Analysis
-
max time kernel
79s -
max time network
81s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-04-2024 19:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://pjmcontractor.com
Resource
win10v2004-20240226-en
General
-
Target
http://pjmcontractor.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133576829357809776" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4048 chrome.exe 4048 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe Token: SeShutdownPrivilege 4048 chrome.exe Token: SeCreatePagefilePrivilege 4048 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe 4048 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4048 wrote to memory of 4536 4048 chrome.exe 91 PID 4048 wrote to memory of 4536 4048 chrome.exe 91 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 1692 4048 chrome.exe 93 PID 4048 wrote to memory of 116 4048 chrome.exe 94 PID 4048 wrote to memory of 116 4048 chrome.exe 94 PID 4048 wrote to memory of 1456 4048 chrome.exe 95 PID 4048 wrote to memory of 1456 4048 chrome.exe 95 PID 4048 wrote to memory of 1456 4048 chrome.exe 95 PID 4048 wrote to memory of 1456 4048 chrome.exe 95 PID 4048 wrote to memory of 1456 4048 chrome.exe 95 PID 4048 wrote to memory of 1456 4048 chrome.exe 95 PID 4048 wrote to memory of 1456 4048 chrome.exe 95 PID 4048 wrote to memory of 1456 4048 chrome.exe 95 PID 4048 wrote to memory of 1456 4048 chrome.exe 95 PID 4048 wrote to memory of 1456 4048 chrome.exe 95 PID 4048 wrote to memory of 1456 4048 chrome.exe 95 PID 4048 wrote to memory of 1456 4048 chrome.exe 95 PID 4048 wrote to memory of 1456 4048 chrome.exe 95 PID 4048 wrote to memory of 1456 4048 chrome.exe 95 PID 4048 wrote to memory of 1456 4048 chrome.exe 95 PID 4048 wrote to memory of 1456 4048 chrome.exe 95 PID 4048 wrote to memory of 1456 4048 chrome.exe 95 PID 4048 wrote to memory of 1456 4048 chrome.exe 95 PID 4048 wrote to memory of 1456 4048 chrome.exe 95 PID 4048 wrote to memory of 1456 4048 chrome.exe 95 PID 4048 wrote to memory of 1456 4048 chrome.exe 95 PID 4048 wrote to memory of 1456 4048 chrome.exe 95
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://pjmcontractor.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e6ac9758,0x7ff9e6ac9768,0x7ff9e6ac97782⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 --field-trial-handle=1856,i,1767397988527430239,8186959632453299010,131072 /prefetch:22⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1856,i,1767397988527430239,8186959632453299010,131072 /prefetch:82⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1856,i,1767397988527430239,8186959632453299010,131072 /prefetch:82⤵PID:1456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1856,i,1767397988527430239,8186959632453299010,131072 /prefetch:12⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2964 --field-trial-handle=1856,i,1767397988527430239,8186959632453299010,131072 /prefetch:12⤵PID:3992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4160 --field-trial-handle=1856,i,1767397988527430239,8186959632453299010,131072 /prefetch:12⤵PID:2864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3092 --field-trial-handle=1856,i,1767397988527430239,8186959632453299010,131072 /prefetch:12⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4280 --field-trial-handle=1856,i,1767397988527430239,8186959632453299010,131072 /prefetch:12⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3104 --field-trial-handle=1856,i,1767397988527430239,8186959632453299010,131072 /prefetch:82⤵PID:3232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3176 --field-trial-handle=1856,i,1767397988527430239,8186959632453299010,131072 /prefetch:82⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4104 --field-trial-handle=1856,i,1767397988527430239,8186959632453299010,131072 /prefetch:12⤵PID:1188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4344 --field-trial-handle=1856,i,1767397988527430239,8186959632453299010,131072 /prefetch:12⤵PID:3652
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3488
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3756 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:81⤵PID:3212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5f60da7839fcc26194925c345c3aa7c6c
SHA1b41f3b869950e160ffb9a2f9308f67e63310f112
SHA2562ffd4b9ec2cee3323737883d65eec90fb959e5578423fba987ee8cdd153b88da
SHA512944c22ff1142f2204ef844fb6bb86e3adb7ba8cbd5c905bdd2018c721f05a75c97a7b80bcce104c0ad2cd304360ec0093151c4e2d56f24f9fc381e1743fdfbdd
-
Filesize
5KB
MD534fdedfce377fb0ddd02b51497775313
SHA175625a520870b4679e2bbad93994119fdd166668
SHA256811f5ec20ffa08ec26acce22030847a3cdc601aff8fec12c98c46c52d432b125
SHA51251f55fcd2ea272b48026648c0406611a17a54608743016725daa78d9f49306674fe4a758b2e9490a7be5c37028f10a5476d4d69025a9a85fb92e37140d4ed4ec
-
Filesize
6KB
MD5c3ff1c305c5958106ed5211819983482
SHA13855d31a6c7c19c331dea24bd53ddf686379d8e1
SHA25609be09edb022a637e33b56ffdad14e5cf9ba7fd6ffaf3d9cbbe43b8021f9b543
SHA5120042c14b5369b35b21b59d23131e7dfd17e02310f03bc79fc8436853ed2d3672e5099cf7d20a3bd710085b274c468fb38badeb2a7179aba2f08d53935faa74a8
-
Filesize
5KB
MD599ca2f37956759d4b48747109d3c6bbe
SHA1168a176cf00a3e2d12ef0eff2b47c4662d7bd12f
SHA2569821f21ef6fe609005e21711684520a02f31081322f459873e44913af1cd6d10
SHA5128c3e4e779216da76418b2b867ff50199f5b8fa6e207a175a444346248dbedc775731ffcaba0bf47e5decef73ffbae2dd756fbec8346abd1302f638504ba9ffd6
-
Filesize
128KB
MD54c1f8a9547b2638f169d3c36ad93bee2
SHA1e962ab617e1d53c878add840bbb0d072e7c8c9c0
SHA256938db8f6d896ac32b94b9bf2920d743fdb34a27508cb58bef7898d9759824349
SHA51245fdda9568d8f3d0a3e7d0b799ac5629338ffa0da7bf5bf401dfe07802f31d88feef38c8559c7064e0eb2253147ceaee70e415e49b1f8331eedaaf30ee3a6c15
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd