Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 04:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://storageandgovernment.com/s/a/session_index
Resource
win10v2004-20240508-en
General
-
Target
https://storageandgovernment.com/s/a/session_index
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133601330890214543" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 400 chrome.exe 400 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1252 chrome.exe 1252 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe Token: SeShutdownPrivilege 1252 chrome.exe Token: SeCreatePagefilePrivilege 1252 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe 1252 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1252 wrote to memory of 2668 1252 chrome.exe 82 PID 1252 wrote to memory of 2668 1252 chrome.exe 82 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 4524 1252 chrome.exe 83 PID 1252 wrote to memory of 1944 1252 chrome.exe 84 PID 1252 wrote to memory of 1944 1252 chrome.exe 84 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85 PID 1252 wrote to memory of 1036 1252 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://storageandgovernment.com/s/a/session_index1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe6b12ab58,0x7ffe6b12ab68,0x7ffe6b12ab782⤵PID:2668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1908,i,14357144538513616128,3418364856370840353,131072 /prefetch:22⤵PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1908,i,14357144538513616128,3418364856370840353,131072 /prefetch:82⤵PID:1944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2288 --field-trial-handle=1908,i,14357144538513616128,3418364856370840353,131072 /prefetch:82⤵PID:1036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1908,i,14357144538513616128,3418364856370840353,131072 /prefetch:12⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1908,i,14357144538513616128,3418364856370840353,131072 /prefetch:12⤵PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4484 --field-trial-handle=1908,i,14357144538513616128,3418364856370840353,131072 /prefetch:82⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4608 --field-trial-handle=1908,i,14357144538513616128,3418364856370840353,131072 /prefetch:82⤵PID:924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4132 --field-trial-handle=1908,i,14357144538513616128,3418364856370840353,131072 /prefetch:82⤵PID:1628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4636 --field-trial-handle=1908,i,14357144538513616128,3418364856370840353,131072 /prefetch:82⤵PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4484 --field-trial-handle=1908,i,14357144538513616128,3418364856370840353,131072 /prefetch:82⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1568 --field-trial-handle=1908,i,14357144538513616128,3418364856370840353,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:400
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD596ea700a8b9815f2f1c91ee5bf1748e1
SHA19fbf49ef3d7ad93b74d785dcc48dd680ab138995
SHA2565b6a0808f2fd52f712812bed7ca69b78ecd98b104218917585a70936fe784413
SHA512e65e74fd1397312a8e2441519d6b2f553eb7191e5e332866366b088316b87c00d406efdefc07f582a9d477a7dc436d7265390797a01e73c70c2535e7ee9b778d
-
Filesize
2KB
MD54abfbf52a148a1c6a5e96800f72845dc
SHA159bf00437a1f1572f83d44ebfb1e4db6a486d689
SHA256d91aadae7acc2e476acbfa0d8ef0467f2f777e5f19452db7be171fa18b37ccb9
SHA512b66886d1b391b5bcb2cb06032f2a1c56568c122880b30201f74b507df01fc0ab05e214a047a9f0853598d747aa0abd66d0a56a04fb09184f1e87113e9d2ffb90
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD56c8f628ee5679876a180b5218d76583e
SHA1c758beaaafb23c2c33b3407ef91165ca8913ba2e
SHA25644cb6143fd73afc3917aab008691b71de630b65c9f4d2b87bd13c60cc6396b99
SHA51203de075f8e2f3e25a0c092020a311559bce9c5fc72d18efce581e87bbe919d9c062aa605f71bb81f2945dbb116dd7832681fc9a5f6dcff543dacb588ff7fc3ea
-
Filesize
257KB
MD54d4fc57bcadd83a3bb6a93789b9e12e5
SHA18c6b0ed23f429b0fb258c4a347d6ce1a0789d254
SHA256a8bc30ce394715764fa74ea19c19731a6f7d46cffe13f2f8c10f8354d6ab423c
SHA512bcfe95be8f62a5aaa05bffcff14e73524eaf914ea51a7e3c869e287c977892c4e5c5835a0a4bfa81221b1fc04823b93e2a4ae2dafff6af10e5c207a8adf323b8
-
Filesize
257KB
MD59fb1b89e14043d9a73250c7e11bbcbf5
SHA13d94255a52999e5e82de671972e74c57f197dfe2
SHA25625d165cc648fc5261cacdb30aa636d27ca12702ecc12f94bae675b9125813ddb
SHA5125bb9f233ab57b8b34e0cdc90bd75908e3d6e8d69818716b30aca4d0485b7256260fd482b59970189464441387bc8c8c2c87a89152c55a3acbcfb5c9f9f4a62aa
-
Filesize
257KB
MD542c1d60757bfc6240c851514df137ac8
SHA1cdb0c3ce3275d9e26549e44aeee344a176c64027
SHA25628f6896d992b8ae164a9561c4a74c93cfb7abfd75c848e3d67ab371718e86e0d
SHA512d047d3b78659141f9b8490b65f8b08a189fba134e059675b823ed29bdbdc3a311d4b94b23cddfb4e69e75dd0704dd69bf4be62805bc412f4453e23be0fb8c7d0
-
Filesize
94KB
MD5f932f10c521360c43b486080f16479f4
SHA1cc2a5d1ac72884cb18f63361a74ba16777ef39af
SHA256ca9efaa3390a4ffc4e35f3bc5587eb8f03e391c773929379b4212e2e29d96f13
SHA512d89add3bc658128204eada1a16680df422689c65ede130b041fe68f7d1efe5f63e4d2c5589c0e1d52e4657d38ed6712d764cc01d01941e4f5b7cb1d2c5f500e2
-
Filesize
91KB
MD58310c691b13aadc9d40d21431f3b49e3
SHA15983827f9aa9142a7f0731ec56d3ae48dcbcaead
SHA2563fff06aa84834bfe3cf8e2f844ca040847b546ffce31cc6444533ca1bc498048
SHA512fd2c1cd44b96d6bb6b585c0b7056c3a054ec41f63c4465875a9a2a831c5d038ba3f9bb8746d547d5ca5097962382b5cd5fc79653ccd1f07a34a633c36df16df5