Analysis
-
max time kernel
36s -
max time network
17s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
25/06/2024, 19:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ezadblocker.com
Resource
win10-20240404-en
General
-
Target
http://ezadblocker.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133638188312222520" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4688 chrome.exe 4688 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4688 wrote to memory of 2404 4688 chrome.exe 73 PID 4688 wrote to memory of 2404 4688 chrome.exe 73 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 716 4688 chrome.exe 75 PID 4688 wrote to memory of 3492 4688 chrome.exe 76 PID 4688 wrote to memory of 3492 4688 chrome.exe 76 PID 4688 wrote to memory of 4104 4688 chrome.exe 77 PID 4688 wrote to memory of 4104 4688 chrome.exe 77 PID 4688 wrote to memory of 4104 4688 chrome.exe 77 PID 4688 wrote to memory of 4104 4688 chrome.exe 77 PID 4688 wrote to memory of 4104 4688 chrome.exe 77 PID 4688 wrote to memory of 4104 4688 chrome.exe 77 PID 4688 wrote to memory of 4104 4688 chrome.exe 77 PID 4688 wrote to memory of 4104 4688 chrome.exe 77 PID 4688 wrote to memory of 4104 4688 chrome.exe 77 PID 4688 wrote to memory of 4104 4688 chrome.exe 77 PID 4688 wrote to memory of 4104 4688 chrome.exe 77 PID 4688 wrote to memory of 4104 4688 chrome.exe 77 PID 4688 wrote to memory of 4104 4688 chrome.exe 77 PID 4688 wrote to memory of 4104 4688 chrome.exe 77 PID 4688 wrote to memory of 4104 4688 chrome.exe 77 PID 4688 wrote to memory of 4104 4688 chrome.exe 77 PID 4688 wrote to memory of 4104 4688 chrome.exe 77 PID 4688 wrote to memory of 4104 4688 chrome.exe 77 PID 4688 wrote to memory of 4104 4688 chrome.exe 77 PID 4688 wrote to memory of 4104 4688 chrome.exe 77 PID 4688 wrote to memory of 4104 4688 chrome.exe 77 PID 4688 wrote to memory of 4104 4688 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://ezadblocker.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fff16079758,0x7fff16079768,0x7fff160797782⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1540 --field-trial-handle=1812,i,15675976389608146574,12785420724881234768,131072 /prefetch:22⤵PID:716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1856 --field-trial-handle=1812,i,15675976389608146574,12785420724881234768,131072 /prefetch:82⤵PID:3492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2124 --field-trial-handle=1812,i,15675976389608146574,12785420724881234768,131072 /prefetch:82⤵PID:4104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2600 --field-trial-handle=1812,i,15675976389608146574,12785420724881234768,131072 /prefetch:12⤵PID:3116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2608 --field-trial-handle=1812,i,15675976389608146574,12785420724881234768,131072 /prefetch:12⤵PID:1216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4340 --field-trial-handle=1812,i,15675976389608146574,12785420724881234768,131072 /prefetch:12⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4572 --field-trial-handle=1812,i,15675976389608146574,12785420724881234768,131072 /prefetch:82⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4684 --field-trial-handle=1812,i,15675976389608146574,12785420724881234768,131072 /prefetch:82⤵PID:4184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 --field-trial-handle=1812,i,15675976389608146574,12785420724881234768,131072 /prefetch:82⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 --field-trial-handle=1812,i,15675976389608146574,12785420724881234768,131072 /prefetch:82⤵PID:2560
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD58a4d2a90802769b29a824e88f050ec29
SHA157655a6c2407c558975d6e5a3ad3315e2bd307b8
SHA2563341b633d3d303c31b06a352776c4e1aac7b9f8f860ce50517bc720de53ba34a
SHA512670853ac9e88afc1327e4f1b5b2e96e27fa4b1724e10c0d5949fae94d6817a5ad04adf560a831786c81db2e1f2130aab4919541071402f4df8d032e483d1af29
-
Filesize
138KB
MD55e5bd589f2f0ce94fe1f0bae8a5a20a9
SHA1ce5dc7cd32dfa0705563b844e4f9041006003ac3
SHA256f6b32189e5834dda5ab1cdbf82bcc3ab7a3c7c09689fb721fcccd8ccd604fc1e
SHA51263930bae94640d1a4e7f4b53554f340818456fe7f254300a643b3090418745ccd55929b546e7704a6ca0a5592f6218591becad33a8b9a35768b338aa3416e7b6
-
Filesize
137KB
MD56fcbc9e0d658a0e891ee9837f6d7f794
SHA1abdb8db5f2529a6382094d9ed70ffee91e7e01af
SHA2568954d03dd53342c26d262aa1b8744645c6bd0b7305cb44102dabff08deb6af0f
SHA512cbc35a2cf1250e5f8c3549a5ab3ceadbe57df9829bf5dee238fcc246fcf53f3094d20c7576b2481de1b69b50fac926adbf9c2ba9cbd1f1eb7474222f924bf604
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd