Analysis
-
max time kernel
64s -
max time network
63s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
14/03/2024, 13:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ib.adnxs.com/getuid?http://a.dpmsrv.com/dpmpxl/index.php?id=$UID&zn=&sn=&q=xImp&v=1.x&cl=55&pixelIndex=0&r=440828&tzOffset=-480&url=file:///C:/.Garoy/DELETE/Temp/# Cisco Networking Basics_ IP Addressing _ IT Infrastructure Advice, Discussion, Community - Network Computing.html
Resource
win10-20240221-en
General
-
Target
http://ib.adnxs.com/getuid?http://a.dpmsrv.com/dpmpxl/index.php?id=$UID&zn=&sn=&q=xImp&v=1.x&cl=55&pixelIndex=0&r=440828&tzOffset=-480&url=file:///C:/.Garoy/DELETE/Temp/# Cisco Networking Basics_ IP Addressing _ IT Infrastructure Advice, Discussion, Community - Network Computing.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133548970348398401" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4916 chrome.exe 4916 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4916 wrote to memory of 4912 4916 chrome.exe 72 PID 4916 wrote to memory of 4912 4916 chrome.exe 72 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 4672 4916 chrome.exe 74 PID 4916 wrote to memory of 1304 4916 chrome.exe 75 PID 4916 wrote to memory of 1304 4916 chrome.exe 75 PID 4916 wrote to memory of 3868 4916 chrome.exe 76 PID 4916 wrote to memory of 3868 4916 chrome.exe 76 PID 4916 wrote to memory of 3868 4916 chrome.exe 76 PID 4916 wrote to memory of 3868 4916 chrome.exe 76 PID 4916 wrote to memory of 3868 4916 chrome.exe 76 PID 4916 wrote to memory of 3868 4916 chrome.exe 76 PID 4916 wrote to memory of 3868 4916 chrome.exe 76 PID 4916 wrote to memory of 3868 4916 chrome.exe 76 PID 4916 wrote to memory of 3868 4916 chrome.exe 76 PID 4916 wrote to memory of 3868 4916 chrome.exe 76 PID 4916 wrote to memory of 3868 4916 chrome.exe 76 PID 4916 wrote to memory of 3868 4916 chrome.exe 76 PID 4916 wrote to memory of 3868 4916 chrome.exe 76 PID 4916 wrote to memory of 3868 4916 chrome.exe 76 PID 4916 wrote to memory of 3868 4916 chrome.exe 76 PID 4916 wrote to memory of 3868 4916 chrome.exe 76 PID 4916 wrote to memory of 3868 4916 chrome.exe 76 PID 4916 wrote to memory of 3868 4916 chrome.exe 76 PID 4916 wrote to memory of 3868 4916 chrome.exe 76 PID 4916 wrote to memory of 3868 4916 chrome.exe 76 PID 4916 wrote to memory of 3868 4916 chrome.exe 76 PID 4916 wrote to memory of 3868 4916 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://ib.adnxs.com/getuid?http://a.dpmsrv.com/dpmpxl/index.php?id=$UID&zn=&sn=&q=xImp&v=1.x&cl=55&pixelIndex=0&r=440828&tzOffset=-480&url=file:///C:/.Garoy/DELETE/Temp/# Cisco Networking Basics_ IP Addressing _ IT Infrastructure Advice, Discussion, Community - Network Computing.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fff8ded9758,0x7fff8ded9768,0x7fff8ded97782⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1788,i,5998716148124430144,9733574249347760427,131072 /prefetch:22⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1868 --field-trial-handle=1788,i,5998716148124430144,9733574249347760427,131072 /prefetch:82⤵PID:1304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2120 --field-trial-handle=1788,i,5998716148124430144,9733574249347760427,131072 /prefetch:82⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2724 --field-trial-handle=1788,i,5998716148124430144,9733574249347760427,131072 /prefetch:12⤵PID:4264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2732 --field-trial-handle=1788,i,5998716148124430144,9733574249347760427,131072 /prefetch:12⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4484 --field-trial-handle=1788,i,5998716148124430144,9733574249347760427,131072 /prefetch:12⤵PID:784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 --field-trial-handle=1788,i,5998716148124430144,9733574249347760427,131072 /prefetch:82⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3600 --field-trial-handle=1788,i,5998716148124430144,9733574249347760427,131072 /prefetch:82⤵PID:3612
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD587ff10af203cf7173d00698b17fb8a83
SHA1a7ecea918fe96d949a3ca4bca91c51d3670d8794
SHA256c08a4cb8b42a13c7176d1de2da0c8a471c9c5a98149584a1e0184d97dad0a93b
SHA5124240bbd92371745d8bb86a0e05e08874283752530fdd0a6f16e8fefd8a675037f2bb598c47573753f020aa2c9bdb645e27cb07267bcb0f11f0f6f17e5f439bf8
-
Filesize
6KB
MD57b437f7d7f50d39be508d53d45c46e9a
SHA1f36d14c3001eba3236152751908a4c6c4d566cc7
SHA256313baef29418d1b64b7249895c1976a96d034687ba45bf12c7d66db71938ab11
SHA512dd67140cef134cbf8d2cbe03857dd8ae10cdf775da0e7847839929de9ede048d3694b041b1666b75e8f02541e01851e1153f3277d5e72b2d375d9ac1af5afaef
-
Filesize
130KB
MD5bfadc0e4f95ef1142df9c38d1b170442
SHA12b959c32ea5863dd9a3fccbd482644816fd7b15d
SHA256cbaa3ced69bb5edbce44447a256090f1e8df13e65e48d7f580ed873fb7396ec0
SHA512cb6c497968de90f29b615260ba5f6f644c4ecc5094ff7652b28c02e454a96f8a3ac140159449fb1f03e445e57125862938ddfa3f131f45ac1977d2a01736b1f8
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd