Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2024, 13:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.czas.cz/download/prezentace/czas00_en.pdf
Resource
win10v2004-20231215-en
General
-
Target
http://www.czas.cz/download/prezentace/czas00_en.pdf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133567977498796255" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2884 chrome.exe 2884 chrome.exe 4636 chrome.exe 4636 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2884 wrote to memory of 4724 2884 chrome.exe 85 PID 2884 wrote to memory of 4724 2884 chrome.exe 85 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 860 2884 chrome.exe 87 PID 2884 wrote to memory of 784 2884 chrome.exe 88 PID 2884 wrote to memory of 784 2884 chrome.exe 88 PID 2884 wrote to memory of 4000 2884 chrome.exe 89 PID 2884 wrote to memory of 4000 2884 chrome.exe 89 PID 2884 wrote to memory of 4000 2884 chrome.exe 89 PID 2884 wrote to memory of 4000 2884 chrome.exe 89 PID 2884 wrote to memory of 4000 2884 chrome.exe 89 PID 2884 wrote to memory of 4000 2884 chrome.exe 89 PID 2884 wrote to memory of 4000 2884 chrome.exe 89 PID 2884 wrote to memory of 4000 2884 chrome.exe 89 PID 2884 wrote to memory of 4000 2884 chrome.exe 89 PID 2884 wrote to memory of 4000 2884 chrome.exe 89 PID 2884 wrote to memory of 4000 2884 chrome.exe 89 PID 2884 wrote to memory of 4000 2884 chrome.exe 89 PID 2884 wrote to memory of 4000 2884 chrome.exe 89 PID 2884 wrote to memory of 4000 2884 chrome.exe 89 PID 2884 wrote to memory of 4000 2884 chrome.exe 89 PID 2884 wrote to memory of 4000 2884 chrome.exe 89 PID 2884 wrote to memory of 4000 2884 chrome.exe 89 PID 2884 wrote to memory of 4000 2884 chrome.exe 89 PID 2884 wrote to memory of 4000 2884 chrome.exe 89 PID 2884 wrote to memory of 4000 2884 chrome.exe 89 PID 2884 wrote to memory of 4000 2884 chrome.exe 89 PID 2884 wrote to memory of 4000 2884 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.czas.cz/download/prezentace/czas00_en.pdf1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff823239758,0x7ff823239768,0x7ff8232397782⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1888,i,586535731785289567,14582364951419248034,131072 /prefetch:22⤵PID:860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1888,i,586535731785289567,14582364951419248034,131072 /prefetch:82⤵PID:784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1888,i,586535731785289567,14582364951419248034,131072 /prefetch:82⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2880 --field-trial-handle=1888,i,586535731785289567,14582364951419248034,131072 /prefetch:12⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2888 --field-trial-handle=1888,i,586535731785289567,14582364951419248034,131072 /prefetch:12⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4588 --field-trial-handle=1888,i,586535731785289567,14582364951419248034,131072 /prefetch:12⤵PID:2508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --pdf-renderer --lang=en-US --js-flags=--jitless --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4792 --field-trial-handle=1888,i,586535731785289567,14582364951419248034,131072 /prefetch:12⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 --field-trial-handle=1888,i,586535731785289567,14582364951419248034,131072 /prefetch:82⤵PID:3244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 --field-trial-handle=1888,i,586535731785289567,14582364951419248034,131072 /prefetch:82⤵PID:776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 --field-trial-handle=1888,i,586535731785289567,14582364951419248034,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4636
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
822B
MD5d5694320601221f8379b858900024a83
SHA1c6e04d61e6c24db1a0f98a4017c022e5e89cfa25
SHA25667acd4013a9bd127b36247a33cb530c83efc9c41c3d7e32e6f5fb7bc3f73d1c2
SHA512a658e82e4335c80b308bce6f976216262381c6b0eaa83fa5aa602ea2179a01d9c832a25f075ce1fe6762faa7bb69fa85ef1682631b71775d09c782cca0681c9f
-
Filesize
6KB
MD573bba0f72d0092b42b7e7a426fc2f43d
SHA13ced9ce68359b46df76f7a62b4925e430278d546
SHA256e0f754c8fde9645e287a12af58e798856db1a2c5e08536cc58ca2b373a6fb20c
SHA512f1593a1308d9501f20e9b41d370469006a3e2399f324285f6b6f409eacfc58657eb069b530a030b446c6df26eb325f2f458a53f490180e99a601d772d363a3ab
-
Filesize
114KB
MD5df98b0bc0a2e7549c2e4e265d49e9076
SHA1eea4554c9784583c43575fe3e2cbfd898c5236e6
SHA25684805defa869662f19f2744bcc138ea42bb62ffd307fb2757831a0c3e6dce401
SHA5127fd52cca16e6ef56301d2cf5165a05764c2c9ec1eedb1419b6554ce22d86e031bb14de7d6169faaf5d8bc61c897828d48a31ac42b773907cafaf629b5f93f32e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd