Analysis
-
max time kernel
299s -
max time network
264s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
03/06/2024, 15:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://spacardportal.works.com/gar
Resource
win11-20240508-en
General
-
Target
https://spacardportal.works.com/gar
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133619036381552980" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1128 chrome.exe 1128 chrome.exe 1884 chrome.exe 1884 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe Token: SeShutdownPrivilege 1128 chrome.exe Token: SeCreatePagefilePrivilege 1128 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe 1128 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1128 wrote to memory of 3044 1128 chrome.exe 81 PID 1128 wrote to memory of 3044 1128 chrome.exe 81 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 1644 1128 chrome.exe 82 PID 1128 wrote to memory of 2516 1128 chrome.exe 83 PID 1128 wrote to memory of 2516 1128 chrome.exe 83 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84 PID 1128 wrote to memory of 3472 1128 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://spacardportal.works.com/gar1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8afaeab58,0x7ff8afaeab68,0x7ff8afaeab782⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1500 --field-trial-handle=1784,i,16200124771554316678,16261184848185054419,131072 /prefetch:22⤵PID:1644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=1784,i,16200124771554316678,16261184848185054419,131072 /prefetch:82⤵PID:2516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2144 --field-trial-handle=1784,i,16200124771554316678,16261184848185054419,131072 /prefetch:82⤵PID:3472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3016 --field-trial-handle=1784,i,16200124771554316678,16261184848185054419,131072 /prefetch:12⤵PID:1432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3152 --field-trial-handle=1784,i,16200124771554316678,16261184848185054419,131072 /prefetch:12⤵PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4312 --field-trial-handle=1784,i,16200124771554316678,16261184848185054419,131072 /prefetch:82⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3972 --field-trial-handle=1784,i,16200124771554316678,16261184848185054419,131072 /prefetch:82⤵PID:2256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4260 --field-trial-handle=1784,i,16200124771554316678,16261184848185054419,131072 /prefetch:12⤵PID:1184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3144 --field-trial-handle=1784,i,16200124771554316678,16261184848185054419,131072 /prefetch:12⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3804 --field-trial-handle=1784,i,16200124771554316678,16261184848185054419,131072 /prefetch:12⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2412 --field-trial-handle=1784,i,16200124771554316678,16261184848185054419,131072 /prefetch:12⤵PID:3720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2304 --field-trial-handle=1784,i,16200124771554316678,16261184848185054419,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4444 --field-trial-handle=1784,i,16200124771554316678,16261184848185054419,131072 /prefetch:12⤵PID:420
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5711323f7838002c9dd53fc661a41381e
SHA109ec2ae26d3bf25b570b20632ab6257b85bac947
SHA256bd6b8cde8909064e773015321fbfa585df8cd0c428af8f901d7a94f1ade4d71b
SHA5123c66a4e5d1cce876cf62fe095254bfb0fbf9457d22d126a3667d480a272cb729ced6fa5274ffa982c31db2744d82e9c2b1b8a1730b99af0b677f70da9884b99f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD5490ad97bda17628d2d1b128e8e9d6bf0
SHA16189e595661a0ccd2fef482bd563cbc50db60837
SHA256ef8eba70944d91bdb65d01ec1eebabd96d2a89980c16e9fb82c0676d2ab24e90
SHA512d72c384bab00400252a2e419dc90813dc0f38e87544e9c0753bf9a84c859e53f633e634d938afac8508e6e0a51f8980a958b0eab1b8a4aff4d4c6e7e5e372c69
-
Filesize
129KB
MD58f3a0b2dece8695ad953578d64ec7aaa
SHA1e81154023952efb72fcc2de1254500f1e19c383b
SHA25618457e4a697f1f2ddf9d12e978cfc694de24e9a0a3633e27921889a951fbd127
SHA5129579477e59c3a881dcb2588e63852b6e55c937e9e04e289e2b6f04adc7a98d962b1b03965b9626a2ca7cba7e19955dbd1b2b9292d7fc2f52798eecd5c5501a24