Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
26/05/2024, 12:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://orbim.bz/ata/5714
Resource
win10-20240404-en
General
-
Target
https://orbim.bz/ata/5714
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133612017301111035" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1452 chrome.exe 1452 chrome.exe 3804 chrome.exe 3804 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1452 chrome.exe 1452 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1452 wrote to memory of 4788 1452 chrome.exe 73 PID 1452 wrote to memory of 4788 1452 chrome.exe 73 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 2288 1452 chrome.exe 75 PID 1452 wrote to memory of 1356 1452 chrome.exe 76 PID 1452 wrote to memory of 1356 1452 chrome.exe 76 PID 1452 wrote to memory of 3296 1452 chrome.exe 77 PID 1452 wrote to memory of 3296 1452 chrome.exe 77 PID 1452 wrote to memory of 3296 1452 chrome.exe 77 PID 1452 wrote to memory of 3296 1452 chrome.exe 77 PID 1452 wrote to memory of 3296 1452 chrome.exe 77 PID 1452 wrote to memory of 3296 1452 chrome.exe 77 PID 1452 wrote to memory of 3296 1452 chrome.exe 77 PID 1452 wrote to memory of 3296 1452 chrome.exe 77 PID 1452 wrote to memory of 3296 1452 chrome.exe 77 PID 1452 wrote to memory of 3296 1452 chrome.exe 77 PID 1452 wrote to memory of 3296 1452 chrome.exe 77 PID 1452 wrote to memory of 3296 1452 chrome.exe 77 PID 1452 wrote to memory of 3296 1452 chrome.exe 77 PID 1452 wrote to memory of 3296 1452 chrome.exe 77 PID 1452 wrote to memory of 3296 1452 chrome.exe 77 PID 1452 wrote to memory of 3296 1452 chrome.exe 77 PID 1452 wrote to memory of 3296 1452 chrome.exe 77 PID 1452 wrote to memory of 3296 1452 chrome.exe 77 PID 1452 wrote to memory of 3296 1452 chrome.exe 77 PID 1452 wrote to memory of 3296 1452 chrome.exe 77 PID 1452 wrote to memory of 3296 1452 chrome.exe 77 PID 1452 wrote to memory of 3296 1452 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://orbim.bz/ata/57141⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffbe5449758,0x7ffbe5449768,0x7ffbe54497782⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1564 --field-trial-handle=1880,i,17125744780290395785,16459951983306689688,131072 /prefetch:22⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1808 --field-trial-handle=1880,i,17125744780290395785,16459951983306689688,131072 /prefetch:82⤵PID:1356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1836 --field-trial-handle=1880,i,17125744780290395785,16459951983306689688,131072 /prefetch:82⤵PID:3296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3032 --field-trial-handle=1880,i,17125744780290395785,16459951983306689688,131072 /prefetch:12⤵PID:3968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3124 --field-trial-handle=1880,i,17125744780290395785,16459951983306689688,131072 /prefetch:12⤵PID:3204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4880 --field-trial-handle=1880,i,17125744780290395785,16459951983306689688,131072 /prefetch:82⤵PID:2612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 --field-trial-handle=1880,i,17125744780290395785,16459951983306689688,131072 /prefetch:82⤵PID:4212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3628 --field-trial-handle=1880,i,17125744780290395785,16459951983306689688,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3804
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
550B
MD5e23dec250753e5108d83de958b853694
SHA13a3d552a2fe2cffd5176368795d2c82f65ff82f6
SHA256587503c44269e0a491b201717f6cbd9aed9f43f6ad3aad1a48a2641056fbdeab
SHA512df38acc933033262c73bb0d51f8173c9cc76d9581f7136358411f21706bdef0b959d365be649fab487d5deacc9cd5749f1be46b2f8225c7a40822b932dcf3285
-
Filesize
5KB
MD53eb2f0f7e24063d1950bb54a9028a766
SHA11d85fa9b516779c06b5635ab0b78dcc434601bc9
SHA25663c3fc6b94bec7be5e7718d8c001aca7d996fab094fd22f311a95a03ed4e0124
SHA512502537ff47a5e5bb6992f9ff20e23cc4cb388fca358853d8f82cf0647d614bb8f03445d7f05736901b590e76c179ea61899e3ec524b2e3546d188dc526f7b9b7
-
Filesize
5KB
MD578277470117bfe680cbe5b15940f8cb2
SHA1207c5b64017ea079d400b6ad822526d2319d536f
SHA2568c4ba04601c0b489b2cebf161cbbd87828306d690508bf46b4c55aa73ca5d373
SHA5125ec83f49eec0aadc6006ac860f2f23b413acffa319d29e936fbb983845ff91a22c031e88b2a54a53761c9cd7a33d8e4043ff64bc780026a4a5baf76adfb3ad4f
-
Filesize
5KB
MD5e98f38d3d05b0a0b07b6c46aaabe0992
SHA1513d4d517fdaa829b6f565a56ea64337c11af05c
SHA256da8bd335118f83e99508955bc82e6d78f70d5a3a22a02a1bb10a8616492cbe42
SHA5129e4c91a53945ac438a064c6b5a58d0ecd1eb9525fccd148fb5a9f6f4190c29c60aeb56dc1b5da7bfccb5fd0f44c0a9cd23624a65c0fde6e85045ffb347fb590a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\ff73d52c-882d-432b-81f9-1bfc0ae787c3.tmp
Filesize6KB
MD509a059932935b50254413a4320ed7f80
SHA178a1e7f14c129fcf6b16eef1fda2d3e2acc686a5
SHA2564d581b8d4195b93736c0d98e01fe45bd2cada152fdc3ebfdd78ff5a211f941e6
SHA512c0bc8f25cfe016ae7245dce52a2655cb41aad09283ce1b1242a6bf4a1c2813fab126a36a256ee051df55a26710496f1d01a943e752861e0730ccd5efc77bee18
-
Filesize
136KB
MD5cb5d3eae06ccd1d747128241c49def6e
SHA18b9b6ac04640f323ee18a35fac15a507398621bb
SHA256827090f274de65b8e6f0dba0bf92bdb8fbec56a8a32d27335d8a2a9abc03583e
SHA51251300498e7e0b98b05fc0aaa5723da15871d921ada76ab5f4624fbc9a27d84e61ecbd792cf5fa8c78c352506c16a5aa9954d2886705af1df7fec5d15a0dcf324
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd