Analysis
-
max time kernel
299s -
max time network
299s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 20:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.fasteningandbonding.net/small-fast-and-element-resistant-hollow-wrist-robots-for-arc-welding
Resource
win10v2004-20240508-en
General
-
Target
https://www.fasteningandbonding.net/small-fast-and-element-resistant-hollow-wrist-robots-for-arc-welding
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2660 chrome.exe 2660 chrome.exe 1084 chrome.exe 1084 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2740 2660 chrome.exe 79 PID 2660 wrote to memory of 2740 2660 chrome.exe 79 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 1216 2660 chrome.exe 83 PID 2660 wrote to memory of 2596 2660 chrome.exe 84 PID 2660 wrote to memory of 2596 2660 chrome.exe 84 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85 PID 2660 wrote to memory of 800 2660 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.fasteningandbonding.net/small-fast-and-element-resistant-hollow-wrist-robots-for-arc-welding1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa37dab58,0x7ffaa37dab68,0x7ffaa37dab782⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1692 --field-trial-handle=1904,i,9162235081618763282,14853232596792937881,131072 /prefetch:22⤵PID:1216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1904,i,9162235081618763282,14853232596792937881,131072 /prefetch:82⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2220 --field-trial-handle=1904,i,9162235081618763282,14853232596792937881,131072 /prefetch:82⤵PID:800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1904,i,9162235081618763282,14853232596792937881,131072 /prefetch:12⤵PID:1956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2996 --field-trial-handle=1904,i,9162235081618763282,14853232596792937881,131072 /prefetch:12⤵PID:2524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4288 --field-trial-handle=1904,i,9162235081618763282,14853232596792937881,131072 /prefetch:12⤵PID:3184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=1904,i,9162235081618763282,14853232596792937881,131072 /prefetch:82⤵PID:3532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 --field-trial-handle=1904,i,9162235081618763282,14853232596792937881,131072 /prefetch:82⤵PID:3392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=740 --field-trial-handle=1904,i,9162235081618763282,14853232596792937881,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1084
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
199KB
MD5585ac11a4e8628c13c32de68f89f98d6
SHA1bcea01f9deb8d6711088cb5c344ebd57997839db
SHA256d692f27c385520c3b4078c35d78cdf154c424d09421dece6de73708659c7e2a6
SHA51276d2ed3f41df567fe4d04060d9871684244764fc59b81cd574a521bb013a6d61955a6aedf390a1701e3bfc24f82d92fd062ca9e461086f762a3087c142211c19
-
Filesize
360B
MD5cb4f5c46c3141c75376c5c7c06c58b43
SHA1786855dabe09b34a10f1310d175ceb937634d618
SHA2567560008b46c75e129a7add8981c6c0fb44e3c436efad075150c0891da1569672
SHA5120e6db73cfe82da0ae75375cdc7697d321bf7973ad5da15197d153e90ad7f5673e20c2d5558b68d841d9c342a27c8cfab8569c6c8e93ec2991fe55dd8e7aae3a3
-
Filesize
3KB
MD5f560f576234bdf88a8b2ce317f42f2e5
SHA13ddd7d25fe440601e6781ea542f94138d1718093
SHA256666f3bf6f620d455877ff9a545e5b8dc1f9e7427aeb2a0efedc70c9e377676f9
SHA51264ad64eafdc69cd759c8f8861076f436ebc41e77b44c29283fa1a70b30199ab7b3fe75d55c7a2c6bb02b6024f341f6cd4215e67ba66e933861ee972e4ff9b206
-
Filesize
4KB
MD52ff6c973f59ab6fa594ac42bbe6bd1d5
SHA1404ff23debdaf307d86803354fb545e547262127
SHA256c1e68239fb223439cb789bbd4271f94bbe4ae8a1cc92e0142bf56ba8aa9fcde2
SHA512d182dabff10b18d0defcf6b9f9ca78bba7bbabae827e0cfca66aeeb608d377fdc987cfe3f614922c496bef9daccd797892cc8e8c601792b7725e94115e617a6a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
857B
MD5f7eaffdc5d1e5b304fcad2fc7f500bf4
SHA1a6a3befc57997d737ca59fe13d85ecfc3b55ac4e
SHA256ab3450de0af5aff2137000b5de46cad5c028c7f0ee3183333e37d9e5cc431eaf
SHA512da546da91bcee5fab4fc2b9682794fa49033523a8acb66bf2935b6252419a8c801ecc52ce4aeea6b65f07b897247026314adaeefffe55a096b9dd3e3d5adeeff
-
Filesize
7KB
MD51602abc2a3ac74c337e80a0d414f4b4a
SHA16e98328ff0c34a160d1e8e4f184850bfdcf5a489
SHA2561086a7d02df244b91cba0ebe4f228012e77ae073f7ef5968b74889d5d3cb38b7
SHA512f8ce75b1be59ef68bad20bf58216da1efdffffc8c154bcc2bd11eb5f655eac39b3402ed157bb6ce75d055563d290ca63b3d73ac696ec2821a1821ed8ef2a4906
-
Filesize
6KB
MD56e22a0ca2d5e0b1fab786249e39cd56e
SHA1f9edb81575fcdb0892a3463c6aa37e96fae2bd37
SHA2564eaa28b217430a3478bbbbd2ba221ac8b89d962a6b7fe632560885a1cf01e1a8
SHA512241f1726f036e1b6c9b1e5b5242ef03d64615ec91e22c670701cb616a8c5269e3a9f6f1fe04da27367eb9e4c234baa1b6f45cdf4ba61012c7967b3af7bddb868
-
Filesize
255KB
MD570c58c7bd685a66e27f222d258de46ee
SHA17d77a5983dabcbbff30b3a6047628b49dbabe5d7
SHA25632d2a066b271c1f47ee1f1a7ea82ee930f86581a21c315065a5c77ebb4ff2c3a
SHA51260630ca85fee2532ef9e88a906f4bdbe1b2d9917047c64230fbfe4c7192f03180e36adac7faec35f75bf7acdd009294a35e4788354701bf2a6cb097424f89244