Analysis
-
max time kernel
1800s -
max time network
1687s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2024 11:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://fileproposalofficeses.top
Resource
win10v2004-20240226-en
General
-
Target
http://fileproposalofficeses.top
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133548020282696220" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1772 chrome.exe 1772 chrome.exe 2368 chrome.exe 2368 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1772 wrote to memory of 1896 1772 chrome.exe 91 PID 1772 wrote to memory of 1896 1772 chrome.exe 91 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 644 1772 chrome.exe 94 PID 1772 wrote to memory of 4376 1772 chrome.exe 95 PID 1772 wrote to memory of 4376 1772 chrome.exe 95 PID 1772 wrote to memory of 2896 1772 chrome.exe 96 PID 1772 wrote to memory of 2896 1772 chrome.exe 96 PID 1772 wrote to memory of 2896 1772 chrome.exe 96 PID 1772 wrote to memory of 2896 1772 chrome.exe 96 PID 1772 wrote to memory of 2896 1772 chrome.exe 96 PID 1772 wrote to memory of 2896 1772 chrome.exe 96 PID 1772 wrote to memory of 2896 1772 chrome.exe 96 PID 1772 wrote to memory of 2896 1772 chrome.exe 96 PID 1772 wrote to memory of 2896 1772 chrome.exe 96 PID 1772 wrote to memory of 2896 1772 chrome.exe 96 PID 1772 wrote to memory of 2896 1772 chrome.exe 96 PID 1772 wrote to memory of 2896 1772 chrome.exe 96 PID 1772 wrote to memory of 2896 1772 chrome.exe 96 PID 1772 wrote to memory of 2896 1772 chrome.exe 96 PID 1772 wrote to memory of 2896 1772 chrome.exe 96 PID 1772 wrote to memory of 2896 1772 chrome.exe 96 PID 1772 wrote to memory of 2896 1772 chrome.exe 96 PID 1772 wrote to memory of 2896 1772 chrome.exe 96 PID 1772 wrote to memory of 2896 1772 chrome.exe 96 PID 1772 wrote to memory of 2896 1772 chrome.exe 96 PID 1772 wrote to memory of 2896 1772 chrome.exe 96 PID 1772 wrote to memory of 2896 1772 chrome.exe 96
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://fileproposalofficeses.top1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ffc82f19758,0x7ffc82f19768,0x7ffc82f197782⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1576 --field-trial-handle=1876,i,7511299704570187972,4786315444128488406,131072 /prefetch:22⤵PID:644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1876,i,7511299704570187972,4786315444128488406,131072 /prefetch:82⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1876,i,7511299704570187972,4786315444128488406,131072 /prefetch:82⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3088 --field-trial-handle=1876,i,7511299704570187972,4786315444128488406,131072 /prefetch:12⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3156 --field-trial-handle=1876,i,7511299704570187972,4786315444128488406,131072 /prefetch:12⤵PID:3960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4712 --field-trial-handle=1876,i,7511299704570187972,4786315444128488406,131072 /prefetch:12⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5060 --field-trial-handle=1876,i,7511299704570187972,4786315444128488406,131072 /prefetch:12⤵PID:4668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 --field-trial-handle=1876,i,7511299704570187972,4786315444128488406,131072 /prefetch:82⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5496 --field-trial-handle=1876,i,7511299704570187972,4786315444128488406,131072 /prefetch:82⤵PID:3500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4700 --field-trial-handle=1876,i,7511299704570187972,4786315444128488406,131072 /prefetch:12⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4084 --field-trial-handle=1876,i,7511299704570187972,4786315444128488406,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2368
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3624
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3652
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:2644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD59a68d815df2f177215726cc00c54d8fb
SHA10715585bb2d2b10240b843b0653b031b07b1b518
SHA256756d447675e042699ac65ef973e27724545e829f2d1fbf5e66a5bd14320fd216
SHA5120ca9b82a1e2006d962227536dfc4599b96b704ab515e84beddeaad2ac55aa9174bd7fb11d5afe9adfcaeb1f967c55d1bd4c56d84bd2905061690a8982935ab43
-
Filesize
216B
MD5767acaa98537da361e104c773cb40db0
SHA150963eaea04df424af0e9bd7ea1f08f55152815f
SHA25645563c7e7f5d1817ab326558143b977c8763e412c238a3fe55e4fb285ed512ef
SHA512837a957a3e87ef33778fa8869cb158ab986f495bf83d3e539526443d359e8b5124d3ac01ef88b8801ec62438df3dfba1456a6255b77045d1a672309e5b681cdf
-
Filesize
1KB
MD5610ebe5234d32bfffdd67434d51507f6
SHA1ee57dce9437fe7c5eb2c14f58627f448115ca413
SHA256d6c2e08d6aeb328993f0aacf5e9b4fab0032d08beb220f05e8162f2711372b81
SHA512da94f23a8100c1ccc4306608c3da52c6ec31985a1ae8aa642028bf0b297434938d92d5375179d120aba150b85b9955cd3400f9f8b0ba4f35e4ae386639fd8f25
-
Filesize
1KB
MD50dee7ea9ef7ef4597951ce2c17532f23
SHA178644348cdce3b3b0ae3f4a6fda0d1e209131de1
SHA2560ae32a86532710894a05c9b70728ebc853a3ebac979fcde5c85b2934f5665427
SHA512a4e4a695df6f03e6f5dfc31ce4a7b66896f42c8a7541aa722069bd6d4bb549acbfda9183050ff264694c9b4757aaf31ee6d54b9221e769fce3e82a1e45619a05
-
Filesize
537B
MD55db4ab9a78257370565a33d81175287d
SHA1ea048d33fa37948bc095e95646ee67e40b7432a3
SHA256d04147048da83ec3556151c95ff0488a4117409bdddcae6d5f74dc00a9b0abc9
SHA512796dd0f2c7a50de48d9be1ded4ac466723639ef9c88c1f5f261b621d7187a605e6cd348ff9c07bdac1e3a528cd2126493680df5d705305f20643d04c12142aed
-
Filesize
6KB
MD5966dd5e39711443e0d7e38d18fe37a4d
SHA115dc2a5c38bcb6f5de28e6afe667b4f6bafcb4d2
SHA256e286356b49fcf0f4d56dbf2fb78c68b4431f4cce9424e23dda2f01c6fc7cadc1
SHA5125bf995c877639084dc117708ac746393c35777543769182937341babb0c2b22d2f8ab8593f43fb5a5e80cd36f242f16fe6845aec72466f495aac638d4d41acd5
-
Filesize
6KB
MD53ebf264b666db475a147cd71dbe3e43e
SHA1677136d29ef6034359d7b01b94f6ccbfb2975d02
SHA256efc39fb3cae5e489f16d530d21dfc4f4a2794b38f09f3348c4ddcc47a86acdfd
SHA5128d9a337e386e69d8cf755cb3ec67fabd4c75d0438c361102bc1405e1ccd5964d53bea30e76025551cedf64a6f7295de55c38bb0db55b8ade792d57d408de0f6c
-
Filesize
128KB
MD56d43a375bf968d4f27c94e14d731c777
SHA10ed87c114879b2277bfda647e7114328aadbb44e
SHA2567f7a6df4cce532e64339c47e3b167e5274178598edd70f1a9857fda1d6b5e227
SHA512f568ad80e14b9e11e8220e9b1ebe09ee84d0dd22c90f902f1026b863b99732f00daacb5745cb76528be365617043ec2f88ea1798c96aec0a26fbe1f842681048
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd