Analysis
-
max time kernel
48s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 14:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.bank-hlynov.ru
Resource
win10v2004-20240226-en
General
-
Target
https://www.bank-hlynov.ru
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133607768572033633" chrome.exe -
Modifies registry class 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3808065738-1666277613-1125846146-1000\{D8EC0A3E-11A6-480C-A4A3-A6F00754C9DB} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 3412 chrome.exe 3412 chrome.exe -
Suspicious behavior: LoadsDriver 2 IoCs
Processes:
pid process 656 656 -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe Token: SeShutdownPrivilege 3412 chrome.exe Token: SeCreatePagefilePrivilege 3412 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe 3412 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3412 wrote to memory of 3012 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 3012 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 5036 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 2896 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 2896 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 3812 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 3812 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 3812 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 3812 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 3812 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 3812 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 3812 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 3812 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 3812 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 3812 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 3812 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 3812 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 3812 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 3812 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 3812 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 3812 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 3812 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 3812 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 3812 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 3812 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 3812 3412 chrome.exe chrome.exe PID 3412 wrote to memory of 3812 3412 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.bank-hlynov.ru1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae9d69758,0x7ffae9d69768,0x7ffae9d697782⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1892,i,15753599197807171944,17805794441585497345,131072 /prefetch:22⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1892,i,15753599197807171944,17805794441585497345,131072 /prefetch:82⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2168 --field-trial-handle=1892,i,15753599197807171944,17805794441585497345,131072 /prefetch:82⤵PID:3812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1892,i,15753599197807171944,17805794441585497345,131072 /prefetch:12⤵PID:1328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3056 --field-trial-handle=1892,i,15753599197807171944,17805794441585497345,131072 /prefetch:12⤵PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=5048 --field-trial-handle=1892,i,15753599197807171944,17805794441585497345,131072 /prefetch:12⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=1640 --field-trial-handle=1892,i,15753599197807171944,17805794441585497345,131072 /prefetch:82⤵PID:3740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 --field-trial-handle=1892,i,15753599197807171944,17805794441585497345,131072 /prefetch:82⤵
- Modifies registry class
PID:2536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5976 --field-trial-handle=1892,i,15753599197807171944,17805794441585497345,131072 /prefetch:82⤵PID:5184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 --field-trial-handle=1892,i,15753599197807171944,17805794441585497345,131072 /prefetch:82⤵PID:5272
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD541785febb3bce5997812ab812909e7db
SHA1c2dae6cfbf5e28bb34562db75601fadd1f67eacb
SHA256696a298fa617f26115168d70442c29f2d854f595497ea2034124a7e27b036483
SHA512b82cfd843b13487c79dc5c7f07c84a236cf2065d69c9e0a79d36ac1afc78fa04fba30c31903f48d1d2d44f17fb951002e90fb4e92b9eae7677dbb6f023e68919
-
Filesize
624B
MD5ec1d35bddeb2a6e56644f916224ea77d
SHA16c3143cd76a508486d5346f64343e4795db343b4
SHA256686a6715a2edf3ea26ee59485b33b9e56320a43877e35345224ebae67ce10a88
SHA51221c45d7ffffc54adec8073872a217ebfd86feb75c56d4e0c64789b07e8d3f195ff47653b7d22a8ff05da98d8db9bf9f861803a07eb1e876d4c3085c473faa82d
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
870B
MD56df650e6ebe9953af62e658b36284e87
SHA1edf89fe0af515ba693cba16b31bd893856dc3f11
SHA25675633edd9a6353ed8bd7654dfe7f9ca81d7b7e9e9f9a1e10c010697a9cc4edb4
SHA512eb61687e355bc3c2aab9d4d325b569cf3ec59984a1d0565fe58aa25f3390b53470a7f738206eb19a2f7cd7b3f63f2070972667ee61b354c147ac0df5557315d1
-
Filesize
870B
MD5e00cdfb1c9d21ff10f76b58c5ae95422
SHA1ebe2c8562f3b9d7fef1dcc853b81bb7c0424cd3a
SHA2566b9070efa40926dc07560f52a6cde9ce18fc87fcfe99bff169e933b97fc32d99
SHA51256c669fce55a992e732851379321f221bfb5cfb152691c10113c1570acc8e2fbfaf825a54a6d37d379f4f55b5bce1b1777a43c626e9ff49bdb203bb8e8684b68
-
Filesize
870B
MD5c3d2459f981cc32c25c5189ac5a7ccd3
SHA15a8866e07d526fa4117fe0c082e4963c24b591f5
SHA25668136124603e576f184afdd0660b3be8137bd1b608bf71bcdd6e44b824a93774
SHA512025346fc4ff540a5c454b7edd2b7239117c0e24454e8c1894f27b1244c11dff1e34bb21bd74e3accd73cd80d49a567a5cc2178479d8954d8ad014857a0bbed95
-
Filesize
6KB
MD5861d59c280a2a7955d0c6ffd2195a719
SHA1f969cc3bf8342cb6f93e57334a3bfa0ba9147111
SHA256e4a53abccda7618392d5d5be1a2cf2e057eea05b602057a665f54594c8fee273
SHA5120aeee7df943f79b3f43efca5d532a73135afc73e2b078627e2906dcf2c184363853c4b4e457910b511120e14fbb54192517666b8bcfed43f7dc6b53da2550c12
-
Filesize
5KB
MD5f317de4887e450f2c53d61203bd7d856
SHA10e7276f9bb2e95963cd60684004e92ccd8624925
SHA256ed84bf93df2bf29888aad7c8da5fd9ac2ffdcf72fcf15a7c06dfbac235172f9a
SHA51268a5d07d58393ee4731ea6f3c066356a9d3ed9cf79c5d6d11b3a79f6089e259c5ac50c99a2bc1e71a6abf9cc5a8a3c5302a1e71b3cfbdb777e800f1e5d9505b8
-
Filesize
128KB
MD5ef3062186dc9c5df8497c79bcb5239f8
SHA1110961e91fa9d2ab6460db66541d8212243a4c28
SHA256c1e43b1495fe04fcf95db42b7e6731fb2dd54036a77f645067ae3eaf99ff0836
SHA512047ced89b745442babd2c54f599625967fbed0287a84428c1003d65d6707e8e2aafdf5a3e8d063f2f86b07d9763ddbdbc303b16ecdb67d644022181fa644db4d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e