Analysis
-
max time kernel
74s -
max time network
57s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
10/04/2024, 10:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.iccmap.hsbc.com.hk/teamsite_content/iccm/HBMB/MY/user_contents/PFS/images/gradient_en_US_HS.gif
Resource
win10-20240404-en
General
-
Target
http://www.iccmap.hsbc.com.hk/teamsite_content/iccm/HBMB/MY/user_contents/PFS/images/gradient_en_US_HS.gif
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133572189103960633" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4188 chrome.exe 4188 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4188 chrome.exe 4188 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4188 wrote to memory of 4480 4188 chrome.exe 73 PID 4188 wrote to memory of 4480 4188 chrome.exe 73 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2732 4188 chrome.exe 75 PID 4188 wrote to memory of 2676 4188 chrome.exe 76 PID 4188 wrote to memory of 2676 4188 chrome.exe 76 PID 4188 wrote to memory of 4060 4188 chrome.exe 77 PID 4188 wrote to memory of 4060 4188 chrome.exe 77 PID 4188 wrote to memory of 4060 4188 chrome.exe 77 PID 4188 wrote to memory of 4060 4188 chrome.exe 77 PID 4188 wrote to memory of 4060 4188 chrome.exe 77 PID 4188 wrote to memory of 4060 4188 chrome.exe 77 PID 4188 wrote to memory of 4060 4188 chrome.exe 77 PID 4188 wrote to memory of 4060 4188 chrome.exe 77 PID 4188 wrote to memory of 4060 4188 chrome.exe 77 PID 4188 wrote to memory of 4060 4188 chrome.exe 77 PID 4188 wrote to memory of 4060 4188 chrome.exe 77 PID 4188 wrote to memory of 4060 4188 chrome.exe 77 PID 4188 wrote to memory of 4060 4188 chrome.exe 77 PID 4188 wrote to memory of 4060 4188 chrome.exe 77 PID 4188 wrote to memory of 4060 4188 chrome.exe 77 PID 4188 wrote to memory of 4060 4188 chrome.exe 77 PID 4188 wrote to memory of 4060 4188 chrome.exe 77 PID 4188 wrote to memory of 4060 4188 chrome.exe 77 PID 4188 wrote to memory of 4060 4188 chrome.exe 77 PID 4188 wrote to memory of 4060 4188 chrome.exe 77 PID 4188 wrote to memory of 4060 4188 chrome.exe 77 PID 4188 wrote to memory of 4060 4188 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.iccmap.hsbc.com.hk/teamsite_content/iccm/HBMB/MY/user_contents/PFS/images/gradient_en_US_HS.gif1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffcf0259758,0x7ffcf0259768,0x7ffcf02597782⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1584 --field-trial-handle=1760,i,12540121647135522810,7937617782526022225,131072 /prefetch:22⤵PID:2732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1836 --field-trial-handle=1760,i,12540121647135522810,7937617782526022225,131072 /prefetch:82⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2064 --field-trial-handle=1760,i,12540121647135522810,7937617782526022225,131072 /prefetch:82⤵PID:4060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2620 --field-trial-handle=1760,i,12540121647135522810,7937617782526022225,131072 /prefetch:12⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2628 --field-trial-handle=1760,i,12540121647135522810,7937617782526022225,131072 /prefetch:12⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4204 --field-trial-handle=1760,i,12540121647135522810,7937617782526022225,131072 /prefetch:82⤵PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4192 --field-trial-handle=1760,i,12540121647135522810,7937617782526022225,131072 /prefetch:82⤵PID:3080
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
987B
MD57ee8e543e70c26c9cb5f42aae8ff28ec
SHA175a217dd33caa6dfea1cef1444d8784c8e11e828
SHA256417c6ce67b155019ca0d4b3e73b5f937229e663fb42efcfe32c62ce453abd755
SHA512bd5295835180af12c58dc41bb0098b5ebd6efd7008591c6ff33374e307f94b9e9ea3c0b4cf6284fe122fb37ae4fa650b3b79ad5144b2909f0e68e54fa3e122fd
-
Filesize
6KB
MD59654a9b75b5479d709929f68c741e9f3
SHA18b38116df6357faea96c6f247177c78af70ac551
SHA2561f8b3ea328fb4a95c123889af43f3c6fecbfbccb49740620aeeb8f68d05e0172
SHA5128e98da17463f6a38a573469076e4ca1b052beb789be79fee67b56521e5548b090debda4705cc86447d64fd8060ca2464103e51177cc99a5f3cc810e3785a8d92
-
Filesize
5KB
MD54bf64f5e94241c78ef1b4fefb0d5bf1e
SHA102fb362c264fb3142bc476bebfc073d7efb6d68f
SHA256fd0e95159b9d77f45700133c93abb00b338123dba37a8dcac180074cc24f0735
SHA51257659438a2faef0255498f8cedbac5628d6db512b291d57b33313331a4d2051aa169950afd1ea8b15f0d231b83aea2463962eab8d35d295eb095b7270f4d9055
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\e0d249fa-da0b-45a1-abb0-2e30444d7235.tmp
Filesize5KB
MD5a1bd5741ff2b9829c1e4208f46240b6a
SHA1d2a3cf4e3b97ee2a0ca02451e3b2672531dbd3b3
SHA2568fdfe84e96b4265086784f4ad7138d44f456788f0d50617c33692fc525142f64
SHA5128fea61578271c48d62d115647e3f7fccc2917e4f53d2259b76cc6e7f1fb8769619cbc765e028aa0fd84a56a4633a45117d77c96cc3db5422d9356db727a70ac8
-
Filesize
136KB
MD5de92242497a010a4da8de0d41a286fd9
SHA1216852a4ccbd6651e7e3933cece6c8a59c58d309
SHA256189a138ea5edcf20b18a9f314707b736b94ce74c0020c541a06f2312f8235b7e
SHA5122449915beacb675beb21ef509efc6b9504079b10480f1ef57c271fa47a01e17d82170ab12026ad4f8e13bbbc6068e2b3ce6dd60a4ebfce785041a90f3614e274
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd