Analysis
-
max time kernel
316s -
max time network
335s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 14:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://financing.eportaldirect.com/
Resource
win10v2004-20240226-en
General
-
Target
https://financing.eportaldirect.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133548124286981233" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe 3156 chrome.exe 3156 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2900 wrote to memory of 1300 2900 chrome.exe 89 PID 2900 wrote to memory of 1300 2900 chrome.exe 89 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 4956 2900 chrome.exe 91 PID 2900 wrote to memory of 544 2900 chrome.exe 92 PID 2900 wrote to memory of 544 2900 chrome.exe 92 PID 2900 wrote to memory of 1392 2900 chrome.exe 93 PID 2900 wrote to memory of 1392 2900 chrome.exe 93 PID 2900 wrote to memory of 1392 2900 chrome.exe 93 PID 2900 wrote to memory of 1392 2900 chrome.exe 93 PID 2900 wrote to memory of 1392 2900 chrome.exe 93 PID 2900 wrote to memory of 1392 2900 chrome.exe 93 PID 2900 wrote to memory of 1392 2900 chrome.exe 93 PID 2900 wrote to memory of 1392 2900 chrome.exe 93 PID 2900 wrote to memory of 1392 2900 chrome.exe 93 PID 2900 wrote to memory of 1392 2900 chrome.exe 93 PID 2900 wrote to memory of 1392 2900 chrome.exe 93 PID 2900 wrote to memory of 1392 2900 chrome.exe 93 PID 2900 wrote to memory of 1392 2900 chrome.exe 93 PID 2900 wrote to memory of 1392 2900 chrome.exe 93 PID 2900 wrote to memory of 1392 2900 chrome.exe 93 PID 2900 wrote to memory of 1392 2900 chrome.exe 93 PID 2900 wrote to memory of 1392 2900 chrome.exe 93 PID 2900 wrote to memory of 1392 2900 chrome.exe 93 PID 2900 wrote to memory of 1392 2900 chrome.exe 93 PID 2900 wrote to memory of 1392 2900 chrome.exe 93 PID 2900 wrote to memory of 1392 2900 chrome.exe 93 PID 2900 wrote to memory of 1392 2900 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://financing.eportaldirect.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff867319758,0x7ff867319768,0x7ff8673197782⤵PID:1300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1884,i,10611029901024451122,17261367800928506257,131072 /prefetch:22⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1884,i,10611029901024451122,17261367800928506257,131072 /prefetch:82⤵PID:544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1884,i,10611029901024451122,17261367800928506257,131072 /prefetch:82⤵PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2900 --field-trial-handle=1884,i,10611029901024451122,17261367800928506257,131072 /prefetch:12⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2916 --field-trial-handle=1884,i,10611029901024451122,17261367800928506257,131072 /prefetch:12⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 --field-trial-handle=1884,i,10611029901024451122,17261367800928506257,131072 /prefetch:82⤵PID:2636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 --field-trial-handle=1884,i,10611029901024451122,17261367800928506257,131072 /prefetch:82⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1836 --field-trial-handle=1884,i,10611029901024451122,17261367800928506257,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3156
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD5bf3fc0da160475adb27301a9fc170d02
SHA15204517f3ecc2ccd3af384af1f1d5e53400e9f28
SHA2568a52fded02d2b4c6a22aeebab2505eeb3e563395f9a6e9768fdc7a111300db31
SHA5129347e4581ab6c0dc03fc7063a685723103e847aebcbadfa2a0385d35fe382a2b016f247a526b0f0eb9a9b5601114e60daaa652cf185b5da544591c549fe9ee50
-
Filesize
1KB
MD55a00ef29b89aee4066c66a034fc9e91e
SHA1aabd05189c5daea1b4053368545c3c34d862de9b
SHA256e8ef01a4bdd5640951001b5ee1b73c22ea4dac5bd1d70d8fe12dea14dd5dbead
SHA51272af1bb5a7e3074081bd27f9c72e5dc60b9684cb05b421ce182bd4879f69955359804bf83b63856d9d0863636684fbceeedbd686590c9d05da2bf166881c176b
-
Filesize
1KB
MD50743a5c05feaf8e899103ca75f44e29c
SHA1bba2578ae5e0da15abcb425db50e4e8d9cbee342
SHA256479db691d4db210f5bb503421dea75fb2746971a3e5a725969ee794179b24552
SHA512a23c622c156b709e7d87dacab76c046082aa8aae934bb9525928589dfb74451bb019163d119f32d4b2425161871f1c7bdf1f8df3a9a2ce89d70bf71a8d250c8e
-
Filesize
536B
MD5f860ba4eaf0fed2f0b68fd5cfeaaa366
SHA1afe274887049e34d82cb18387cf1cea7f6f61a1b
SHA2560920f78525cf57ad85e8283729736bf756d77f4d00e2cdf1de5dba173021f44c
SHA5120a824c32f04bdf59976a4b576ad7a68a49c5acefa27d1c775e6dd2c765b677286b056d7a86603bac3d3b40654c0927c4b1a2091a3aea211056693e3af73ae112
-
Filesize
6KB
MD5def0323878067a44f9f73ce9d25f9207
SHA17cb4d5a80186e5d7e0ba55c7ed95e6443846cace
SHA2569146cbe0a6c26c6fc3b54e7831e857272f380f834ccc42fe7d2bdaa9616d79c5
SHA512678146f69dd9d4c6d047d2f38d8f6a6be9ac9aebf9a115b53fc9dcc575847abce7d3a38ecabc73f4af2b78a795e361ce9bcfa4cb055332a8ab8a7ac99020e603
-
Filesize
128KB
MD5e15710426ddb2006786087e1641d88e6
SHA15acba323604364d7990e7239160c7fd72d5f5363
SHA256753d77261c69104fa21e90f4cf0dbe7ffc149fe9741b83171132ac72335d0259
SHA512b05f3e2a61456e31c92fe826fa4c59966caa5dc2930ed8e59ffd8a6ad971b3134bc9399d017bf68d95ee05396b3746fcd1c62681d156f8392c6d835719155762
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd