Analysis
-
max time kernel
568s -
max time network
569s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
04-04-2024 21:21
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.teclub.org.tw/1z2a4e/#dGVzdDExMUBnbWFpbC5jb20=
Resource
win10-20240404-en
General
-
Target
https://www.teclub.org.tw/1z2a4e/#dGVzdDExMUBnbWFpbC5jb20=
Malware Config
Signatures
-
Blocklisted process makes network request 36 IoCs
flow pid Process 68 2904 WScript.exe 72 2628 WScript.exe 73 2904 WScript.exe 74 2628 WScript.exe 76 2904 WScript.exe 77 2628 WScript.exe 78 2904 WScript.exe 79 2628 WScript.exe 80 2904 WScript.exe 81 2628 WScript.exe 82 2904 WScript.exe 83 2628 WScript.exe 84 2904 WScript.exe 86 2628 WScript.exe 87 2904 WScript.exe 88 2628 WScript.exe 92 2904 WScript.exe 93 2628 WScript.exe 94 2904 WScript.exe 95 2628 WScript.exe 96 2904 WScript.exe 98 2628 WScript.exe 99 2904 WScript.exe 100 2628 WScript.exe 101 2904 WScript.exe 102 2628 WScript.exe 103 2904 WScript.exe 104 2628 WScript.exe 105 2904 WScript.exe 107 2628 WScript.exe 117 2904 WScript.exe 118 2628 WScript.exe 119 2904 WScript.exe 120 2628 WScript.exe 121 2904 WScript.exe 122 2628 WScript.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Docu_Sign021004.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Docu_Sign021004.js WScript.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\docu_sign021004.js taskmgr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Run\5TJJF2Z3XN = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Docu_Sign021004.js\"" WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Run\5TJJF2Z3XN = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Docu_Sign021004.js\"" WScript.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 15 cloudflare-ipfs.com 16 cloudflare-ipfs.com 17 cloudflare-ipfs.com 108 cloudflare-ipfs.com -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\services.msc mmc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4416 schtasks.exe 2400 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings taskmgr.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4732 Notepad.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2908 chrome.exe 2908 chrome.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 192 chrome.exe 192 chrome.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4808 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe Token: SeShutdownPrivilege 2908 chrome.exe Token: SeCreatePagefilePrivilege 2908 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 2908 chrome.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe 4808 taskmgr.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1104 mmc.exe 1104 mmc.exe 1104 mmc.exe 1104 mmc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2908 wrote to memory of 4376 2908 chrome.exe 73 PID 2908 wrote to memory of 4376 2908 chrome.exe 73 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 3264 2908 chrome.exe 75 PID 2908 wrote to memory of 656 2908 chrome.exe 76 PID 2908 wrote to memory of 656 2908 chrome.exe 76 PID 2908 wrote to memory of 916 2908 chrome.exe 77 PID 2908 wrote to memory of 916 2908 chrome.exe 77 PID 2908 wrote to memory of 916 2908 chrome.exe 77 PID 2908 wrote to memory of 916 2908 chrome.exe 77 PID 2908 wrote to memory of 916 2908 chrome.exe 77 PID 2908 wrote to memory of 916 2908 chrome.exe 77 PID 2908 wrote to memory of 916 2908 chrome.exe 77 PID 2908 wrote to memory of 916 2908 chrome.exe 77 PID 2908 wrote to memory of 916 2908 chrome.exe 77 PID 2908 wrote to memory of 916 2908 chrome.exe 77 PID 2908 wrote to memory of 916 2908 chrome.exe 77 PID 2908 wrote to memory of 916 2908 chrome.exe 77 PID 2908 wrote to memory of 916 2908 chrome.exe 77 PID 2908 wrote to memory of 916 2908 chrome.exe 77 PID 2908 wrote to memory of 916 2908 chrome.exe 77 PID 2908 wrote to memory of 916 2908 chrome.exe 77 PID 2908 wrote to memory of 916 2908 chrome.exe 77 PID 2908 wrote to memory of 916 2908 chrome.exe 77 PID 2908 wrote to memory of 916 2908 chrome.exe 77 PID 2908 wrote to memory of 916 2908 chrome.exe 77 PID 2908 wrote to memory of 916 2908 chrome.exe 77 PID 2908 wrote to memory of 916 2908 chrome.exe 77 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.teclub.org.tw/1z2a4e/#dGVzdDExMUBnbWFpbC5jb20=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffa02be9758,0x7ffa02be9768,0x7ffa02be97782⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1808,i,6478268250390964050,14248604234715277458,131072 /prefetch:22⤵PID:3264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1792 --field-trial-handle=1808,i,6478268250390964050,14248604234715277458,131072 /prefetch:82⤵PID:656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 --field-trial-handle=1808,i,6478268250390964050,14248604234715277458,131072 /prefetch:82⤵PID:916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2940 --field-trial-handle=1808,i,6478268250390964050,14248604234715277458,131072 /prefetch:12⤵PID:508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1808,i,6478268250390964050,14248604234715277458,131072 /prefetch:12⤵PID:1404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 --field-trial-handle=1808,i,6478268250390964050,14248604234715277458,131072 /prefetch:82⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4572 --field-trial-handle=1808,i,6478268250390964050,14248604234715277458,131072 /prefetch:82⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4592 --field-trial-handle=1808,i,6478268250390964050,14248604234715277458,131072 /prefetch:12⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4436 --field-trial-handle=1808,i,6478268250390964050,14248604234715277458,131072 /prefetch:82⤵PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3192 --field-trial-handle=1808,i,6478268250390964050,14248604234715277458,131072 /prefetch:12⤵PID:4468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 --field-trial-handle=1808,i,6478268250390964050,14248604234715277458,131072 /prefetch:82⤵PID:4260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5672 --field-trial-handle=1808,i,6478268250390964050,14248604234715277458,131072 /prefetch:82⤵PID:3576
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\Docu_Sign021004.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:2904 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\Docu_Sign021004.js3⤵
- Creates scheduled task(s)
PID:4416
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\Docu_Sign021004.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:2628 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\Docu_Sign021004.js3⤵
- Creates scheduled task(s)
PID:2400
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4676 --field-trial-handle=1808,i,6478268250390964050,14248604234715277458,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2584 --field-trial-handle=1808,i,6478268250390964050,14248604234715277458,131072 /prefetch:12⤵PID:784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=848 --field-trial-handle=1808,i,6478268250390964050,14248604234715277458,131072 /prefetch:12⤵PID:2944
