Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 05:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://https%253A%252F%252Fadobesign.teamshk.com%252F%253Forganisation%253Dbcg.com%2526common%253Da29zYWNoLmFudG9uQGJjZy5jb20%253D
Resource
win10v2004-20240426-en
General
-
Target
http://https%253A%252F%252Fadobesign.teamshk.com%252F%253Forganisation%253Dbcg.com%2526common%253Da29zYWNoLmFudG9uQGJjZy5jb20%253D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133603978779397709" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1360 chrome.exe 1360 chrome.exe 2168 chrome.exe 2168 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe Token: SeShutdownPrivilege 1360 chrome.exe Token: SeCreatePagefilePrivilege 1360 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe 1360 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1360 wrote to memory of 4940 1360 chrome.exe 83 PID 1360 wrote to memory of 4940 1360 chrome.exe 83 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 3580 1360 chrome.exe 84 PID 1360 wrote to memory of 2384 1360 chrome.exe 85 PID 1360 wrote to memory of 2384 1360 chrome.exe 85 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86 PID 1360 wrote to memory of 1404 1360 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://https%253A%252F%252Fadobesign.teamshk.com%252F%253Forganisation%253Dbcg.com%2526common%253Da29zYWNoLmFudG9uQGJjZy5jb20%253D1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc3742ab58,0x7ffc3742ab68,0x7ffc3742ab782⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1908,i,2193010304061469872,15100419492209547971,131072 /prefetch:22⤵PID:3580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1908,i,2193010304061469872,15100419492209547971,131072 /prefetch:82⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2212 --field-trial-handle=1908,i,2193010304061469872,15100419492209547971,131072 /prefetch:82⤵PID:1404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1908,i,2193010304061469872,15100419492209547971,131072 /prefetch:12⤵PID:3804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1908,i,2193010304061469872,15100419492209547971,131072 /prefetch:12⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3588 --field-trial-handle=1908,i,2193010304061469872,15100419492209547971,131072 /prefetch:12⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4460 --field-trial-handle=1908,i,2193010304061469872,15100419492209547971,131072 /prefetch:82⤵PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4608 --field-trial-handle=1908,i,2193010304061469872,15100419492209547971,131072 /prefetch:82⤵PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4708 --field-trial-handle=1908,i,2193010304061469872,15100419492209547971,131072 /prefetch:82⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4584 --field-trial-handle=1908,i,2193010304061469872,15100419492209547971,131072 /prefetch:82⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1908,i,2193010304061469872,15100419492209547971,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2168
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f4f4e885c015a8e8e3097a259a9a66d9
SHA17587fb87f772cedf4f9dd3e7e86333af0393bda5
SHA256001ebebd2ed8acf6e769571f35566c1af70166a5dae8a0c499699740bb5f0289
SHA512d9765cdab5d3f17f4efb564e09a820b1e67fcf22f3cad7711f6b05134c9d16a169434846286310ea7ea8e6edad371cf63bba21d319d4879036138f34d51a249e
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD524a3ee72d62650b13b4f985dc92bd0e5
SHA14cd492ecd1dd69c77e7dff06c22beb2ec52f9d9f
SHA2569d04dea8c936b859794bc34ae9cacff3521981ea8e090bd88151c6f856718b41
SHA512bc1b80fe34598cf88d85c9efce65ba8f7c22727637eec909f51123475f1e4d0b9906fd0104f59f1e2d7a7ac7c325f613677114e1d3fade2200e21b3d182b5da1
-
Filesize
6KB
MD535faff5fd672187eaf1bc51dc377d01f
SHA1cd82f2c6128273e42ab38a3afd1822020dcec46c
SHA256a19e578162810dbb6b7b9504940ef7f780f16ba526c944b768c5e0bab57e99f4
SHA51206d22032fb291a858e1f6702f430d30c7c7d8109810e8b7c86fb0d91ea74fa0fcd5fecc98f47d8e4278290d868f9d67c85c5434c12bcfc5f2d45299691f060a1
-
Filesize
130KB
MD5201512bcb009d82d1e82a36b68c1fb8f
SHA1d9a7305c51ed3f697c8ab176c170f58791faf87b
SHA256060b68a09f68257c5f759cb4df41a6f6274c4450b981157693d785ec39e7d75f
SHA512cfd000c332b394840805eeb836ea11ecece1c705e7e0a586eaf86f627475146f075a4c6a14ad91f3668c45410fa2772d058ab26992a00a4e5817f1377d0981c5