Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
21-05-2024 14:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.feller.hr
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://www.feller.hr
Resource
win7-20240508-en
General
-
Target
https://www.feller.hr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133607768235507148" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 4920 chrome.exe 4920 chrome.exe 1992 chrome.exe 1992 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 4920 chrome.exe 4920 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4920 wrote to memory of 2208 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2208 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2316 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 588 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 588 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2188 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2188 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2188 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2188 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2188 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2188 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2188 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2188 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2188 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2188 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2188 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2188 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2188 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2188 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2188 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2188 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2188 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2188 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2188 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2188 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2188 4920 chrome.exe chrome.exe PID 4920 wrote to memory of 2188 4920 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.feller.hr1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffa97ec9758,0x7ffa97ec9768,0x7ffa97ec97782⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1860,i,14346443524388660610,17678868272669169364,131072 /prefetch:22⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1784 --field-trial-handle=1860,i,14346443524388660610,17678868272669169364,131072 /prefetch:82⤵PID:588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1800 --field-trial-handle=1860,i,14346443524388660610,17678868272669169364,131072 /prefetch:82⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2796 --field-trial-handle=1860,i,14346443524388660610,17678868272669169364,131072 /prefetch:12⤵PID:428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2812 --field-trial-handle=1860,i,14346443524388660610,17678868272669169364,131072 /prefetch:12⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4896 --field-trial-handle=1860,i,14346443524388660610,17678868272669169364,131072 /prefetch:82⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 --field-trial-handle=1860,i,14346443524388660610,17678868272669169364,131072 /prefetch:82⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4784 --field-trial-handle=1860,i,14346443524388660610,17678868272669169364,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1992
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
192B
MD5212efa2d91a712a672ebaaa6a23fb1c2
SHA18116256d256dba1b718d58674bff592ebe4ae87b
SHA256b2d640541fb7d9b9bc9eafb9927694a872046bd69d42aa09e8eb6047955a496e
SHA5124ccde206e193445ddbd5f02332eb631fc9ea1cdb76778de65b2b1822952e1a14f6dd13569ac43f3823597ce6bba83508594ac417a7c5b1fed5e61843e38524eb
-
Filesize
1011B
MD5741a8e5c7189800ccaa9d8805363f8cb
SHA10a78e2d21dab6230e171a878fb86c8e221d310bc
SHA25681979004125a570da46bfe42857d89b05393421fb384a1425112d2a5e470c33d
SHA5122c1fab14ed56fb0b897b97330666a8498f70992899f15c56b4a8b59b18a11a272ecf09016cf2d61844eac383eb099733b0c2b6f23df856abe1f40bfcb66a2598
-
Filesize
1018B
MD567408d6adf54fbc5cd88fab995ffa75f
SHA12e361e8956afa81018a590d2a940725a12c8b907
SHA25630837ce8ab21f437115179ea134899bde6369c6fb3f5cfde93dd4670c2289631
SHA51262d5f441cffb7432c6863215f6d49cdf114a748315f1f457606ceebd96beac4b1d0216d1776f01d928ea24f049e6d050b2bb88ca7b6d2ec9c00d0232e2d3bca0
-
Filesize
539B
MD53b960e83891e61b281e46a1ba02e738e
SHA1b0f49e9040cb978a26f0134d61b8d6650179dd43
SHA256901a85f04b199559214180d97527aa9bcffd5d3d39f4accc2ce1e7f69dd745d8
SHA5123bd34056996a43b310144e10c28918ea32caf291ab7a5fa5b09f91351c58bff7c44962ff0c9e8f1c67f718a98936e140571212b39ca3fb199c6630a91cc50d16
-
Filesize
6KB
MD5ed7984e9e5f38e68bccdcbcd18533eeb
SHA1aa22b62fce56912d80963ecfe57da7f96dbb7232
SHA2569db115206d7aabb60d247f157e40e30b07918e21668cefbfdb97be390fae6527
SHA512e2708a0cbd919c354a4ea3f91a70a07594560342f6818cb7653f0ca10f52d3fb3fea5161229ee50309c30891d56e3a6902f4ae8883adf0c8743ed9986d6695c7
-
Filesize
6KB
MD53584d6405e2bf6083326ba6b6e040007
SHA1efd1905e689cbc5d2cc5751291df04c1a6cb111c
SHA2564110e7b3505970eb18289af0e116dbc3da8e88b4c5b66c620b0a54907a02f871
SHA5128d5dae4a77e78dd64d5cc6a87aa842abf66b8699edcb363ec06b423a349e1676cb9319322fe6cdf110bae50365ee9b2cf1fefe660bf8278eba6f681061f23ae6
-
Filesize
6KB
MD55c317fe5a0fdae7bc58b4d00f826d1d9
SHA182fcc0837ad0b34d3811b0c66cc2b4cec6afb7a5
SHA256a167dbcad3709c65d8b38ec214d934747ccf75626cd5b8ad62e85962ffc1f436
SHA512c1b9d9f7448275e996c997bf5713ed899dc65fe6dc06d6ca844d7a8dd74cb44007c6f9cc6d5ade665be1fcd8ea21a790dd7e97d0cffd6b80bc2a5dfddb5ddfa5
-
Filesize
136KB
MD5917484196463bbe4d312cb292afe3e4e
SHA1afb124e4171226f6ad65e82d48013a1e3f1abe25
SHA256323f9612fed3aafa135ce5908f7a71514666800cadd0ad85dbb7b3e5b5152ed3
SHA512882f777c8858a52ce3b458ba9e0def3d4e9fe3eda105f403c6c848833876db9a8d296a8cb812470f774b0daf3277733237f98d3019fc2980a75399aca0af9cfb
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e