Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 07:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://level-selector.abb.com//start.xhtml?uid="><script>alert(document.domain)</script>
Resource
win10v2004-20240426-en
General
-
Target
https://level-selector.abb.com//start.xhtml?uid="><script>alert(document.domain)</script>
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133609247527209780" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2464 chrome.exe 2464 chrome.exe 5008 chrome.exe 5008 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe Token: SeShutdownPrivilege 2464 chrome.exe Token: SeCreatePagefilePrivilege 2464 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe 2464 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2464 wrote to memory of 4540 2464 chrome.exe 82 PID 2464 wrote to memory of 4540 2464 chrome.exe 82 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1852 2464 chrome.exe 85 PID 2464 wrote to memory of 1964 2464 chrome.exe 86 PID 2464 wrote to memory of 1964 2464 chrome.exe 86 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87 PID 2464 wrote to memory of 3176 2464 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://level-selector.abb.com//start.xhtml?uid="><script>alert(document.domain)</script>1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa4a9aab58,0x7ffa4a9aab68,0x7ffa4a9aab782⤵PID:4540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1896,i,16414008957679889100,16777049889648692841,131072 /prefetch:22⤵PID:1852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1896,i,16414008957679889100,16777049889648692841,131072 /prefetch:82⤵PID:1964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2216 --field-trial-handle=1896,i,16414008957679889100,16777049889648692841,131072 /prefetch:82⤵PID:3176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3068 --field-trial-handle=1896,i,16414008957679889100,16777049889648692841,131072 /prefetch:12⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3084 --field-trial-handle=1896,i,16414008957679889100,16777049889648692841,131072 /prefetch:12⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4356 --field-trial-handle=1896,i,16414008957679889100,16777049889648692841,131072 /prefetch:12⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4492 --field-trial-handle=1896,i,16414008957679889100,16777049889648692841,131072 /prefetch:82⤵PID:3400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4212 --field-trial-handle=1896,i,16414008957679889100,16777049889648692841,131072 /prefetch:82⤵PID:4580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=376 --field-trial-handle=1896,i,16414008957679889100,16777049889648692841,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5157600321caa2f4edc58af2912cffebe
SHA11b008de4f64cbd3a2629e5284d74df3c76450e1e
SHA256ba03ced5deb570069c6d56e639d38ab33b629934a79fea5ed5fe24ccc0a3bf58
SHA512b720dcb1d6f22117bf46dd366b94b22ba50b152d90b0e270ebd8bcb92522e04b8f26464578770fbbc8f12b035e61bdf1bacf180002ada9350e604636216e96de
-
Filesize
2KB
MD50a424d1ca81275fe410d5769485baa64
SHA1b0e6d039dbf0c72346d49b0f6c3dad7a3826f3da
SHA25645c8293ae55a6a4087d57b74739a562fe35769f565e1e268d1c3c68a771f9f61
SHA51279d5fbfa8381a5cc43c64a04081ea9eaf0ecb034d947cfa1c5d4121c4d4c97ce4490484b067a1485b7a03a7567102240f28b7bd288edc89e00d2d52b3dd797a9
-
Filesize
2KB
MD5434b179febdf047fd4b43b88e7c543c8
SHA1aa6fb412b3f485a09442a1a6b724a8038ea84095
SHA2565ee0a96f4dc49904184333463a5653946f953950866260b93394f02199f7cbf5
SHA5124104bb6df64229d3ed504f841ad6d85b80b94e36a8f92c5524e942e68e76d307470a01ebb5d37195443a20ac427522963a63808a8df3bb6e1ac7ed4301fc7150
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
858B
MD58bde597644a494176d4e6bc932cc0262
SHA134107919fabb44959a281f64549325fa80c0215a
SHA256b19bac9882beed836dafae8afe452f0d8b464b4afd71ca9d068e039371542f9e
SHA512e591f85c8e59d6badc40232d13157d4c9ed6d93b0d2270cc21589992c94f7ddb8f49b6cd0e03ec17df34422f1ad8944fe784c3308f6aa2563ee3e75599ab426a
-
Filesize
7KB
MD56ba21f9342397d26d963ef8c07afd5b8
SHA1c469e69e4186930a78d69e2f76b91270976c052f
SHA2564853038fafed7fd321f5927d739d40ee3093a95a46a13efe605c97ac620a67cf
SHA512b366632daad59cdb6dd8aa5983129fde98f72be6b2a3177bc29d129ef56df62c9bcb365d998ca364dfea35c98a63229506ac222b9256cd5c2e27d10550b93a19
-
Filesize
130KB
MD5e018a49eab9c64c2cd109599297c7203
SHA1be7907605552ec2a22b16107b42af5113a584c0b
SHA256e16cafd2a7602eb2a034692aff079a695ef497f685877e70ab08b5711056abc2
SHA512a4a2b73c4953fc90880f44c53991d50dad99ee2a622f41e52aba3231627dc6d4c4f6360730ec0110a68aee7853b983ab5e53f672a0049a04f9de39f8489e8b78