Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
12/03/2024, 18:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www3.mog-technologies.com/go?s=PYwcD_5I6d-pTw8KLSvinPlffMhcEjGxDcrrfelxurXXkKLSd77Q2n3GNPliiT1rf4DlZuTBTu6nISdXwQ7nHpY8NrYjvqHrm9l8S1wWUC6lHGYXs0XtRO1NfEJE285cPD3LSGEfXjPbgQ==
Resource
win11-20240221-en
General
-
Target
https://www3.mog-technologies.com/go?s=PYwcD_5I6d-pTw8KLSvinPlffMhcEjGxDcrrfelxurXXkKLSd77Q2n3GNPliiT1rf4DlZuTBTu6nISdXwQ7nHpY8NrYjvqHrm9l8S1wWUC6lHGYXs0XtRO1NfEJE285cPD3LSGEfXjPbgQ==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133547414059000249" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2412 chrome.exe 2412 chrome.exe 608 chrome.exe 608 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2412 wrote to memory of 728 2412 chrome.exe 80 PID 2412 wrote to memory of 728 2412 chrome.exe 80 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 3064 2412 chrome.exe 83 PID 2412 wrote to memory of 1304 2412 chrome.exe 84 PID 2412 wrote to memory of 1304 2412 chrome.exe 84 PID 2412 wrote to memory of 3148 2412 chrome.exe 85 PID 2412 wrote to memory of 3148 2412 chrome.exe 85 PID 2412 wrote to memory of 3148 2412 chrome.exe 85 PID 2412 wrote to memory of 3148 2412 chrome.exe 85 PID 2412 wrote to memory of 3148 2412 chrome.exe 85 PID 2412 wrote to memory of 3148 2412 chrome.exe 85 PID 2412 wrote to memory of 3148 2412 chrome.exe 85 PID 2412 wrote to memory of 3148 2412 chrome.exe 85 PID 2412 wrote to memory of 3148 2412 chrome.exe 85 PID 2412 wrote to memory of 3148 2412 chrome.exe 85 PID 2412 wrote to memory of 3148 2412 chrome.exe 85 PID 2412 wrote to memory of 3148 2412 chrome.exe 85 PID 2412 wrote to memory of 3148 2412 chrome.exe 85 PID 2412 wrote to memory of 3148 2412 chrome.exe 85 PID 2412 wrote to memory of 3148 2412 chrome.exe 85 PID 2412 wrote to memory of 3148 2412 chrome.exe 85 PID 2412 wrote to memory of 3148 2412 chrome.exe 85 PID 2412 wrote to memory of 3148 2412 chrome.exe 85 PID 2412 wrote to memory of 3148 2412 chrome.exe 85 PID 2412 wrote to memory of 3148 2412 chrome.exe 85 PID 2412 wrote to memory of 3148 2412 chrome.exe 85 PID 2412 wrote to memory of 3148 2412 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www3.mog-technologies.com/go?s=PYwcD_5I6d-pTw8KLSvinPlffMhcEjGxDcrrfelxurXXkKLSd77Q2n3GNPliiT1rf4DlZuTBTu6nISdXwQ7nHpY8NrYjvqHrm9l8S1wWUC6lHGYXs0XtRO1NfEJE285cPD3LSGEfXjPbgQ==1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff892ed9758,0x7ff892ed9768,0x7ff892ed97782⤵PID:728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1772,i,13970775555891053074,1472258693590500875,131072 /prefetch:22⤵PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1772,i,13970775555891053074,1472258693590500875,131072 /prefetch:82⤵PID:1304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2176 --field-trial-handle=1772,i,13970775555891053074,1472258693590500875,131072 /prefetch:82⤵PID:3148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2984 --field-trial-handle=1772,i,13970775555891053074,1472258693590500875,131072 /prefetch:12⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3012 --field-trial-handle=1772,i,13970775555891053074,1472258693590500875,131072 /prefetch:12⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=5052 --field-trial-handle=1772,i,13970775555891053074,1472258693590500875,131072 /prefetch:12⤵PID:4752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 --field-trial-handle=1772,i,13970775555891053074,1472258693590500875,131072 /prefetch:82⤵PID:508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4840 --field-trial-handle=1772,i,13970775555891053074,1472258693590500875,131072 /prefetch:82⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3796 --field-trial-handle=1772,i,13970775555891053074,1472258693590500875,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:608
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
576B
MD507b9074dac5888fd2838c44f23b550ce
SHA1e022d1e09ab2a68e1aff185758d5fb34279702cb
SHA2566d10356668ea7359e699b9dc0f98eb155cfbb96ec8770025914ce50ca912c58a
SHA512ab5b1b3a23e9d19fa92d9f5ade89c390d973e7fee00da757c67afbd7e2eb1a1100d565fc2752f76cb179efb9e8e9c151316a1ad78f1f816c9b108e12ea7cdcb4
-
Filesize
600B
MD5c058c9f2277a94517a2e4dd6284c1d80
SHA108930cef555235498478d3c5dbce67d1c494defe
SHA2567326240db2136317443811350d5fc5c4a70b066a2fad8aa57d538390182d408f
SHA5127afd46156b13819c958a0604978270620063e9e9d49f95ab154df94e1289b375b4e28aec64b0ce9a0a28c9924673e7c3a008c0bcb03e87cac882904bd8f47b7c
-
Filesize
4KB
MD5a7a8c204eaf67b8ccdda78632d26e9c1
SHA124908ea12ce4dd1ba13091c24e39df9401f12246
SHA25630255c3c621cb31c666276e745e4843cb4e7c1b2d28990b7a37064b1cc258478
SHA512075179a0330e6ec90975b4637b4b988eb22e71e819e4f6fd842d6fddc0c20c0b21a2a26269dd2472207253fe30e226d446b56424babe49507e1996dc9ae58872
-
Filesize
4KB
MD5bbf97086bb49c970b5302c1953d25280
SHA17b4c4627a6b2e9e5b9f3dea51e4896c8a0dc1dbd
SHA256698f0af0cf8970862c54f3373f925ca59fe6d5cdace34e7b96dff92396442a48
SHA51274ed4706c5f727747de00f3d151e75f2f395aacc3c90166fb001f8ab7dcfa4ea6a6b3bb34716203adace3a2f74e7d92ffa60b6e259ccdda926105cc6fd14f075
-
Filesize
1KB
MD56a5befbafc2e3998b492f2bc15727e25
SHA1f690f15958986cb96a43ae6f6813e3018894bcdc
SHA2563a85dd4ed840b75a0587913916d93117eeb6b302d928b47d39ed3e7277d7df48
SHA51270a26443beefdfa0eeaa32106bf9bd9a67e8ceef4c110d6bf8ce2a28b3fd777a264c31a477e99db7e552bce14776c089a7613f5b0f410097a4adf781f3b678fc
-
Filesize
1KB
MD5e09f9e7ffdf920f38c27212356feb6c4
SHA1baa302f4fdf19c52ad0ead382b01c64c07a7e28b
SHA2566fc4598ca6f188df44aaf665be68c09742bd188072871281aad918dae2c6ad4a
SHA51264f9be6a3770a2a18d74db92346c84f98a7b56f08dd6e00b5736611b8e33515831d0eb11aa15a63cf774aa0a190977a6093dc590f585bfdf22fd4b99d4622dfc
-
Filesize
6KB
MD50ec82dcb036a911d8f873010a2f94936
SHA11a3fe137875c33a221fd27c39dfcf67a5acc61d1
SHA256afbbe002168ca52e5d6431685da7f1ea2942802813955789f48974fd93378263
SHA5124979fc520fdbaeaf84afc045541f2027b8f2d576fe34a764ac0d9f15dd4e2ef0e1a06ed2ce68e195725e75a218ff2d2eb61a0b86971b4ccd929dacf898d5ff85
-
Filesize
6KB
MD5247bcca9bb98525b7587f739c90641ea
SHA1b49f467ac1aad0a9da67768b316f633ad16d3c93
SHA2560e1fd7b6af2913f128a264b39675146166354fed43c22daf789945293202a7ac
SHA512e5a357902d41510a555c18f6b3037b75779ab7244eccabe40ad9eda9a06df1a0d97dea32f84f873dc3886e3f839fc7adb393364e1cab93f5abc4b8bff384542b
-
Filesize
6KB
MD51e3905c4c0df72323cf297d8eab04d3e
SHA192c13a41c1b5ac3d6e81ffdf2d1ab056ec266036
SHA25650392e315e5435e4fdbc1f696a3349a63f49361e89da3f7384b99c0444ddda64
SHA51285e21840c0aa05c1d18896f59443fa4975df40dd813f042248e5573b5725696c1005e969741ff738b4929ed0cc400c06de1e90106daa5c3b1eb3c5f5bc5b9717
-
Filesize
130KB
MD52b27241aa2e725db2c160397290f64dd
SHA10f392c32f7465f6e94f985c9367d6ec88688aba4
SHA2563880c54c0be44ab46fef5ea81eef04c677df9acf82bfe15dc726b405a49a34c8
SHA512c5926e760fe42c958fb892996b6694d6c912b507b14d2096103c7957e74618a1ea60bd473def81034c7119b6c37aecb9af82916dd0bd9bb8de1adba6832dbf0e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd