Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 13:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.deekonmilitarytextile.com/
Resource
win10v2004-20240508-en
General
-
Target
https://www.deekonmilitarytextile.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133602521865405831" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4732 chrome.exe 4732 chrome.exe 2900 chrome.exe 2900 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4732 chrome.exe 4732 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe Token: SeShutdownPrivilege 4732 chrome.exe Token: SeCreatePagefilePrivilege 4732 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe 4732 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4732 wrote to memory of 3576 4732 chrome.exe 82 PID 4732 wrote to memory of 3576 4732 chrome.exe 82 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2132 4732 chrome.exe 86 PID 4732 wrote to memory of 2764 4732 chrome.exe 87 PID 4732 wrote to memory of 2764 4732 chrome.exe 87 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88 PID 4732 wrote to memory of 3768 4732 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.deekonmilitarytextile.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffa7ceab58,0x7fffa7ceab68,0x7fffa7ceab782⤵PID:3576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1904,i,17868399944131080119,1535923850830892148,131072 /prefetch:22⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1904,i,17868399944131080119,1535923850830892148,131072 /prefetch:82⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2208 --field-trial-handle=1904,i,17868399944131080119,1535923850830892148,131072 /prefetch:82⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1904,i,17868399944131080119,1535923850830892148,131072 /prefetch:12⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1904,i,17868399944131080119,1535923850830892148,131072 /prefetch:12⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 --field-trial-handle=1904,i,17868399944131080119,1535923850830892148,131072 /prefetch:82⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4484 --field-trial-handle=1904,i,17868399944131080119,1535923850830892148,131072 /prefetch:82⤵PID:3184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1904,i,17868399944131080119,1535923850830892148,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD544c9ecb5a8557941b1491935c943d35d
SHA1c759cc1336d02a43859f7855c133c9227bff12dc
SHA2561d52de926676cd39022f1811444127517707c76f079b0939724e6a987cccac5b
SHA5126cfeda19a1b6633a6e28c7a5aa5914726f1d53d81f0483f37d62f165462f45b76c84ff502d46e92eb5cc821cdd4675fb0848cfdbb46fcbcf2899e93dec75dd5b
-
Filesize
120B
MD514684d0f2dfad0c201b9b026a86f2983
SHA1205ecd99fe9b8a0106c0132bca26eaf189747ed1
SHA256f1106b37664b1e71880303411daf6c257f56e460bb85ca808b054da3bae744b5
SHA512c1ee0eb046568c6d77c9743096e184f20b720d7e19a5454c3c96ff52bf40c6f774b2f977bbcef3b75a3b50e1ed727b68d67f20539bcd0fe0473571e5332c7810
-
Filesize
2KB
MD5a51433d5844953101fa2454ffa8b92ee
SHA142a9a02045fe85a713b949667a935b1b5d351b26
SHA25607b54ddafc75b23b4194709dd16c42ca3091d22e97ac96c6597bf23d577cb4b3
SHA5124f39af049d277c63364001a6ba6fbca42487c62733f5307806a451ad0254b0a973494d1a61b9c5c48a17de867ba73b4b940f40d6863a1594f49e619286ce803f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD5f10c058d583fe1672fc589367e2a7278
SHA15cbd7730325586a2ac6e0b4b55348b7f8b167061
SHA25608d4661f29b3e6c9e04d4de28e8401fef7618211c19d7db4b5ff72ff1ef9af70
SHA5126e7a5cb495d5ad7e98e9efe674c4cf714da0e61dfa09016fd9f853fec69f4a14a6f6557320b8f1f9c6f394fa7e51c034be13b50e02ab6706c98929399599a301
-
Filesize
6KB
MD522573dbaa21962130e8667cd3e93e095
SHA10a93d877844b1a4ede79793304df40857e799c6b
SHA256e3eb2d940ebe4ad798b24eb8c345852d79235e7b869b35336457cd10861cb9b6
SHA51292f02faf0cbeea22de12157539add86e105e87c53543ab1edbe174b6f8e13a6231780f9f688bb3f99727735f7dfe2b64bea527ec16f52f69a7d85fef8588050e
-
Filesize
255KB
MD537380dda038bbc6ee7381434b226d293
SHA1fee6818390cbb9f74cbd63d11ad41dfda7c23ac8
SHA25698191c78cc5bcad7c396e0c09405cf894026c019515a5bd406b52014c9bc6bf8
SHA5125464b308fab8a714f276950e7f5284cacc48545cbc9564b8319b75c9661416b7a3792e1358a9616d83a4ed30a0c77f00b536d0c3fe6a1bbaf3217b7e8c292607