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2692
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops startup file
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4808 -
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"2⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1104
-
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\5156788b9a0641d3a747fba2fe3c2b96 /t 1888 /p 11041⤵PID:4288
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4320
-
C:\Windows\System32\Notepad.exe"C:\Windows\System32\Notepad.exe" C:\Users\Admin\Downloads\Docu_Sign021004.js1⤵
- Opens file in notepad (likely ransom note)
PID:4732
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD5013db403c7778342a1fce09988d22bde
SHA1415da9f2abc53ccfce457b643a373d019f65f46e
SHA256e8c2722060eccdfd44610dccadad3f241b20b8a8fba9cfad56bae18b872ba947
SHA5129f0465800bbfcc5dcfc5905c57446a4101812ed148fd2dcda2c78a2872a39f06f83f2110bb56df6e65862fd5688abf2e143d44bef1c708a751d0637b57fe1cd1
-
Filesize
1018B
MD59463806b9327c06f8b280e1acee786ee
SHA1f62112b7f46a6d1681c9e422a3889219f8ea6bcc
SHA2566b850a7beb4ab424cfc79d0322bb47407d2bfd19cffd9dfeb0f93ab301705d47
SHA51207abf55ca5026bd169681f9a31d077af4a8120f2834c6058a9920417fd6757dd8808b20fea1734c953eb9e698aed785b2008cdf35a8406c6b8b2db6cbea37103
-
Filesize
3KB
MD537924a8e134f1af9d50feb3a17911a66
SHA1fa2ba12d6064f56791f134bed02921dbb39a514a
SHA256f9bdee8a50266e37dcf071d13ec75a77401b02ac1ce4bc90b44a8c9d270f9545
SHA51265463492bf21dca228ed2c682df26d422e949fab8905f46ae79d460d7f1c3067451327cf2bd75c295139c8b59e67cddd6d058a89c7878c599b4c3313d7ddcad7
-
Filesize
2KB
MD53d780a63c697066e231f3b06e25b71a6
SHA1259ed67b2b7ba541a2fa23e64f2247cb8b1a644a
SHA25695577ee3eac0873cfd5949d3611e7e7deb53a8045a3f5ccac327f9e1b3cdd4ee
SHA51299c2f31cda384e4072deda3792b070d0dc4a57951e7f5b0102e09cd875b0d33426eb494e4d709a541d42ee985fc05d94171138efef426419f0be5569b37fd1dd
-
Filesize
3KB
MD5f80954b0591c381a3e50206b71df91e8
SHA1b0d191b96c0a07344f49f4299bee7a2a15b49a78
SHA256e9697cf9e57cdcff8f3ef23db6462e8dae944fe27dfa65a533897f53607140f1
SHA512a979793904c6159d4fe3fd57430e1d0492587e127949b6141c55576251f0be1625ba30f79c79dc0c066ff33b51afac77a9fb86754756ab1d5a131b8d430a6dbb
-
Filesize
537B
MD555ee4f61ddafd99931e4e743acfa363e
SHA197360fe64e432e2ae4eae62d85332af39c024846
SHA256b9c1df2d7988dd15e197fe4bbf265a0aacadac13b14f4cda540264fb8808b268
SHA512f699385fc7866be7bbfcca62641c97acec8a88a93b7e3eacc12b20efa1d08b7ec14a46345d562181d3a56d831a03aaf736481828f44d584713f3208a68c56469
-
Filesize
872B
MD53a076b4cee8cb5e016c0773e17acc561
SHA1729461736cf2888b96584e5da0d50641f3c73c0a
SHA2565a5c20ecec7a26ae3f2f386e4213b3d464e10e11cbcd49b70fa4071bc7e9ef91
SHA5124ad8e8666d952da7a3aa1b24f9368333908b9734fbcd73464fb038826d83960db354412cf302aeebee64b0e1fc1aaa8dabcb0f600761ce7d501cab676500733d
-
Filesize
6KB
MD5bf74ff82aa2db5b53d5195244b0266cb
SHA169175fb1cf62c878f8413232ec2d98c3436e76e6
SHA256c975e4a29c13931d352ec9d2fd0c75841fa27bc11a7fe82dc12c4e6e6fdb3ae0
SHA51280417b3a53fbcc5beb5170b785a1f75a7fbf458a30e5a6706f476df99d13cfa90634cedf0417c1d13306459eed882b82bd3ee7118f9f5e76992d0a2fc57afa33
-
Filesize
6KB
MD577f72da3f10d3197aef07527eeaf25a3
SHA1d26b0e43d5a2f20135bd4f5fc4654c02f030fee2
SHA2569fb841a3ee906d7f88957b53848b6a50ff21f2bdef94021314b92f35c630dde4
SHA5124fcb2d26e5e166b4a1b75e07372b29ca1d07fb47b237a4059510a44a0190318632f2094b9176c80b3d084eae4fbb7efaf8cfcd06ef4235e64c9a447bf1760f1a
-
Filesize
6KB
MD515286cb3e3f2afb4dc6629d3a711d9fd
SHA1cb6c43cfbe3f3381fcb4194f2983e1a19b21b40a
SHA25614294c8dee8218e77ff056555e52e5fb34015817be53908681eadcff08a6da21
SHA5125f7356705b413887224b9915c7afac892aaadccc6f68ed037cd2ffdf8f9c4af64d77f25fda5c1f97888aa4f1036d686e379feea33fd43edd80e6ca8d754ab4de
-
Filesize
6KB
MD5aeeef582a5fbeeb93a4ba7f7f68de304
SHA17657769a7ef78e0181d8adb711b6272ad8746caf
SHA25687486ebac904c4f33318ec9d2e98c852a564265ab67f315830fb3a50dd140595
SHA51219c49b62d1ef8593880c77722be9cd4027ba56fb4617bec2c2f44cf6fb7f3ea8baee1a05c2067daa1569e48423a0ace0018ace5f162647c917f2ee7f4a23566c
-
Filesize
7KB
MD53e6290f4c66ee099941c369e54ae0a48
SHA109c27f8ec9e29ef15f125a8440abb72557bb6950
SHA2565b1a5aa94a2e377477363ffbed97fb25bfa903f70401ef1b8d33b9a854a3b704
SHA512224ff30ae3c859fceab10244800014dd75c85454712ed6c4fb404d51f43f9e2ba402208ea4615d81522bdbecf78eceeb5b5f47a39c75c5ceec56315d7844f2ca
-
Filesize
5KB
MD50273ba93be299a2a00eb39d812bfc1d8
SHA111b2d714a72ccd44f24ab752c4acdb13a1ae4339
SHA25604ef7f4a442f9271c78d43d6cfac24741291982e97e35a3d5b9d39381ed8ea95
SHA512dd453a858b8f8ac61e3089d3a52c943f0809581cbe45d8bf2588698227b7c90427eb9a2554305c055bad51512a8046b3a86410ddeaf3542ac38ff646a93a86a8
-
Filesize
136KB
MD5b02e0bef9b82d16b5b2ebc7205f2690c
SHA1b6f101084d0081ee7845c349600183b711efdc2d
SHA2562ac4fedfa2fe6de147db1cbe5e481b6a4b383e62e247cedd866419f1db36920f
SHA5127784994590668f50ed4902dd75c2a6df53e28b372107a0087eb01dcf0c7ce59fa6cdd7828296cb3ce22c066059d6f5deb3a4c62c7eec15bcd6337958faf2bb7f
-
Filesize
136KB
MD5b5937c29e2f52bc185f611087e7575a9
SHA105a05ac371027d15a6a2be0d19bd88e72974df85
SHA2567ea5e350f144064d1e76db1419246eed96cd7094eed071f62c8fb6375a9c739f
SHA51203ab8a570db2f1ee5d6282631ff855584f8a9fd155af648e2b309b9a34c133b65aed2900e387ae6fb88ebf98b00b214bb365169119b3fd6fd69043882d0760ee
-
Filesize
136KB
MD523c617470096bd58872d39a90760c7c6
SHA1e3fa9fe929d2908fa0d15cfc1b5a40cca044e269
SHA2561319767770a0832d07ac778aa9a0f13f6319ae3c177e3b503f64d6777332f7e3
SHA512fcb25362e51f4b5fdcaac54e239c738dab91eca8f786536c2106e17d5ed4cca276f211c5b61bdf8b93f33e4e121f5ce00b268f432d63ccfcf46fcf08ed4b6784
-
Filesize
109KB
MD5eb3e5c48e29a60a0888f46ac927166c6
SHA15071530bba7a1b17a274e8ffc0d416765d5edfb0
SHA256aa8eb3b1bae2b19c274d9368c6be7a32308532b94af129a81e800f83a981e5ae
SHA512575b16511cdb8258a4f7184bbdc25cb218087ed827e52e4f79b65bd9b6e0ff3fd336c49907a00f68819920ef4dfa12149d435dd81ccd89b1a0e56e0b691454db
-
Filesize
97KB
MD51eca97f37eb72da4c2bdc5a8cf9395fe
SHA1e90eafbb008ce62f26dc2b705a89453bf9b1e9df
SHA2568191c70ed6c72f3b77c3610eca63ef9f238fce7333a93fe43786623b47bb1e89
SHA512d011afe117ba6c43bb3fd69f31c9041689de64250772400db864eb69e349c67d6622115b5fc0e1980b81c0487b7cb188ddf071175ade00e63b425a623e48d24e
-
Filesize
93KB
MD57fdc8cd64c0207a892f82c5cd3d94fa7
SHA1c2d9292668963fe6c592b69af717035f68110e43
SHA256781b1ee0c2fdf928b97946d5618a79e7d46f6d02e4bc5a2e94f848b6c628411e
SHA512b791d8d06120380a931698c6d1add131a1d3a64f2a08d97e103532c582854094a7871d3c1859556875b61907d3c4f64e293df2bc9d481c41cc37735de8b57510
-
Filesize
264KB
MD5748c021f71b39bb5a379843adeb5a488
SHA13183640693fb805d47cd3af85ffdd7b7ff346661
SHA256786dff9ad9c3dd91cc36d5fcb79c6f07cdcae56cdb38f364a9a54edfce82bcbb
SHA5128d28eb628bc7bcedca8fbe4f6095a91a52efc77592e6c499c4ec491f2fe68f2aa88fc4c16345222858be1d2e208c5f8e5756f5bc93841b510aa302d4624d3b37
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
23KB
MD53cf0240d6562e01fed4b86d891174ff6
SHA17465ed4d724d5bf754af81c18d734d36ef8a1b33
SHA2567231c100d43837b738b2ee6be120552c3ada6d8eb492bfdf022bc08a0ba09808
SHA5120383542c0bdce5f79cdf0d473da825db3c4a22b6afe6cd0e8609ea254576b374749010b54b57ac3096fa11feb54d1c378b96fc0594d2ca168da1ff94e00beacb