Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://GET-admin.chatbots.abb.com/page
Resource
win10v2004-20240508-en
General
-
Target
http://GET-admin.chatbots.abb.com/page
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133608201432182629" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 1668 chrome.exe 1668 chrome.exe 3556 chrome.exe 3556 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
chrome.exepid process 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1668 wrote to memory of 4236 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4236 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4656 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 3256 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 3256 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe PID 1668 wrote to memory of 4028 1668 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://GET-admin.chatbots.abb.com/page1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9496eab58,0x7ff9496eab68,0x7ff9496eab782⤵PID:4236
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1604 --field-trial-handle=1880,i,12052737121837011704,11022391170736558072,131072 /prefetch:22⤵PID:4656
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1880,i,12052737121837011704,11022391170736558072,131072 /prefetch:82⤵PID:3256
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2252 --field-trial-handle=1880,i,12052737121837011704,11022391170736558072,131072 /prefetch:82⤵PID:4028
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2808 --field-trial-handle=1880,i,12052737121837011704,11022391170736558072,131072 /prefetch:12⤵PID:924
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2816 --field-trial-handle=1880,i,12052737121837011704,11022391170736558072,131072 /prefetch:12⤵PID:4288
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4176 --field-trial-handle=1880,i,12052737121837011704,11022391170736558072,131072 /prefetch:12⤵PID:3716
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3448 --field-trial-handle=1880,i,12052737121837011704,11022391170736558072,131072 /prefetch:12⤵PID:5032
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4064 --field-trial-handle=1880,i,12052737121837011704,11022391170736558072,131072 /prefetch:82⤵PID:3280
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3416 --field-trial-handle=1880,i,12052737121837011704,11022391170736558072,131072 /prefetch:82⤵PID:4760
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3948 --field-trial-handle=1880,i,12052737121837011704,11022391170736558072,131072 /prefetch:12⤵PID:2280
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1564 --field-trial-handle=1880,i,12052737121837011704,11022391170736558072,131072 /prefetch:12⤵PID:3224
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2652 --field-trial-handle=1880,i,12052737121837011704,11022391170736558072,131072 /prefetch:12⤵PID:2388
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2448 --field-trial-handle=1880,i,12052737121837011704,11022391170736558072,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3556
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3740
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4204,i,10373433614523925616,13586256558317053467,262144 --variations-seed-version --mojo-platform-channel-handle=4028 /prefetch:81⤵PID:544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b33c0c237b7d9a44aeb2fa4a959443db
SHA171055decf8a36a97e8affd444636a164ab67bf7b
SHA2566c3d963915874e98cc31cc332d2b396f02623de846aca901fcf5aa16cdf3cea8
SHA5126d8afdcc602c21542e1e6d8c4626c92a8016b1ac6947989a32d51fb4a5f323c05a51f6877f8df7f7f2c5f273c9b5d6aac90ceff57556a1d804a55340680f966c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD5b8b0d5441fd84a15b359b8683a3a3119
SHA14e5b5fe6e7158603c22f188cd2b4f76279a0620f
SHA25687925d8a09dab07b82f0050af2c3cb3d9ceeb14b78ae99011e91cd5f678e8635
SHA51253bac382fa5056deb1a703bfbf289f2e49a1aefbae3b748fb3671922d1d808a15e4341b611a84f47fb7973495cc36770e01d2b27c89f8adb08269c850e5c260d
-
Filesize
255KB
MD51ccf0acb7c11cffd8d35fa1c293dfe41
SHA1bda8e6aab5c28d27c22fb0a52014f92d983b7fb8
SHA2562d6ed68edbed7d1aca1d0cd4164404b8d3dd0010065ea24e00251f115e5a9c5a
SHA5122522cd3a931679624d8942c95f986b1a79e0e775e8eba8a8b7cfea50ce2d26120c977df897f5b35d9cae17cc2709aed0993543e2e648c83a4d31c75f12a22724
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e