Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 22:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://aapt.net.au
Resource
win10v2004-20240508-en
General
-
Target
http://aapt.net.au
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133601997314481672" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1392 chrome.exe 1392 chrome.exe 1856 chrome.exe 1856 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1392 wrote to memory of 1852 1392 chrome.exe 90 PID 1392 wrote to memory of 1852 1392 chrome.exe 90 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 2980 1392 chrome.exe 91 PID 1392 wrote to memory of 4176 1392 chrome.exe 92 PID 1392 wrote to memory of 4176 1392 chrome.exe 92 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93 PID 1392 wrote to memory of 1032 1392 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://aapt.net.au1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeacddab58,0x7ffeacddab68,0x7ffeacddab782⤵PID:1852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1928,i,8549365319986052788,12948701692545557832,131072 /prefetch:22⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1928,i,8549365319986052788,12948701692545557832,131072 /prefetch:82⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2172 --field-trial-handle=1928,i,8549365319986052788,12948701692545557832,131072 /prefetch:82⤵PID:1032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2812 --field-trial-handle=1928,i,8549365319986052788,12948701692545557832,131072 /prefetch:12⤵PID:1304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2820 --field-trial-handle=1928,i,8549365319986052788,12948701692545557832,131072 /prefetch:12⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4544 --field-trial-handle=1928,i,8549365319986052788,12948701692545557832,131072 /prefetch:12⤵PID:4072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 --field-trial-handle=1928,i,8549365319986052788,12948701692545557832,131072 /prefetch:82⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3124 --field-trial-handle=1928,i,8549365319986052788,12948701692545557832,131072 /prefetch:82⤵PID:3600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=1892 --field-trial-handle=1928,i,8549365319986052788,12948701692545557832,131072 /prefetch:82⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 --field-trial-handle=1928,i,8549365319986052788,12948701692545557832,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1856
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2508
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1424,i,6576818814118437872,11004518367271063231,262144 --variations-seed-version --mojo-platform-channel-handle=3920 /prefetch:81⤵PID:2352
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x300 0x2ec1⤵PID:4008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
936B
MD5d096f2531d8a1918530f8c493e1c3ca1
SHA1c6cd15be42c690d3c107f5462c7fc927c6c1f9e0
SHA25604a31e8abb49eee287884f7f5f1bcfaf24e4c1412343a388e5abf0952c61f215
SHA5121155b0667a29345210623edfff19004cf78f84320e658e4192c315b7415e3ce17f98cca21c1fd608abd43813b639137f7cde2a6178b1d8bf6ffa23dfb36351e2
-
Filesize
960B
MD5cc6e30e1fe069bcd06083eb70665bb3e
SHA157b1498d8c71fec35bb78f0c0f5f3c6ee68f9dc9
SHA25658cd8aed6393b97b9ac3c21c60c6a00ab33637933d9482cd7ecfbdcb288a9d59
SHA512c75a628e387a4eb34fbcb8edc5959495ea6022e464b2da5ababf3fc08ae6caf788f70f9d68679519cdf9b0aececfd41857063c880638af767dbbe8ca65420c6b
-
Filesize
4KB
MD5b723862e3b012b73242a20d3fd2af88f
SHA1d902dc8aabd3a0802e921577850179a4d31734e2
SHA256d6cc00bdcbac94d79f371e620a5b8434bcbcd6690530ae81c1afd39b5a1bcfb7
SHA51286b049a264f8bdddcb3b90b2a7125823a155f23dabedf0a7c99b79651d1ac92c590dbc87408e9a0edeb80ed8581a7d5f6f060d4b5f3e5b3bb099b1460b32e2c5
-
Filesize
1KB
MD5d862fe0902ac50a5b7687782853becfb
SHA12555d5c23c60f6c57c7fd7144933b8710a830a36
SHA2561e9dd695bf062a680196622cf4a456401b08831858fb15548b12d4510d4aca06
SHA512c6d7661d62bc3d6fe55819551847992c5d27c30a9728537602109e219c5e1a4f010fd5c35268b732ec9819eafef3602a282a190a148894c606c19c5718220f54
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5f554c8389f763614c67a8dc7efed7dbc
SHA1144681424d0022b028ccd4866774a914462c853e
SHA256a80a7aaf2872244c296ea2df1233074427241bf15e00c36c6612e2b4e1b7b01f
SHA51236087eb60cce1bf866be717a6fea34b8c28193af81401298262a9f190fd72e935a0c4c89388f80ed5905ceed75f3258fd45cc89774eacb885389ecf44d53274a
-
Filesize
6KB
MD5b2bf276e745b366b695abd6d9fec7549
SHA164eb381b598a904882a4b3a3abc9bb0b85e17c8a
SHA256fbb8e0504bf1eadc7f8449c9d1370d60b24df7ed3fcb956518b24c72b8cb19ae
SHA5127b4d86c11948ed4f60c2bdc9b46d5f6b52fe541e08087746b53f86ce7cb68e6cbdaaa6555681b4474760410253e0ebf1e70d7efbe027fa6469fb2147b4546248
-
Filesize
255KB
MD57a1d039ef765d01302071c924dace9ad
SHA183bcc2ea9e67a40f32e9416235ff6b357845ea9d
SHA2561f015a1f0af5836ffa489581b7a120b7701ba9cd5944f7467ac64df5245f6eab
SHA512a4a2d8b1adf9226d5bf3e14a5737f91cb7df5d9f94d0a22730c0ff6ea28b31ca85801e36ac0053bc211c5dc099e04b0e90061d01f23b551c45336c4c10ed85b6