Analysis
-
max time kernel
329s -
max time network
324s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 00:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://d3fqilfp3e.jsv-center.com/main.php?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
Resource
win10v2004-20240508-en
General
-
Target
https://d3fqilfp3e.jsv-center.com/main.php?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
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133615878974655365" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1768 chrome.exe 1768 chrome.exe 4036 chrome.exe 4036 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1768 chrome.exe 1768 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe Token: SeShutdownPrivilege 1768 chrome.exe Token: SeCreatePagefilePrivilege 1768 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1788 1768 chrome.exe 90 PID 1768 wrote to memory of 1788 1768 chrome.exe 90 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 1292 1768 chrome.exe 91 PID 1768 wrote to memory of 4552 1768 chrome.exe 92 PID 1768 wrote to memory of 4552 1768 chrome.exe 92 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93 PID 1768 wrote to memory of 4888 1768 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://d3fqilfp3e.jsv-center.com/main.php?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⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdb251ab58,0x7ffdb251ab68,0x7ffdb251ab782⤵PID:1788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1888,i,2497933083999674184,7432122980821991288,131072 /prefetch:22⤵PID:1292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1888,i,2497933083999674184,7432122980821991288,131072 /prefetch:82⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2212 --field-trial-handle=1888,i,2497933083999674184,7432122980821991288,131072 /prefetch:82⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1888,i,2497933083999674184,7432122980821991288,131072 /prefetch:12⤵PID:3504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2972 --field-trial-handle=1888,i,2497933083999674184,7432122980821991288,131072 /prefetch:12⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4320 --field-trial-handle=1888,i,2497933083999674184,7432122980821991288,131072 /prefetch:82⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4444 --field-trial-handle=1888,i,2497933083999674184,7432122980821991288,131072 /prefetch:82⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1888,i,2497933083999674184,7432122980821991288,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4036
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3068
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4404,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=4164 /prefetch:81⤵PID:2284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD546c19827f0609e61e20c27ae9d8d921a
SHA139d780c799c20ba819c32f50897ff8d215ff9d48
SHA25642d1299746d2031643a2e00bfd7e91e7f5cbb1c2d1d79ce236bff1618b0e8e51
SHA512d3d2e9e97af4e0498687f631f5553f83e1c6727a9996af31930755423c2a437011cf120856abcaa555b02c2bb699635641b3d3740cac376b20142c3d4d2c721d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5985938985cf123caf9fe47cd340f26ba
SHA1b45be713726f94460d22e0ed99db705f85e8913a
SHA2565b039dd0da5bdc0f1f1ced07cdc1aaf201142da0b9b853ddf1ab84f85f771763
SHA5127d83363a474d18c397eddcf79c59f0e57c495e253e7133ccdd0722129725181b9e14af87aa4be41e724fcaeb177155a754b0990cbffea0d06461913bdf2d95f8
-
Filesize
255KB
MD5158b4c407b4d189fe4ba55be9a26def4
SHA1a42a966141037941b4bc8cabc665155bf85f46fb
SHA256ff16d05e6df3b7cf334c291a7a15a20bc42828d96667f654e1094ddcd39e9697
SHA512901b56f6ce675318c22455a21277a92040aa76e939c3b8bdca7a535bec250d91369ca6625162bf3e66ffa47d71cbf15870a7d26c8927ffdb0eb1b57921a5ef3f