Analysis
-
max time kernel
299s -
max time network
299s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
09/06/2024, 04:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://pcfsf3.com/
Resource
win10-20240404-en
General
-
Target
https://pcfsf3.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133623825076982878" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2412 chrome.exe 2412 chrome.exe 4200 chrome.exe 4200 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe Token: SeShutdownPrivilege 2412 chrome.exe Token: SeCreatePagefilePrivilege 2412 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2412 wrote to memory of 4592 2412 chrome.exe 75 PID 2412 wrote to memory of 4592 2412 chrome.exe 75 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 4632 2412 chrome.exe 77 PID 2412 wrote to memory of 488 2412 chrome.exe 78 PID 2412 wrote to memory of 488 2412 chrome.exe 78 PID 2412 wrote to memory of 4364 2412 chrome.exe 79 PID 2412 wrote to memory of 4364 2412 chrome.exe 79 PID 2412 wrote to memory of 4364 2412 chrome.exe 79 PID 2412 wrote to memory of 4364 2412 chrome.exe 79 PID 2412 wrote to memory of 4364 2412 chrome.exe 79 PID 2412 wrote to memory of 4364 2412 chrome.exe 79 PID 2412 wrote to memory of 4364 2412 chrome.exe 79 PID 2412 wrote to memory of 4364 2412 chrome.exe 79 PID 2412 wrote to memory of 4364 2412 chrome.exe 79 PID 2412 wrote to memory of 4364 2412 chrome.exe 79 PID 2412 wrote to memory of 4364 2412 chrome.exe 79 PID 2412 wrote to memory of 4364 2412 chrome.exe 79 PID 2412 wrote to memory of 4364 2412 chrome.exe 79 PID 2412 wrote to memory of 4364 2412 chrome.exe 79 PID 2412 wrote to memory of 4364 2412 chrome.exe 79 PID 2412 wrote to memory of 4364 2412 chrome.exe 79 PID 2412 wrote to memory of 4364 2412 chrome.exe 79 PID 2412 wrote to memory of 4364 2412 chrome.exe 79 PID 2412 wrote to memory of 4364 2412 chrome.exe 79 PID 2412 wrote to memory of 4364 2412 chrome.exe 79 PID 2412 wrote to memory of 4364 2412 chrome.exe 79 PID 2412 wrote to memory of 4364 2412 chrome.exe 79
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://pcfsf3.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff9a6479758,0x7ff9a6479768,0x7ff9a64797782⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1828,i,2931577546035398349,4650839697319304042,131072 /prefetch:22⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1800 --field-trial-handle=1828,i,2931577546035398349,4650839697319304042,131072 /prefetch:82⤵PID:488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 --field-trial-handle=1828,i,2931577546035398349,4650839697319304042,131072 /prefetch:82⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2832 --field-trial-handle=1828,i,2931577546035398349,4650839697319304042,131072 /prefetch:12⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2864 --field-trial-handle=1828,i,2931577546035398349,4650839697319304042,131072 /prefetch:12⤵PID:3876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3892 --field-trial-handle=1828,i,2931577546035398349,4650839697319304042,131072 /prefetch:12⤵PID:2836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3692 --field-trial-handle=1828,i,2931577546035398349,4650839697319304042,131072 /prefetch:12⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4304 --field-trial-handle=1828,i,2931577546035398349,4650839697319304042,131072 /prefetch:82⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4020 --field-trial-handle=1828,i,2931577546035398349,4650839697319304042,131072 /prefetch:82⤵PID:812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3900 --field-trial-handle=1828,i,2931577546035398349,4650839697319304042,131072 /prefetch:12⤵PID:4064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3364 --field-trial-handle=1828,i,2931577546035398349,4650839697319304042,131072 /prefetch:12⤵PID:3280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2336 --field-trial-handle=1828,i,2931577546035398349,4650839697319304042,131072 /prefetch:12⤵PID:3176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3036 --field-trial-handle=1828,i,2931577546035398349,4650839697319304042,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4200
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD506fda5021649e3aafeee8097f65f798a
SHA16c42f26042860f894c6e2b91af8d2ae2e06e7b20
SHA25661f9163a2f24069cdd961eb391e93d74551628549fd7e652167ef0fb0e97bf42
SHA512d0431483b1f789722a4cda341687dba3aa9e9d83fc2cf5ab4722436b79006d3ef09099049d6a5af1db38d5526e7c58e0b7c6edbddea3c62f6f94859879267302
-
Filesize
5KB
MD539adfd3096d8006cf2188eebf4b2e7c1
SHA137bacd44fa41af55980efdad1bafc45c91602144
SHA25680d0defc6e5b6ca726ca770d0fc06c9419a7b4c1c10a9d576fc48008b16d6b5e
SHA51286bfdd04c8b761037aeddc22f4f6b4b88f8652334486d7d0cb3d752bdd9c3766df11ed79d0af13df0ddc9f1218eee888b453c7a90b1dd23e94cfbf8e6a7903eb
-
Filesize
5KB
MD5d17a5e584bb3a7c033d13164b784fa3b
SHA1293766e5f1d3e6ba86faf5b396afa4405bea7262
SHA2562bd1b692eb419f7ab7b0ca78c6ac5dfb55aeeb17edb66991dc665b110f89fa52
SHA5120054c2796d2487ede20afd9e6a5e72c960dca1ca98c49743130671943764617297ef995e57ba2437ef6420741a3832fd02f43c4af303ef35cbce8a16add56655
-
Filesize
136KB
MD51b5bfb532100324feb222c68be1e4c58
SHA1f93e3c499b7897b40608a0a7a4cf12fccadb3dbc
SHA256f78a5ff83a9d77c011d045b3cca2df15b82f228b7812296431292edcda6394c8
SHA512e9ab45df81d9f27fdc1695e84e24023f1c2b4f320b51402fa963a072a38e3ddb04fb01039671b3a9f7617758974685d89ebea9441ac32222ec42b2a889585112
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd