ce8b898907773211cf6ab44a570967b86f746af6816bc23cd4fd42c23a685e94633670d3ca08053930
-
Filesize
1KB
MD511eb695750b2d911c089a13c17a2e5bb
SHA1c990c9d68a7e70ceed811aa2c16b13e730646452
SHA2565ce7f571c9a511f74f71526c35fb2bf1d7355b8fe29ab80a85e8d8cecd5826ff
SHA5128873c133f9d760b5e4c0aa3f80c7b181944e654896bc0d5c0c69dad9d3e8102bf522b441906db57e1f6e9d616303fb888f8558229725f13b7da3067e2cd90926
-
Filesize
6KB
MD58747ed1cd0e172e84cbedb1cde4a6dad
SHA1c15da48e909f9a8410013b76ad0cd2aec24b8f09
SHA2564e347e0990ac5394c6a7d274b8235171b0fe900b8c0432950bc52897636bdf55
SHA5125b2e93e4afdb5666e1690ccd6b58600832360da6c4fb888348589318130d39630af12f12eb19cf93f43dd35710ff7c4351c9a5fd64411c96f6a54cf27cb5bfd5
-
Filesize
253KB
MD5e9cf44d29ad5f7c8477af642d9d93b2c
SHA1d486e25b5d1ec3a9a52600dd61e35eaa6cfa8196
SHA256d0f439a6381552bedbea86fe5e6cb5d4d0d7a76b8c6c8def1d8a4c077d27cddc
SHA5127a898771f75db3af0acc4324799e50a6d5b44b281caa037d6f64e5ffaa494b75faa3ad3dfb8386ba7c54b0214f2e215791963cfd1677b9cc54f90a6619111fd2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd