Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 18:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://onetag-sys.com/prebid-request
Resource
win10v2004-20240508-en
General
-
Target
http://onetag-sys.com/prebid-request
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133620844854818769" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 3284 chrome.exe 3284 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 884 chrome.exe 884 chrome.exe 884 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 884 wrote to memory of 4324 884 chrome.exe 83 PID 884 wrote to memory of 4324 884 chrome.exe 83 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 2040 884 chrome.exe 84 PID 884 wrote to memory of 5056 884 chrome.exe 85 PID 884 wrote to memory of 5056 884 chrome.exe 85 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86 PID 884 wrote to memory of 3732 884 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://onetag-sys.com/prebid-request1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff956edab58,0x7ff956edab68,0x7ff956edab782⤵PID:4324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1688 --field-trial-handle=1896,i,11615558660889618683,7108913808743636021,131072 /prefetch:22⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1896,i,11615558660889618683,7108913808743636021,131072 /prefetch:82⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2208 --field-trial-handle=1896,i,11615558660889618683,7108913808743636021,131072 /prefetch:82⤵PID:3732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1896,i,11615558660889618683,7108913808743636021,131072 /prefetch:12⤵PID:3272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2924 --field-trial-handle=1896,i,11615558660889618683,7108913808743636021,131072 /prefetch:12⤵PID:3132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3528 --field-trial-handle=1896,i,11615558660889618683,7108913808743636021,131072 /prefetch:12⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4292 --field-trial-handle=1896,i,11615558660889618683,7108913808743636021,131072 /prefetch:82⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4460 --field-trial-handle=1896,i,11615558660889618683,7108913808743636021,131072 /prefetch:82⤵PID:2224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4444 --field-trial-handle=1896,i,11615558660889618683,7108913808743636021,131072 /prefetch:82⤵PID:3880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4468 --field-trial-handle=1896,i,11615558660889618683,7108913808743636021,131072 /prefetch:82⤵PID:3972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4564 --field-trial-handle=1896,i,11615558660889618683,7108913808743636021,131072 /prefetch:82⤵PID:228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4568 --field-trial-handle=1896,i,11615558660889618683,7108913808743636021,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3284
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257KB
MD5ecd7986ed79a8c9202b35ce82821df59
SHA199f1aea510aadfc2da689b0f95caf7860e26f89c
SHA2566e657f3e41649a681369dc6aff70c0c9f7aee293ad324df308b685446e44cd06
SHA512d7da3c47d59e79c07c7f0ccdc60c44a2903012bbfa9a48841ba888d61b0dfec0a90179174559400c99878b79217fd9a5baf6e6e4263bd23b3553aa4e4064d591
-
Filesize
2KB
MD545afd19aa8d43a86009e79bbdf91317f
SHA14c2b78d74564f44687f739c6fea6c0c395a1436c
SHA256a2ac626525e1288e25e94acebb3c8b1a137de207fa4f5ac19af487049c77a796
SHA5122c4fdefae09d286521b6896074cf3849a798d8d1c44d982053fb0211b239b02a93519443e9f22e807cb3a56597a2a772ebc3b930d12bf1b986ffb043e23bb5ee
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5a6ae8ef8229f5f23ba0b3b9696ca3a32
SHA12a25510158beb74603736c9a9abd6b8bf3d5d10a
SHA2561d70ad85ab91f3a62ec4c99db2041c5cd1052894da443fb907b67e8644de5441
SHA51245f3419b3a3aa75479ffe288056aad3fab9b963bad397d2161ae75ff3bc4e7bc3199d016031b0f618467b73b7e4cc913ad3e2dd45703c59dd467c98ece930f1d
-
Filesize
7KB
MD542fc322e71678048d249fbbb1ed3ef97
SHA16a4867225911b5bd22f0adeafb956bf2444936c6
SHA25622441208f01444207423dd38510d4f77cacabdb11618b297d00143d9a207f902
SHA51275351599cb44f6b017d88ef1040e6265b06097a610aa444015bb2a5b4ba91d22e84288b8e0c9fd23876c39d4c6c31004f6a19f24fc4ac47ca329ef75a1506b98
-
Filesize
7KB
MD511616f7aed5aedf5cac0c4d0ab0e765d
SHA12f57219037a837ec96aacc4d7da45b6828f6973f
SHA2560125b97425872390fdc71a53a40600588220f8a27c59542e1db15ecc8df74aa7
SHA5120d888468c9094a382f89ae07e51088fc6f801747b8ff91d0ad12f7ad34acf86517864fbe17e779bd70abbc1aaad60c925a982a764add45c35ad513874c15e036
-
Filesize
277KB
MD57d6dd84814f083e2b756deeba5db525d
SHA196d58e7aa6b9461202cdf7a9e04ee09564e43c1d
SHA25677996219897a0d64019f14f081314d65c4b8852c923203efc5f638caf9218494
SHA51279f79f55efea96e228f5167c46ee62a949f9e83336c3217cf687f0da9222518aafe51c2cf38b5011435c039d16769d785b1ffb7d895d3d99302c1626a0f4b75a
-
Filesize
257KB
MD54c01cfc83f3cb655d5553652947fd66f
SHA1d518d07a685267e922bfc548bee44c70399f503b
SHA256726bf353371404e26f107663d839b6c085e8af2112276c8f7085db370c80ba20
SHA5120563c91097dbf059aa43f5bd3affdd171009e30d826367f05b3042e1dd51cec48a9653a5d91629ed38ecc4a2850c4ff0ab26041522d18267c3e53004ce4a2f1a
-
Filesize
257KB
MD5a9710e4538a243f1814272c0c9ab0d3d
SHA11da123965c0bf845c0aec19f3e99800b282b6ca2
SHA25636c3cd64581b67e28d035a11b15f0cb406143655f13651770df3b17d9bd09bcc
SHA5120975a700752460cf74f27ee4662ed17b51dbe648f3fd9f3e8712185e32baad4937c48a6be725802164a43ced7e07da173e35e18a89b1d4bc3ac0bfb305a7a9c9
-
Filesize
91KB
MD5acf730cd00d1523b6122ed767da2ea18
SHA1c82a333f7fbfd5c9ffe1643fafd6b14edd7ce3c7
SHA256e045d5c3b88b079274c5064c31dbf3613cbc0aec7aeb7a85019f4189407ca3a8
SHA512e8cd1efd9e493ad15f7ec8ab7107a85aa3c2edfe60e90e1be6ab87ea4388fd12e68798b508be66ab4c8eade4d85d5d32cbcc26f39b8faa525064691a72bcdcea
-
Filesize
88KB
MD5caca958f1d4e6fbb9a11fec36dd5b483
SHA1110c9abb24643f9f3ba4e2c69268166727544356
SHA2560e83500fb5005f950aa41167a3af5fc23d249131671de0f64d07a629fa22a98d
SHA512ef0537dc9555a610140b0ec33943428bdc33833969185ab4f25f16aacaf4577949991eed66f41d5cf0f33d30b69d0d2abb855b0ed4a6265e9b885f1260be4692