Resubmissions
15/04/2024, 05:40
240415-gdbqvaad7t 7Analysis
-
max time kernel
23s -
max time network
20s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 05:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://bpwhamburgorchardpark.org.
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
http://bpwhamburgorchardpark.org.
Resource
macos-20240410-en
Behavioral task
behavioral3
Sample
http://bpwhamburgorchardpark.org.
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral4
Sample
http://bpwhamburgorchardpark.org.
Resource
debian12-armhf-20240221-en
General
-
Target
http://bpwhamburgorchardpark.org.
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133576333312636755" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3552 chrome.exe 3552 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe Token: SeShutdownPrivilege 3552 chrome.exe Token: SeCreatePagefilePrivilege 3552 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3552 wrote to memory of 4188 3552 chrome.exe 83 PID 3552 wrote to memory of 4188 3552 chrome.exe 83 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3580 3552 chrome.exe 84 PID 3552 wrote to memory of 3992 3552 chrome.exe 85 PID 3552 wrote to memory of 3992 3552 chrome.exe 85 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86 PID 3552 wrote to memory of 4716 3552 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://bpwhamburgorchardpark.org.1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc3c2cab58,0x7ffc3c2cab68,0x7ffc3c2cab782⤵PID:4188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1932,i,6957260386213613662,12219018776736527286,131072 /prefetch:22⤵PID:3580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1932,i,6957260386213613662,12219018776736527286,131072 /prefetch:82⤵PID:3992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2252 --field-trial-handle=1932,i,6957260386213613662,12219018776736527286,131072 /prefetch:82⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1932,i,6957260386213613662,12219018776736527286,131072 /prefetch:12⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1932,i,6957260386213613662,12219018776736527286,131072 /prefetch:12⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4256 --field-trial-handle=1932,i,6957260386213613662,12219018776736527286,131072 /prefetch:12⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3240 --field-trial-handle=1932,i,6957260386213613662,12219018776736527286,131072 /prefetch:12⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4592 --field-trial-handle=1932,i,6957260386213613662,12219018776736527286,131072 /prefetch:82⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4756 --field-trial-handle=1932,i,6957260386213613662,12219018776736527286,131072 /prefetch:82⤵PID:3428
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD55bdaf551bcd9ff8002b9efb48a1af97f
SHA1e3e9961f7d8e77af959e64be3c4330ec198377c7
SHA256ee21c04a7e12ea905845b72e437e192975414bbd3d527abecbf4e9683c987c1b
SHA512567b41cc50699f07d7dd1b4864bb1dcc3e16eef6d653dd5ef01d29a255a11a844caabc2bd231e68bb5343a71d0ddbce0ddd657cabc0e1dbec0d39f12ed891600
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5951c218c5c5ec9d4bc6f4c14f74e86d1
SHA1a2580ae5995a0185e45952a308c1a2d30f2eea79
SHA256519e4b4f63f7c26b939a9e03c12c0f507e312a2c0f67e054544a1cff522bd89f
SHA512fa9c04f353b251bd106cd7297f2af081d9a1605fe2436c44c3835597b2b80000c979ad1d73d6d507a903bfed91eb93c051b71b1ba3ad085be4edf3ef47ce9e21
-
Filesize
128KB
MD5e39e4585b7e80d6a96b34ef83d1e041d
SHA166573bcb9d5b1e90328d0e0029e5ac029e88c6de
SHA2567d10b4c2ff86d352b92731531ebf83d7b1737e4aa29ee8a5ce480135dd01c2cf
SHA5123792b9c14ed166c9e4218add043113debd6c716264060669446052b6fb4a63f00d31f55dc5f7c6bb3da1b3d663f120afd78a5c4922178ccf6cb367499422066b
-
Filesize
129KB
MD57409231d76c8f5bfc6fbb1e1f5838996
SHA187e17a7ae8840ea0252760170ec529f3c6fb9bd4
SHA256fc520eda9648bb0d6241727928511b330617178e19202feb8bf396fa20027f9d
SHA512c216af2aa89539d5feba02bde407b293a3e9b12bf2ee6c203293e06d21a38ca98303b61515e00715eda14148b66e2b766d4d29705445cce3b9d277262d030d5a