Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 22:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://myfreegovernmenttablet.com/
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
http://myfreegovernmenttablet.com/
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral3
Sample
http://myfreegovernmenttablet.com/
Resource
android-x64-20240506-en
General
-
Target
http://myfreegovernmenttablet.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133601113429209882" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4508 chrome.exe 4508 chrome.exe 3168 chrome.exe 3168 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe Token: SeShutdownPrivilege 4508 chrome.exe Token: SeCreatePagefilePrivilege 4508 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe 4508 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4508 wrote to memory of 1092 4508 chrome.exe 82 PID 4508 wrote to memory of 1092 4508 chrome.exe 82 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 4864 4508 chrome.exe 84 PID 4508 wrote to memory of 3852 4508 chrome.exe 85 PID 4508 wrote to memory of 3852 4508 chrome.exe 85 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86 PID 4508 wrote to memory of 3268 4508 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://myfreegovernmenttablet.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc001fab58,0x7ffc001fab68,0x7ffc001fab782⤵PID:1092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1856 --field-trial-handle=1896,i,18406338762504675225,17230840069476933966,131072 /prefetch:22⤵PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1896,i,18406338762504675225,17230840069476933966,131072 /prefetch:82⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2224 --field-trial-handle=1896,i,18406338762504675225,17230840069476933966,131072 /prefetch:82⤵PID:3268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1896,i,18406338762504675225,17230840069476933966,131072 /prefetch:12⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3004 --field-trial-handle=1896,i,18406338762504675225,17230840069476933966,131072 /prefetch:12⤵PID:632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4328 --field-trial-handle=1896,i,18406338762504675225,17230840069476933966,131072 /prefetch:12⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 --field-trial-handle=1896,i,18406338762504675225,17230840069476933966,131072 /prefetch:82⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4692 --field-trial-handle=1896,i,18406338762504675225,17230840069476933966,131072 /prefetch:82⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2640 --field-trial-handle=1896,i,18406338762504675225,17230840069476933966,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3168
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5a73849f9b63b6251b8f9df7f392069d2
SHA1f8adf7f3e586588a0490ac4a5e6b5ad42111bde4
SHA256bc361f121abe53c8de93acfa04b62d35b78a44c3bc9ac58721c29964d3de82e4
SHA51235acaeba785fac13831a2de40822f3d6aaeb03c4917b4199f220d16ccb78faf475330cf2fe67403f82f1016e46743ac95d6b2323fb1184a56d0ddd325efd4853
-
Filesize
2KB
MD5b564d03272324f03bea407e279b8fae7
SHA145d8337dd29dda2a245297b01210c7f19e17273e
SHA25654485d007867e159e53a9e0eb6b1820d24b30b2fbfe015b93a91a874127a8c91
SHA512bfbe578e898fe41491cc29bd9a7fdcd5f3dde25f46841d2369f5fad78d99b464d978c0363e1ffdeba41d5f44dbde47c28da730fb0f3da9a00fc3671ec4c01d38
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5495feccb18cb6f48a823b0247ecfeee8
SHA1298164535b3c5a395fa5d1b80af47eda6f8bc9b4
SHA2566ef1c5ab983b2d45650b138c188a023d0c9578fabdcad7e6de0cff8bb086524a
SHA5123227c5b258d87d41844e4bba67f253a27d89a84c6dc2532d73ea9d643def2255f86bd747fd3b489ca27b8cc20f9f04c8e217db69f7216d6d353ac93a714e9756
-
Filesize
7KB
MD565895defa16132de932dbc2444e5caad
SHA1fa450cadfff8b3ca000213f5fa9b226df5510efb
SHA256ac41ee42be055a6193b0a5e86ff20855058ee5cc36448f596f3eb6cff7bcc1df
SHA512d01c4a16f4a4bf79efee479b3dcb5bb9f2288cf2e36acd1f659ac86f6be0b540cf200f50cb52f231ea604822cb686efd34f4e31a3444e0f3aac7d3302765b923
-
Filesize
255KB
MD5948cea39f0108ac3ca4c65518dc9e6cd
SHA127a8c0c363cad8092b4a2a383fb94c832c7c03fb
SHA2565dde302f0e6edeac3dab2abe87bca7a9c8b65fb27d47a4eb42b052681f8bc915
SHA5122d0da35ca79997d57d5a655346cf7b55f386ba164ab80759b7dfc568f219c7cb576402d5a7fc58612b7e9e1fff166451bd713ed49af7b4ad0fba19771baf7f56