Analysis
-
max time kernel
36s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 22:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cadiz.cf/?i=1
Resource
win10v2004-20240426-en
General
-
Target
https://cadiz.cf/?i=1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133599397827598032" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3092 chrome.exe 3092 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3092 chrome.exe 3092 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: 33 1640 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1640 AUDIODG.EXE Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe Token: SeShutdownPrivilege 3092 chrome.exe Token: SeCreatePagefilePrivilege 3092 chrome.exe -
Suspicious use of FindShellTrayWindow 40 IoCs
pid Process 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe -
Suspicious use of SendNotifyMessage 38 IoCs
pid Process 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe 3092 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3092 wrote to memory of 1504 3092 chrome.exe 85 PID 3092 wrote to memory of 1504 3092 chrome.exe 85 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 3452 3092 chrome.exe 86 PID 3092 wrote to memory of 1476 3092 chrome.exe 87 PID 3092 wrote to memory of 1476 3092 chrome.exe 87 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88 PID 3092 wrote to memory of 1780 3092 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cadiz.cf/?i=11⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa00caab58,0x7ffa00caab68,0x7ffa00caab782⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1604 --field-trial-handle=1884,i,3425378770521593981,14799524484114253829,131072 /prefetch:22⤵PID:3452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1884,i,3425378770521593981,14799524484114253829,131072 /prefetch:82⤵PID:1476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2232 --field-trial-handle=1884,i,3425378770521593981,14799524484114253829,131072 /prefetch:82⤵PID:1780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2924 --field-trial-handle=1884,i,3425378770521593981,14799524484114253829,131072 /prefetch:12⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2936 --field-trial-handle=1884,i,3425378770521593981,14799524484114253829,131072 /prefetch:12⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4120 --field-trial-handle=1884,i,3425378770521593981,14799524484114253829,131072 /prefetch:82⤵PID:3172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4260 --field-trial-handle=1884,i,3425378770521593981,14799524484114253829,131072 /prefetch:82⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4712 --field-trial-handle=1884,i,3425378770521593981,14799524484114253829,131072 /prefetch:82⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1944
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3a0 0x4681⤵
- Suspicious use of AdjustPrivilegeToken
PID:1640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD53a76b00b6f7a154021a7e04992b7a807
SHA1a2a239a07670176ee6c33cfc9d9d1b4fc5adbf26
SHA256ced7171f1bcbed563ee8f0f46f66c1ed60e5ed23db696133508eeea61d4024a7
SHA51296e2b011518adf111b003b23aaa1195fd1277182728e3f17455c72af635e041459fd7a450b1b1a6fae66104ea142dfa4b7d7913db1548d0aacfe7884448d13e0
-
Filesize
117KB
MD538d1ce94bff4af93c92f86663d0ae10d
SHA1f42a66f723250debd3557e4afc0d9c7ecb9bde36
SHA256126303f154902b9097d5fc3b8f2fc27da8e39125da616c6b1771b6f5b26e2867
SHA512340c6ea9473c7113e4db56f35936116acb225cdafc2c63dbf83791f90dc2dcfb284b47dea9796b491ff7fb898471094429f96bb1eb334c6a32022db3f87c731e
-
Filesize
168B
MD5a9b667d5e46984195876c14ccc733bd2
SHA156c82177da74ec2a27e913c2df942da7274bcec0
SHA256ae3829c4cc39d17d620080af469b559e8cc2de50a6a6f44f25e9e67dbf693eee
SHA5123f58b1352ed4bc66490eb15badbfb1cfac3362d4de55bc3cdf9d444eb3d1c5c4f425c31dae7b04222e949592792922efd86b7bf4d29ad967c4fa3a1f9c8b28f4
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD546ca0538842af1ec02079e0a2e093653
SHA16361e4e877623cd81dd1f43d5658a6e542421803
SHA256fe566f730b2b200b58010668cf63c6bfc149c85a48a5e69f042e05e243976e59
SHA51249b707690623a274df91de65796a88a32bcf15fd38c49ed09ec6a555bdc7b1f323acfd674b3be4f797c40f3bcced8f6e3ab9859394ed2f829bd9f32923bc4b9c
-
Filesize
130KB
MD5708f16186bc1063ab68033b0b1baa61d
SHA1d2e1ce27ea25691985ad367199888770ac482e14
SHA256a5988c85fc524bfd6d957f8e9dcd3d5a95f1f07db116a472ed803cd283e57a6c
SHA512c318616d5c91d08a601c6fdc3b916d8b81a58ff2f8395e5a55cb2ef5ec408595c21d5e622bdba5833500add6da4ec82fa2e542ca3be0dfc9e72b5d9a57042f99