Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/03/2024, 13:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://chinadashengbank.co.tz/
Resource
win11-20240221-en
General
-
Target
https://chinadashengbank.co.tz/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133561069887199028" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4088 chrome.exe 4088 chrome.exe 4380 chrome.exe 4380 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4088 chrome.exe 4088 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe Token: SeShutdownPrivilege 4088 chrome.exe Token: SeCreatePagefilePrivilege 4088 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe 4088 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4088 wrote to memory of 4880 4088 chrome.exe 77 PID 4088 wrote to memory of 4880 4088 chrome.exe 77 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 4472 4088 chrome.exe 79 PID 4088 wrote to memory of 2384 4088 chrome.exe 80 PID 4088 wrote to memory of 2384 4088 chrome.exe 80 PID 4088 wrote to memory of 4080 4088 chrome.exe 81 PID 4088 wrote to memory of 4080 4088 chrome.exe 81 PID 4088 wrote to memory of 4080 4088 chrome.exe 81 PID 4088 wrote to memory of 4080 4088 chrome.exe 81 PID 4088 wrote to memory of 4080 4088 chrome.exe 81 PID 4088 wrote to memory of 4080 4088 chrome.exe 81 PID 4088 wrote to memory of 4080 4088 chrome.exe 81 PID 4088 wrote to memory of 4080 4088 chrome.exe 81 PID 4088 wrote to memory of 4080 4088 chrome.exe 81 PID 4088 wrote to memory of 4080 4088 chrome.exe 81 PID 4088 wrote to memory of 4080 4088 chrome.exe 81 PID 4088 wrote to memory of 4080 4088 chrome.exe 81 PID 4088 wrote to memory of 4080 4088 chrome.exe 81 PID 4088 wrote to memory of 4080 4088 chrome.exe 81 PID 4088 wrote to memory of 4080 4088 chrome.exe 81 PID 4088 wrote to memory of 4080 4088 chrome.exe 81 PID 4088 wrote to memory of 4080 4088 chrome.exe 81 PID 4088 wrote to memory of 4080 4088 chrome.exe 81 PID 4088 wrote to memory of 4080 4088 chrome.exe 81 PID 4088 wrote to memory of 4080 4088 chrome.exe 81 PID 4088 wrote to memory of 4080 4088 chrome.exe 81 PID 4088 wrote to memory of 4080 4088 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://chinadashengbank.co.tz/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff989369758,0x7ff989369768,0x7ff9893697782⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1828,i,8352844608577888,730529427019995444,131072 /prefetch:22⤵PID:4472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1828,i,8352844608577888,730529427019995444,131072 /prefetch:82⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2164 --field-trial-handle=1828,i,8352844608577888,730529427019995444,131072 /prefetch:82⤵PID:4080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3084 --field-trial-handle=1828,i,8352844608577888,730529427019995444,131072 /prefetch:12⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3092 --field-trial-handle=1828,i,8352844608577888,730529427019995444,131072 /prefetch:12⤵PID:3384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4560 --field-trial-handle=1828,i,8352844608577888,730529427019995444,131072 /prefetch:82⤵PID:1984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4504 --field-trial-handle=1828,i,8352844608577888,730529427019995444,131072 /prefetch:82⤵PID:3112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2852 --field-trial-handle=1828,i,8352844608577888,730529427019995444,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4380
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5689d5475ebf1daa72a7292888be3042b
SHA14e768ef6a2eec0267594dd6a1fb44fc6a8d4ffcd
SHA25631bd656b19cd9efeb845f172e8e44422452ce56cac8cab4a5eb1e28e599b2035
SHA5124dad5840641af824f83d6d192eb4b3a94d91f7fb2c8674acb4b4a860f0b8614dad2b6b51658ee521f49413bb4f9691dd1e5a56102380a8bdd136597f80b906a8
-
Filesize
1KB
MD5552f063c98d0949a73ec8c6b88812b1f
SHA19d57141849e12a487cae92403bcd8dd8bb50ab42
SHA25667f830dace046ed7eca649e01c04f5d0ad0240deaa93f0ee8e6973627128edfb
SHA512feae4055fa88edbadb66873c9b5118ec207e77d2d5a8ba74cff9b94173c1c8cfb18d78f4fd2a7103a7e7cac45fac4d2ce953f74ea99d74d1bc5fd79ddfd549ef
-
Filesize
1KB
MD5b3b30914f961015c2feb3d41b2dc0661
SHA1e7662620a2b4761d86c0283dbc81657300aca411
SHA2568110a5eaf219a1ef5df1dfff12cf34287f6c10e6b59a3507672e8e851919f67e
SHA512dabb4f32d720054d591012c29dbca92acd8fd66107810d8edc93586ef0339af57ae1ae0a1d8c446042b325e540e8dee598cf3a9b29f2719094abedaaccacc5f1
-
Filesize
537B
MD523d24bfcdf83a9c4f7bff422c75243f2
SHA1753d047054f558a5cc8f7c548037c57eac4758eb
SHA25676548c084130ec06013823fa7fe56f865fe0ed1bfcf4dc70d36e59496246e6bc
SHA51269fdf8941f8e2f06ba14f57538766de7de3bf57fbfa8083781f2af33f7acda7cd1accd759e89857bb78bf34ec4b9dc1da0b9e79205d34ccb92ea8f8a338ebcac
-
Filesize
6KB
MD5b930ed8d489cd7df1ded3f03441ac8ed
SHA1011f235ac0ba1445999c1259f3f82e8f097753e4
SHA2561d24b2ae8c4b25c86abf155d6baa6a3371fed9a27dcaddeba519bbe8182dcd66
SHA5121bbdc50c6b7b51f61af84d6b5f59451a2ebe3e5c2ca9c45faa6b89f93ba13c4383d139a363e52e92ec359c535d32c05f149f787d9112b1aa71e0cba768ee80ab
-
Filesize
6KB
MD5f2aae3d4e53f60665ef830428a5c5049
SHA1d5fd63df605c114f75c37162274b11e7d73fd2e9
SHA256430f253209129d56e8042441b6855a6661914ce56dc7df1afdae4e5dc02b27cf
SHA5129892a3a908605103ef2a35a5a46916ecf5e02da50600428cf1446175c67781d4933a453209daf3f43603cf78a7410ce61e6b2407d08bc39425147cca737633f6
-
Filesize
130KB
MD543c05e564dc70660832b7af1ed98c806
SHA181bc28c1b3dc4cc6f388e7511cfe719ea8ac0770
SHA256eaa25153d7ab97f4b6fc15e61d3034e1e2de03b39c1d346684b850b4c614257a
SHA51295ecf30e6aee0937c24f4fbcef8ee190899809264be9d0977340eea6b48ccbc5f8090ac65dab1379e62cbe0128e56789ebc773ecb54680b78413d827a8d52b53
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd