Analysis
-
max time kernel
72s -
max time network
74s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 17:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://tpciga.org/2022AuditedFS.pdf
Resource
win10v2004-20240508-en
General
-
Target
http://tpciga.org/2022AuditedFS.pdf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133608729270636770" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1652 chrome.exe 1652 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe Token: SeShutdownPrivilege 1652 chrome.exe Token: SeCreatePagefilePrivilege 1652 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1652 wrote to memory of 5000 1652 chrome.exe 83 PID 1652 wrote to memory of 5000 1652 chrome.exe 83 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 4368 1652 chrome.exe 84 PID 1652 wrote to memory of 3372 1652 chrome.exe 85 PID 1652 wrote to memory of 3372 1652 chrome.exe 85 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86 PID 1652 wrote to memory of 3260 1652 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://tpciga.org/2022AuditedFS.pdf1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff825a5ab58,0x7ff825a5ab68,0x7ff825a5ab782⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1900,i,7524543333081930526,7796641033320357565,131072 /prefetch:22⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1900,i,7524543333081930526,7796641033320357565,131072 /prefetch:82⤵PID:3372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2200 --field-trial-handle=1900,i,7524543333081930526,7796641033320357565,131072 /prefetch:82⤵PID:3260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2948 --field-trial-handle=1900,i,7524543333081930526,7796641033320357565,131072 /prefetch:12⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2956 --field-trial-handle=1900,i,7524543333081930526,7796641033320357565,131072 /prefetch:12⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4584 --field-trial-handle=1900,i,7524543333081930526,7796641033320357565,131072 /prefetch:82⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4848 --field-trial-handle=1900,i,7524543333081930526,7796641033320357565,131072 /prefetch:82⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4064 --field-trial-handle=1900,i,7524543333081930526,7796641033320357565,131072 /prefetch:12⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3276 --field-trial-handle=1900,i,7524543333081930526,7796641033320357565,131072 /prefetch:12⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3920 --field-trial-handle=1900,i,7524543333081930526,7796641033320357565,131072 /prefetch:12⤵PID:912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3224 --field-trial-handle=1900,i,7524543333081930526,7796641033320357565,131072 /prefetch:12⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5112 --field-trial-handle=1900,i,7524543333081930526,7796641033320357565,131072 /prefetch:12⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4444 --field-trial-handle=1900,i,7524543333081930526,7796641033320357565,131072 /prefetch:12⤵PID:4792
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52a7e11c2561c9539aeaa863103d00b2a
SHA164faff84192ccd12536c120d4da7493d860e19eb
SHA256d1463f55e28931a4a4c8dde946181dbb389e4d99100e6797e6276d804b6e9147
SHA51262808f3bcb981fb82aa6a4f77fc0883a29ff3e3ac3368835e2b67bc17389a751caafc6857b695bfc08421dd8bbd5069fe53d2bb100a017345c3ed321e42aab97
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD5812bc065fe9b7947366534c6f2920544
SHA1fc324dc012d49c8061e76e14453a47850112138d
SHA2563dd772dc1ee0ad05dd30d68b7178c33597a52b24d68d06a6e54ca22339355824
SHA51252bbcae98bb4249c740fa4a666be4816c25f7babbe3fa1ab79232d48cf5391a1ec32cfef95dc6a9e1bf1dcec3b50d8e82024d8a460b47518e9578ecce7832561
-
Filesize
255KB
MD542da0b392a9862dd78ea2b850dd09169
SHA140d9b3791022cc1073b56c591ec590d02e5d07ff
SHA25684774c8196f22a9a7dcdbf1b4af21003e176d5a80f1ad75b420594cf50714976
SHA512f1f51ac1881e2a16d13b6b073052cb8d8ec84d3cd441c4156ca2339270ed5aaea4aa660a97893d43dec5a34ba54c27143630eebf4f742e93cd2c3586ef8e72c3