Analysis
-
max time kernel
116s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 16:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://SEUSITE.COM/NOTAFISCAL
Resource
win10v2004-20240426-en
General
-
Target
https://SEUSITE.COM/NOTAFISCAL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133591407525105363" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 792 chrome.exe 792 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe Token: SeShutdownPrivilege 792 chrome.exe Token: SeCreatePagefilePrivilege 792 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe 792 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 792 wrote to memory of 2012 792 chrome.exe 83 PID 792 wrote to memory of 2012 792 chrome.exe 83 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 3100 792 chrome.exe 85 PID 792 wrote to memory of 2280 792 chrome.exe 86 PID 792 wrote to memory of 2280 792 chrome.exe 86 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87 PID 792 wrote to memory of 3368 792 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://SEUSITE.COM/NOTAFISCAL1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff95ffaab58,0x7ff95ffaab68,0x7ff95ffaab782⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1552 --field-trial-handle=1908,i,5098318842833267987,12282642359320879931,131072 /prefetch:22⤵PID:3100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1908,i,5098318842833267987,12282642359320879931,131072 /prefetch:82⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2272 --field-trial-handle=1908,i,5098318842833267987,12282642359320879931,131072 /prefetch:82⤵PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2892 --field-trial-handle=1908,i,5098318842833267987,12282642359320879931,131072 /prefetch:12⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2900 --field-trial-handle=1908,i,5098318842833267987,12282642359320879931,131072 /prefetch:12⤵PID:1428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4332 --field-trial-handle=1908,i,5098318842833267987,12282642359320879931,131072 /prefetch:12⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4632 --field-trial-handle=1908,i,5098318842833267987,12282642359320879931,131072 /prefetch:82⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 --field-trial-handle=1908,i,5098318842833267987,12282642359320879931,131072 /prefetch:82⤵PID:1368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=1628 --field-trial-handle=1908,i,5098318842833267987,12282642359320879931,131072 /prefetch:12⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4808 --field-trial-handle=1908,i,5098318842833267987,12282642359320879931,131072 /prefetch:12⤵PID:880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4748 --field-trial-handle=1908,i,5098318842833267987,12282642359320879931,131072 /prefetch:12⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5268 --field-trial-handle=1908,i,5098318842833267987,12282642359320879931,131072 /prefetch:12⤵PID:4152
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD57c9cc6a7fcafdeb624bee649fd36e17a
SHA11a8b1c259c2fd077b1893495f713bbe18cb8e638
SHA256a0e16949298e87c8118d4e77919e0389ab36e6aa540a9caaafdbe63fd3695106
SHA512baadae4447254b707ec1e139ebba3b31cb1fdf1748ddd6e7f68078ff454cb71687825485920cd3d2389b056bdf1e71876d0303acd8088c245b473e89f983c394
-
Filesize
202KB
MD5fd524f83e89ba061f593346318eced51
SHA1988330f1e790363f64dd80130e03951865098275
SHA256b2c6a60e5cbcd1a063e3a367442d9fb2adef7b048fb420e312582376dd6a226a
SHA512ed4fad184f7053800491889cab09f5a5a443593124330ea6faed0f54b29d4756724324f2443f20cedacf3168f7f4f518df96fb6bf735401fdc002262da8e6565
-
Filesize
96B
MD58c4d843fbf1e080ce3df27a0808a5d04
SHA1b9c47898d646e8730f31bacaac206cf7307a8d53
SHA256ba04de24dfaeed71822b65f6641c47b96f4f741501a46a6777d76cb45cd6aba0
SHA512a224eed96afe92945e63541e57aa162b683ef6b340f217c551880a882be9f670f5fae0e452eb94acac7055b9493a76030e9d91a9de6fc720f854c7f8162b70eb
-
Filesize
2KB
MD5cd0e1d85ec8603537626e0ad29a86185
SHA1891814151a48f88da6300767704ba45c8b256d4a
SHA2565474da96af58811ea8e4328868d73e76b4caddb9a92813dff2eb4ef41af47fd3
SHA51236f6b5cf8704fa09f2876020628dbfcae82175bb1b0d13e9b41528a6ad1b0a385898ef5c99b65dc0a9a80ccd687c45f4c67ed7c20defe4f629dce166a6b91ae2
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD54055eb8735f5be9fa3ffa31ff54b55a9
SHA133ab0944be9e4c1f2f644a4a3b8cebfa3c770cea
SHA25685caf14d6df050109f813203dccda18e46ead5f6d9ed697066f1dba5528073e5
SHA512974431cfa030f9cca38af4f885e80882bba6c2cf20996faef94fb5d2056e056553db945e840c873fce3b3a85ee76628ef994f07a3a22af165201e9acf642da62
-
Filesize
7KB
MD537b0fca1af39d82e9d456a669972492d
SHA1842b1b7aaefe81c0bfa70d9df46de763b763e35e
SHA2563de6657fdadacfb2158d2c1aae1e4a470114e17e8c2b0f39df5abb87707de5e3
SHA51233b363b0f02811454cf0e202dee895a26c8049f125bfd70b3658efd1c90e621cc45adf6b088c3e4be6c94a374b1b16b818eaf7ddc2fb8ffcef9c0b82d205fcd6
-
Filesize
7KB
MD5ed11374aed5e66bf177c1ddc4f1d7717
SHA1e874643f4d6351507ec16cf8eabf9f017743ab01
SHA2561cb56f640811c441ea71adc3d6adb0bf274f53098de1423348b5b597421cbd4f
SHA51206ec9bd7e6dce493ffb5dabde4271b59035b7744455cb4dca56ec2dff6720f4860b543bb100256ab97f940a344947e4370634512ddbdbf811320a9a1cecaed30
-
Filesize
130KB
MD58f19995731187b1346d5d7cb1c244315
SHA182cb0bc26f115c12ec9841dab2cda682a4818467
SHA256659dac69236155d9162d40989a2812d89251cd9e2a4a63c879cf437d06c47aa9
SHA51225c70bbe49196410f3a29f6b3d542562c21b7bfd490c9255f6ec2a047c2b9907013782eb2f78c6a8508c73484235e4a4f920ccc572c5dc3f675d4c52876a7e02
-
Filesize
130KB
MD568221388df69311972243f38015bda4d
SHA1652cb3c1fd9027edae4c2f5a411a09a01005d38b
SHA256786f479124d296974d17035bca56cbef8746bf2c46419adc0ac99cb5a1925046
SHA5125400e57507e64ebd182e12ecd2ff4d7bb758e781a0ee50f2c379d3836896776f87187e485e00bd625a046fd005baa195f1f360eb38fbff62820c505157e18b49