Analysis
-
max time kernel
300s -
max time network
304s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 12:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.urbanladder.com/
Resource
win10v2004-20240226-en
General
-
Target
https://www.urbanladder.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133546340213606201" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3912 chrome.exe 3912 chrome.exe 2724 chrome.exe 2724 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3912 chrome.exe 3912 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3912 wrote to memory of 1612 3912 chrome.exe 89 PID 3912 wrote to memory of 1612 3912 chrome.exe 89 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 4968 3912 chrome.exe 92 PID 3912 wrote to memory of 2876 3912 chrome.exe 93 PID 3912 wrote to memory of 2876 3912 chrome.exe 93 PID 3912 wrote to memory of 5036 3912 chrome.exe 94 PID 3912 wrote to memory of 5036 3912 chrome.exe 94 PID 3912 wrote to memory of 5036 3912 chrome.exe 94 PID 3912 wrote to memory of 5036 3912 chrome.exe 94 PID 3912 wrote to memory of 5036 3912 chrome.exe 94 PID 3912 wrote to memory of 5036 3912 chrome.exe 94 PID 3912 wrote to memory of 5036 3912 chrome.exe 94 PID 3912 wrote to memory of 5036 3912 chrome.exe 94 PID 3912 wrote to memory of 5036 3912 chrome.exe 94 PID 3912 wrote to memory of 5036 3912 chrome.exe 94 PID 3912 wrote to memory of 5036 3912 chrome.exe 94 PID 3912 wrote to memory of 5036 3912 chrome.exe 94 PID 3912 wrote to memory of 5036 3912 chrome.exe 94 PID 3912 wrote to memory of 5036 3912 chrome.exe 94 PID 3912 wrote to memory of 5036 3912 chrome.exe 94 PID 3912 wrote to memory of 5036 3912 chrome.exe 94 PID 3912 wrote to memory of 5036 3912 chrome.exe 94 PID 3912 wrote to memory of 5036 3912 chrome.exe 94 PID 3912 wrote to memory of 5036 3912 chrome.exe 94 PID 3912 wrote to memory of 5036 3912 chrome.exe 94 PID 3912 wrote to memory of 5036 3912 chrome.exe 94 PID 3912 wrote to memory of 5036 3912 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.urbanladder.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce5c59758,0x7ffce5c59768,0x7ffce5c597782⤵PID:1612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1892,i,2857862970063187329,6967490079849983482,131072 /prefetch:22⤵PID:4968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1892,i,2857862970063187329,6967490079849983482,131072 /prefetch:82⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2172 --field-trial-handle=1892,i,2857862970063187329,6967490079849983482,131072 /prefetch:82⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2956 --field-trial-handle=1892,i,2857862970063187329,6967490079849983482,131072 /prefetch:12⤵PID:1772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2964 --field-trial-handle=1892,i,2857862970063187329,6967490079849983482,131072 /prefetch:12⤵PID:4188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5056 --field-trial-handle=1892,i,2857862970063187329,6967490079849983482,131072 /prefetch:82⤵PID:3516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 --field-trial-handle=1892,i,2857862970063187329,6967490079849983482,131072 /prefetch:82⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3928 --field-trial-handle=1892,i,2857862970063187329,6967490079849983482,131072 /prefetch:82⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3364 --field-trial-handle=1892,i,2857862970063187329,6967490079849983482,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696B
MD57ac27dc925468e3c3cbfd91ac463cc31
SHA1f57514989bd0ddb066ce0457a2b59d6df0a11429
SHA256e1ea395c25edae03d81d4a8192be05ebad0ea43315ad72b7e6cb8626951815bd
SHA51265654b7668582e89382126f4dc42f37ab37aa5a99a7614f5538be07e9a8c7f324cf67b8d9284a3a28f67ea0b230a53a0cc82937c85975c95c18b53d447205916
-
Filesize
4KB
MD501f1fd03c574b2a90b3055b4e06078d7
SHA14491e664975ea5aceeeac897c781185f0be8de65
SHA256e4d8bfa7e4cac6886ee0b2cbdfc7f6ef5cfcc5f80d1a321f682aef5b8ad4c222
SHA5125f0822b6b066b529faba6fe7d600eb4192615227a591a620f531eabc201c978315c2e410b8a411417391346cce8d1a12289118a80d5d95d863751b0f9dab8955
-
Filesize
1KB
MD5bf7b805f53e4ec4711e699a543f1620d
SHA14fee4a43392f04bcb5d76d370e4c5337e8cea066
SHA256f44059fe7ca9491b0cb71e7d071b68d0970104adb6edf2accd4b42596c02fe88
SHA512f6f530ff5f30d7667ab0b8190d9ab76855b6e50658ce964b3ba99c09cf6f242346e2bfff47ecdd4f4ebb1569e6d6dc9f5b6d04f7b4a399892bb035ec2acc5179
-
Filesize
1KB
MD5271c0e49efcd212b4b4a70191dd599d5
SHA190bc3471b90038bc74fc3de7f04209a56f8335a6
SHA25665b0e3bacda3bfd357f54ec8b453050c2125997a623bf318fb3ac44148ab8c66
SHA5122fb5003acda850f67dbd9fa55c57b6b6d8eabcfa0f4231982601d28a6b95cd0d2b546812cc0c8ef90816e13c0b82842e2d788781a4d772fb2dacd49f8c5fbad7
-
Filesize
1KB
MD59876c038a97a52d5c797e35f7a305404
SHA1c93f8551dfdf7a4fc73e123a137ef93f3f222b74
SHA2569312d14fa6a8665f9a4fc1c29f4fdbf6a769cc6dc3d4ca8f79e64515a1c4deb8
SHA51246b67adcd7549a197d82def881d7020ab38bad6f32eb8a7f2f9c0690cd415a8c1041aaf4db45f62d7e502b500fe62810ba1d68541d39d80f4d76002263c4e820
-
Filesize
1KB
MD5dd65795205bbc3bffb2ab8abf2775d58
SHA14f224892601d91fe7e4e670bd8626526048bf602
SHA256f2e8534c15af61d5921860d94053fc1122355340e1e28e69e358646e1b0c3e60
SHA5127c47e6159f4e853b6880d4c73dc06216b96483b2fc693c1f8aea4a24b5875991ce5d30490429309b33bca5a5c5c76ee16a40cd8b09bdc49dbd170c60c4bafcb4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\b913fd86-229d-475c-b185-c6d02f7ab9d3.tmp
Filesize1KB
MD5d09a603314e071687caec77a2b9350ee
SHA1a5e31f6ae7cb9106e3cdc9999f546aa682a1db43
SHA256706d6341736c5b75e9876b166f2e64fe061e891b87261102a3edfe23304f0f95
SHA5120d63468e8ee3dfd42b3645124d9f2c83e217609264b14390aeab2e78fa2f7f2f4851660d33d07f66ce3b16bf6d20893c14788156040de69ddfe1ed96106a6874
-
Filesize
6KB
MD53e72a4b7de143a1f250493738a431ebf
SHA1b6184b4e1be67a019fc9e2c41c5bccbe8aefcebc
SHA256779a594844b0424a0112fb1af0f6ba6dda0457f4cdfa8ffbe2d3e5d3ee592464
SHA512a4e0a374dae75820f46cb4e1cfa020281fd56c4cf4127d27ba4ba2659ed571fe9657b4d594dbb50f826872da558bcbf55f58be5dfdfd238ac74b57951bdba995
-
Filesize
128KB
MD56f92139b897f1bf2c7854f19e4e8121c
SHA114a34e314f264941c755826bddfebfdfb787cb1f
SHA2569556aba7aa0df7d1db03473fd4049b903204192541013337dd7e1b250ff9cb39
SHA5120ab3a241280a4d2e1ed4e7b78350933672e237ee73bf003e73d7234c20edd3885a6ad4f9b81c7d3e9c5ec5a041b9f16ae3d466cb126728ef7c304cd900344f0a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd