Analysis
-
max time kernel
33s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 06:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://url12.mailanyone.net/scanner?m=1s93zw-00006g-4h&d=4%7Cmail%2F90%2F1716214800%2F1s93zw-00006g-4h%7Cin12d%7C57e1b682%7C11949542%7C14589158%7C664B5E04DBD7C8A1B9C96D 90A9623F52&o=%2Fphte%3A%2Fitsalmaoshji.%2Fek.oc.y&s=3hGlY1j4SaI04Lo6MxY2wpSZOqQ
Resource
win10v2004-20240426-en
General
-
Target
https://url12.mailanyone.net/scanner?m=1s93zw-00006g-4h&d=4%7Cmail%2F90%2F1716214800%2F1s93zw-00006g-4h%7Cin12d%7C57e1b682%7C11949542%7C14589158%7C664B5E04DBD7C8A1B9C96D 90A9623F52&o=%2Fphte%3A%2Fitsalmaoshji.%2Fek.oc.y&s=3hGlY1j4SaI04Lo6MxY2wpSZOqQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133607455351646631" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1456 chrome.exe 1456 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1456 chrome.exe 1456 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe Token: SeShutdownPrivilege 1456 chrome.exe Token: SeCreatePagefilePrivilege 1456 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe 1456 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1456 wrote to memory of 1656 1456 chrome.exe 82 PID 1456 wrote to memory of 1656 1456 chrome.exe 82 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 2144 1456 chrome.exe 83 PID 1456 wrote to memory of 5048 1456 chrome.exe 84 PID 1456 wrote to memory of 5048 1456 chrome.exe 84 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85 PID 1456 wrote to memory of 5084 1456 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://url12.mailanyone.net/scanner?m=1s93zw-00006g-4h&d=4%7Cmail%2F90%2F1716214800%2F1s93zw-00006g-4h%7Cin12d%7C57e1b682%7C11949542%7C14589158%7C664B5E04DBD7C8A1B9C96D 90A9623F52&o=%2Fphte%3A%2Fitsalmaoshji.%2Fek.oc.y&s=3hGlY1j4SaI04Lo6MxY2wpSZOqQ1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb973ab58,0x7ffcb973ab68,0x7ffcb973ab782⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 --field-trial-handle=1928,i,4137865861151549815,5990727816749084259,131072 /prefetch:22⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1928,i,4137865861151549815,5990727816749084259,131072 /prefetch:82⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2220 --field-trial-handle=1928,i,4137865861151549815,5990727816749084259,131072 /prefetch:82⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1928,i,4137865861151549815,5990727816749084259,131072 /prefetch:12⤵PID:3420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3076 --field-trial-handle=1928,i,4137865861151549815,5990727816749084259,131072 /prefetch:12⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4444 --field-trial-handle=1928,i,4137865861151549815,5990727816749084259,131072 /prefetch:82⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4608 --field-trial-handle=1928,i,4137865861151549815,5990727816749084259,131072 /prefetch:82⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4564 --field-trial-handle=1928,i,4137865861151549815,5990727816749084259,131072 /prefetch:82⤵PID:1856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4596 --field-trial-handle=1928,i,4137865861151549815,5990727816749084259,131072 /prefetch:82⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4640 --field-trial-handle=1928,i,4137865861151549815,5990727816749084259,131072 /prefetch:82⤵PID:2168
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5290a113e94b54ae5d4094e4bf44cdcb4
SHA148f6174adfd749994af41d6c19368ac8971a3d23
SHA2563fdc543baab71f757a3f005471173f594bcef0215e656c73491830c36fe1cbe8
SHA5122daed0e1dbd9e7f77647fbd69ae7133d7f384cca2a789c33943e0b37ae6690cff5cc51dbbf62798dd819bd9082d24574a886d2ed383d88af40312468893ff194
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD542eb7f6a29839d9f5538287df125494d
SHA168bae5554f421bc5863d621811ab34264ad00766
SHA256d5688d5b50400668a51ff1183eecfe3ecbed699626cd99f10ad49251702a0199
SHA51272e3efab9e5fb50319963e8c37308c30361f57837a91a5331f98dd241b0535d622a5220a56e94dbd55b607dba713e17472742521258d35932bc289028231d40c
-
Filesize
131KB
MD5b101f84dc08414fcd1d9ffb113cd07df
SHA1e969f497a4f37c9ac56268c1f2327d9534b72b46
SHA256d0ce3178238683fa3d4eda6c4d30117b3603b0a6b38cdff8afd3fbfd244f0b61
SHA512d916e932fac429b6d3301ad730a1a9d6988eed85c998cbac07470e41ab7f538bff0fde6b8937517aebad1b4fb83544acd0eba49cd08274011e2cc7e71ec73ebd
-
Filesize
132KB
MD568af8a9c11121bd071dc4850f5daaf5b
SHA1b7aee89f06c935d43a0b6aa024c61ef34e0bed59
SHA25628cfbf1d2331aeea1f82e5e27ecd534bc96829a09f435a495eac8da1af8bf6b7
SHA512500028414d5f02ff472418a1ce1dd0db44e15c27ca9884baadd5650f3fcfed3f07ccf295b3eaeb0ab787b3edf1d73625881ada810975835d4bbff574f1611338