Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 06:45
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://npl.qbn.biz/vendor/zoom.html#[email protected]
Resource
win10v2004-20240508-en
General
-
Target
https://npl.qbn.biz/vendor/zoom.html#[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133637715540845099" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 4464 chrome.exe 4464 chrome.exe 1140 chrome.exe 1140 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4464 wrote to memory of 4496 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4496 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4676 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4172 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4172 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe PID 4464 wrote to memory of 4244 4464 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://npl.qbn.biz/vendor/zoom.html#[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf5a8ab58,0x7ffaf5a8ab68,0x7ffaf5a8ab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1892,i,4343965686453573007,17262055809600411893,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1892,i,4343965686453573007,17262055809600411893,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2220 --field-trial-handle=1892,i,4343965686453573007,17262055809600411893,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1664 --field-trial-handle=1892,i,4343965686453573007,17262055809600411893,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3004 --field-trial-handle=1892,i,4343965686453573007,17262055809600411893,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4056 --field-trial-handle=1892,i,4343965686453573007,17262055809600411893,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4520 --field-trial-handle=1892,i,4343965686453573007,17262055809600411893,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4668 --field-trial-handle=1892,i,4343965686453573007,17262055809600411893,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1856 --field-trial-handle=1892,i,4343965686453573007,17262055809600411893,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
384B
MD58cd09f1d02cbe32a70750fd9bfe4b880
SHA103778b6639bb15c7c66fbb652298027bc5b30479
SHA2565be26f5ecea397ad04fcdfa009970a56b4dbbd11800d95f03c63e0d694092297
SHA5129d0c39af7e13d72d51e004bf7fb46e531c651ae43529c7c7a1658ccb3a1f075933af285a0ff2406e8ef441d05566b8713f83159272259b6033348d9c82797159
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
3KB
MD54be0a20047363a415aee56199915855c
SHA1817b39933db6a32bd97158eb3983709c84c212e7
SHA2563d300775af01259cc0daaca5fb44c8748d60b33e6962c143e0fc445925f81e08
SHA5124abbfb0ee2826cba401dc3ae8d3113a667bce41baa40e6239dde9c4dc52735dd31f24bdcb12dd063d430579baa6d0bb59579b46862481989dc96e943fa85d5b7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5a1e493e6f7dd4f5cfbddacd77ee90513
SHA165b9eb094bcb61d4928e74591bf185712b909239
SHA256f9a85be9e53c2b4624e6c2dc1e6ee67d9c594ab756345d2e44b1568c6cf7867a
SHA512928f8d20397247e5e04a57b54665cece4d614839b62d37810e386c277bb3fce65222978451aee63477275b65949899b175f32eedb8e366f89bb0d5b9394be6d5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
2KB
MD508bf81b5e32224419348dd121efc47f0
SHA10385b7b59aa1b0d8e4f3c007a09b69a86b68a7a4
SHA256b8ede4f96b938c23c1879b45363916091db997b6fbc522214389d0a6596dad0f
SHA5125a325c4034cb041464ff03600281342abc973bc5f0d5741dac02bff4cf60031a2aa27bd62e37d1f002bc857150cc539b1f6ec110e983bb5bfa0be0232012a4a2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\b632af9d-27b3-441e-9473-8f0611126706.tmpFilesize
7KB
MD561c40ba33d958a21af88d5eafaa28aa8
SHA1d357677600de04a7bb9307ab6da9145afe27cfae
SHA256581345b763ea9bdfdad87bfe80aed54c03b587e249c24e51fd2b8ce2e5f3c221
SHA51252076b6a17ffd2cb083778bfdd92e152fa037e0afa180230bf596929d325438f414e8275e11dd99ec0ccba0f5f78e2d7d348335ecc545541a931cbc649601de0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
129KB
MD538d0c31aeff11b76893a2cba088aedc4
SHA1f94e5477559324bf15fe6a8e00619d071c6d0c55
SHA256ac44c8971eea185ecc93f2f2a97c7368e45652e3c2dd9101b69acfc2690a0645
SHA512f42927fbce8788f77c6ec7dc9a401e85a29486801bdad458a1be412bd13039398d7a3557ab255e42d73050f8bb823139da7e237cbb8defd5e896dc5c02ad9f4c
-
\??\pipe\crashpad_4464_WRASEHDJCQHUGHTJMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e