Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 00:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://jsalary-accounting.com
Resource
win10v2004-20240226-en
General
-
Target
http://jsalary-accounting.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133548509448084614" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1716 chrome.exe 1716 chrome.exe 4268 chrome.exe 4268 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1716 wrote to memory of 3148 1716 chrome.exe 88 PID 1716 wrote to memory of 3148 1716 chrome.exe 88 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3300 1716 chrome.exe 90 PID 1716 wrote to memory of 3912 1716 chrome.exe 91 PID 1716 wrote to memory of 3912 1716 chrome.exe 91 PID 1716 wrote to memory of 4088 1716 chrome.exe 92 PID 1716 wrote to memory of 4088 1716 chrome.exe 92 PID 1716 wrote to memory of 4088 1716 chrome.exe 92 PID 1716 wrote to memory of 4088 1716 chrome.exe 92 PID 1716 wrote to memory of 4088 1716 chrome.exe 92 PID 1716 wrote to memory of 4088 1716 chrome.exe 92 PID 1716 wrote to memory of 4088 1716 chrome.exe 92 PID 1716 wrote to memory of 4088 1716 chrome.exe 92 PID 1716 wrote to memory of 4088 1716 chrome.exe 92 PID 1716 wrote to memory of 4088 1716 chrome.exe 92 PID 1716 wrote to memory of 4088 1716 chrome.exe 92 PID 1716 wrote to memory of 4088 1716 chrome.exe 92 PID 1716 wrote to memory of 4088 1716 chrome.exe 92 PID 1716 wrote to memory of 4088 1716 chrome.exe 92 PID 1716 wrote to memory of 4088 1716 chrome.exe 92 PID 1716 wrote to memory of 4088 1716 chrome.exe 92 PID 1716 wrote to memory of 4088 1716 chrome.exe 92 PID 1716 wrote to memory of 4088 1716 chrome.exe 92 PID 1716 wrote to memory of 4088 1716 chrome.exe 92 PID 1716 wrote to memory of 4088 1716 chrome.exe 92 PID 1716 wrote to memory of 4088 1716 chrome.exe 92 PID 1716 wrote to memory of 4088 1716 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://jsalary-accounting.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa3bce9758,0x7ffa3bce9768,0x7ffa3bce97782⤵PID:3148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1888,i,5721271756885756679,12553324470388549537,131072 /prefetch:22⤵PID:3300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2024 --field-trial-handle=1888,i,5721271756885756679,12553324470388549537,131072 /prefetch:82⤵PID:3912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1888,i,5721271756885756679,12553324470388549537,131072 /prefetch:82⤵PID:4088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2932 --field-trial-handle=1888,i,5721271756885756679,12553324470388549537,131072 /prefetch:12⤵PID:400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2940 --field-trial-handle=1888,i,5721271756885756679,12553324470388549537,131072 /prefetch:12⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3748 --field-trial-handle=1888,i,5721271756885756679,12553324470388549537,131072 /prefetch:12⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4696 --field-trial-handle=1888,i,5721271756885756679,12553324470388549537,131072 /prefetch:12⤵PID:4092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3376 --field-trial-handle=1888,i,5721271756885756679,12553324470388549537,131072 /prefetch:82⤵PID:2892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4000 --field-trial-handle=1888,i,5721271756885756679,12553324470388549537,131072 /prefetch:82⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3916 --field-trial-handle=1888,i,5721271756885756679,12553324470388549537,131072 /prefetch:12⤵PID:2520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2276 --field-trial-handle=1888,i,5721271756885756679,12553324470388549537,131072 /prefetch:12⤵PID:3928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2884 --field-trial-handle=1888,i,5721271756885756679,12553324470388549537,131072 /prefetch:12⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3440 --field-trial-handle=1888,i,5721271756885756679,12553324470388549537,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4268
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54ffe64db5c7a369a0e0d6c5a48657ad7
SHA1a872ea871e78fa5b73f83eedeb20833b14052230
SHA256a109383094ef039065105b9e35d97db78f302ec9116dfa91fd5d4109a2872f59
SHA512e66faf6f8144c5f02e19b48a8c6d85a306453ec88fbf8f757bbdb0225a55315f2bdcd9f550be7953b9b7d637fe8758ab62df8d53ab8139792b22c79488534dd2
-
Filesize
6KB
MD5828648780360e0ed171032fc5050df34
SHA199d63a6e9689abc3e636c32243643f7a35cbf498
SHA2564f3b8a0218aaa4608aa1414a4eb8f2446b16cde5096c1b268c941672051b95fe
SHA512a7b0d77e0d1115354ce39f174c79f579baa55779b4dcb68b3fd16c0fca7a350fe08578f3a79bc53bae40c88dcee41f47e8e4546a64cfd1bd8cbf4fbb01a49496
-
Filesize
6KB
MD5fa4c0a15c1fb1143ba7838b1129b783e
SHA1cf86eecc6b3453eafef66c50cce705e411eb08e7
SHA25642be7c35b8e075b8903ccda34a42a9c7c2b16fdca3a66fa42c508f2770adb0da
SHA5122f190ca8831de1283116419a21c1d4dfbea0100318393588b03db8d495972c367815af17b96c9ce4685288c8e4669b8cfb5cd12516afedbf9113724e0aa0fc44
-
Filesize
128KB
MD5d1afa0c5e24761d3ff61c059e7fc439b
SHA15e6c89af11ae1a0a37ca79dfde4b8700b65205fb
SHA256e0c8a5894fd94d0534435f46e88cc91ce0b2a7e3cc779e887a3395ee51c16452
SHA512301f9938d489e56e161776e2493f7729a44bfddcbed2848fdd5fb4bc92ffa0b8a38b3d3fc1143b3f6d7b5f3c482fe076f46a423601c9dbceadfaa7c1a33cd42a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd