Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 11:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://dom.gosuslugi.ru/sso/esialogin?Location=%2Forganization-cabinet%2F%23%21%2Fhcsi%2Fnnl%3Fview%3Df4d46f39-042e-4e48-8dfc-c62d729bee28
Resource
win10v2004-20240508-en
General
-
Target
https://dom.gosuslugi.ru/sso/esialogin?Location=%2Forganization-cabinet%2F%23%21%2Fhcsi%2Fnnl%3Fview%3Df4d46f39-042e-4e48-8dfc-c62d729bee28
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133616293419113641" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 944 chrome.exe 944 chrome.exe 4052 chrome.exe 4052 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 944 wrote to memory of 1944 944 chrome.exe 83 PID 944 wrote to memory of 1944 944 chrome.exe 83 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 1624 944 chrome.exe 84 PID 944 wrote to memory of 4632 944 chrome.exe 85 PID 944 wrote to memory of 4632 944 chrome.exe 85 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86 PID 944 wrote to memory of 3612 944 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://dom.gosuslugi.ru/sso/esialogin?Location=%2Forganization-cabinet%2F%23%21%2Fhcsi%2Fnnl%3Fview%3Df4d46f39-042e-4e48-8dfc-c62d729bee281⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffdfb52ab58,0x7ffdfb52ab68,0x7ffdfb52ab782⤵PID:1944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1888,i,10910466324794814099,2375714667864898531,131072 /prefetch:22⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1888,i,10910466324794814099,2375714667864898531,131072 /prefetch:82⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2200 --field-trial-handle=1888,i,10910466324794814099,2375714667864898531,131072 /prefetch:82⤵PID:3612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1888,i,10910466324794814099,2375714667864898531,131072 /prefetch:12⤵PID:1592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3092 --field-trial-handle=1888,i,10910466324794814099,2375714667864898531,131072 /prefetch:12⤵PID:924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4380 --field-trial-handle=1888,i,10910466324794814099,2375714667864898531,131072 /prefetch:82⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4524 --field-trial-handle=1888,i,10910466324794814099,2375714667864898531,131072 /prefetch:82⤵PID:4444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4500 --field-trial-handle=1888,i,10910466324794814099,2375714667864898531,131072 /prefetch:12⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4128 --field-trial-handle=1888,i,10910466324794814099,2375714667864898531,131072 /prefetch:12⤵PID:4580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4420 --field-trial-handle=1888,i,10910466324794814099,2375714667864898531,131072 /prefetch:12⤵PID:3560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1616 --field-trial-handle=1888,i,10910466324794814099,2375714667864898531,131072 /prefetch:12⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2276 --field-trial-handle=1888,i,10910466324794814099,2375714667864898531,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4052
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58ae812bda84c289da4a215d5e5a80389
SHA1fcaa95cb2503d899202c17d97b52ec4074d7187a
SHA2567b92024f4bb963251c4fecff96e63560479cf4915c9ea94e267d763ee2b29929
SHA512481950bfc197536405c12a5590daac42080221874d07101cd40cf4b3e0c564140c0d19b58d42f5666b86746788155eb77f270ed9fd8bbe01e001fcda3ff5db43
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD593c6b5bb628ba612c7c26b28e1c8a467
SHA19bb7dc490588248560e02f9b9850c525be14593a
SHA2568cb6b797454f06429fbbf83291862484d0279a09559117445d552c8b94278a39
SHA5122854f7feffb2310ca89adb52d2c8e6fe1246e4a1b51255e6e265b4599f40cdaccf6bef8ad32bcd30df246610e3a458e0208c0bd71afbcfabd48efd49c5d84261
-
Filesize
129KB
MD5adc6f9f70720bea6d8b2f52976a25b83
SHA17e8df41cb0f03251cfb6533e108369da924b5c76
SHA256e64cb1487bebdfa5f012c5a201e0b6e3c0e9df88dae9ee0c6145e6ec80cc2f66
SHA5123705a83dd180b709d99e9a872e62208b7a726ebc495626bda58b1026ccba1aa491167998ae6c18dd549ad479b766c705f466dd48a5f38be986c3b4be5cfb020e