Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2024 03:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://happy-horizons.com/lunch|給食/
Resource
win10v2004-20231215-en
General
-
Target
https://happy-horizons.com/lunch|給食/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133547743590970364" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4968 chrome.exe 4968 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4968 chrome.exe 4968 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4968 wrote to memory of 1740 4968 chrome.exe 84 PID 4968 wrote to memory of 1740 4968 chrome.exe 84 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 660 4968 chrome.exe 87 PID 4968 wrote to memory of 3800 4968 chrome.exe 88 PID 4968 wrote to memory of 3800 4968 chrome.exe 88 PID 4968 wrote to memory of 4616 4968 chrome.exe 89 PID 4968 wrote to memory of 4616 4968 chrome.exe 89 PID 4968 wrote to memory of 4616 4968 chrome.exe 89 PID 4968 wrote to memory of 4616 4968 chrome.exe 89 PID 4968 wrote to memory of 4616 4968 chrome.exe 89 PID 4968 wrote to memory of 4616 4968 chrome.exe 89 PID 4968 wrote to memory of 4616 4968 chrome.exe 89 PID 4968 wrote to memory of 4616 4968 chrome.exe 89 PID 4968 wrote to memory of 4616 4968 chrome.exe 89 PID 4968 wrote to memory of 4616 4968 chrome.exe 89 PID 4968 wrote to memory of 4616 4968 chrome.exe 89 PID 4968 wrote to memory of 4616 4968 chrome.exe 89 PID 4968 wrote to memory of 4616 4968 chrome.exe 89 PID 4968 wrote to memory of 4616 4968 chrome.exe 89 PID 4968 wrote to memory of 4616 4968 chrome.exe 89 PID 4968 wrote to memory of 4616 4968 chrome.exe 89 PID 4968 wrote to memory of 4616 4968 chrome.exe 89 PID 4968 wrote to memory of 4616 4968 chrome.exe 89 PID 4968 wrote to memory of 4616 4968 chrome.exe 89 PID 4968 wrote to memory of 4616 4968 chrome.exe 89 PID 4968 wrote to memory of 4616 4968 chrome.exe 89 PID 4968 wrote to memory of 4616 4968 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://happy-horizons.com/lunch|給食/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc7149758,0x7ffcc7149768,0x7ffcc71497782⤵PID:1740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1692 --field-trial-handle=1852,i,13272712241159565290,13106281841272809475,131072 /prefetch:22⤵PID:660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1852,i,13272712241159565290,13106281841272809475,131072 /prefetch:82⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2180 --field-trial-handle=1852,i,13272712241159565290,13106281841272809475,131072 /prefetch:82⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3144 --field-trial-handle=1852,i,13272712241159565290,13106281841272809475,131072 /prefetch:12⤵PID:3520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3152 --field-trial-handle=1852,i,13272712241159565290,13106281841272809475,131072 /prefetch:12⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 --field-trial-handle=1852,i,13272712241159565290,13106281841272809475,131072 /prefetch:82⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 --field-trial-handle=1852,i,13272712241159565290,13106281841272809475,131072 /prefetch:82⤵PID:1468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1688 --field-trial-handle=1852,i,13272712241159565290,13106281841272809475,131072 /prefetch:22⤵PID:2612
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408B
MD5deb272ad3ff273f014dbc3777888b2bc
SHA1868ff2568bbb12ec6a4fd8223e311fa22a35e610
SHA256354738b26a0d0942c2e501a901cdaf9e9ed7290a8a44dbb2e782a932b7ffe953
SHA5127d06415fde0e86c12f98c8e0a37dbbcdc3c05969d0a1b40698a7f24594323d070113687d12750b009dd783c0e2be3badf2dcd1bbe8e98ec02cef5ff54e2cdfa4
-
Filesize
3KB
MD5b0dd5fe7f98100ea6409863a64682c29
SHA1002de19645522afa5ef1981c62fd268433d8d46e
SHA25672231d4b075dae310d56ca80cd8e14f86df1b9bfe7d6cb7e72a5f86e4d63c101
SHA512b6d3744b3f19c8c9fa915ba82e766c767e913959278142fc593daf23c490d8ec89510a3ac595e066c21259b7c9df9d4b69f9fbfb3a51564aa6811b7c442b2e03
-
Filesize
1KB
MD52aa07c63e01d825b5c44e6b2f65fb320
SHA1a85f65bb7ba9f014b2082d98eeae306bdde450b4
SHA256b8828233b4a459a2254bb15b3c21b4b2342565fee38f0df2250ad9f70e6b0eb1
SHA5129333a7aa8569d5d508ae4c6873b56f677cd731570cfc77c230f77d2a47472f79d499db3bc3f165418a71b279dbce5e7cc44a32ca693a7f9fd52151bd7200a9d4
-
Filesize
873B
MD5f3bfe6dc931b35249c839e7ec0c2d547
SHA15a83b8ec0745aac4a405ce29e227b3b9e23088e1
SHA2561b6f3179c6af1be17cd1ef0ce83e58113e1f00876c892997dfbd694b6a5e46fc
SHA512c4038c8d91c5ae3bc9c7d7cf16937d611d530f2b6b60d7e48735e4b2926e7945ebb80e388226fff4b23b47f4817affa219ffd6cc373104b361636458aadff6f3
-
Filesize
1KB
MD5df0a38cb53e2622c550c952dd490893c
SHA1a46df1bccd2fce537572cdf2517bb0068fc0bbda
SHA25650087d61966e62b1af072b0ac103643c1cb691ebd5fbb213054de0ec204c9237
SHA512aa363c4ea9134b62029dd96b0f943fc0c7a334449b641c5550a23527e35c911d99b149468d7856a405c610482bd1a52fac401d24cae8fb2b4d4b1292b248d395
-
Filesize
6KB
MD52939c6c9933e8d80ed82696def5cf687
SHA15032630e53163efddb3f69b42e5084777e3d231f
SHA256805d3cc1de45d850479e8343f1ed14d7a096933f907f65cc9868bfd7ef0f7eff
SHA5121f58db5b14a9adb5215703000c5fc78aa8b2d02f367f48da189e2d6bdfc73855f85447b370eb560b05cfefd5cdb158458e84a0a00ab862cefc31297c6fd37382
-
Filesize
114KB
MD5986f9abdab2fe053ea226292c75c8010
SHA16a599aa103e34648a9661f26eaa7d1a1acc0e01b
SHA25624e4107a9cf4019c556d113793e8eda7277041258391b86e93c0db3e9f5a8418
SHA51274eaabc32db8a099b6ef9a5c219827ab011c4deab29be7768cd4637ece04669c3db5728728829846f2794955f5c6a174297c9d72820f73d8ded3221a4ea7290c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd