Analysis
-
max time kernel
70s -
max time network
72s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 23:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.ssa.gov/
Resource
win10v2004-20240508-en
General
-
Target
https://www.ssa.gov/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133640030201167389" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1964 wrote to memory of 224 1964 chrome.exe 80 PID 1964 wrote to memory of 224 1964 chrome.exe 80 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4940 1964 chrome.exe 81 PID 1964 wrote to memory of 4788 1964 chrome.exe 82 PID 1964 wrote to memory of 4788 1964 chrome.exe 82 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83 PID 1964 wrote to memory of 2692 1964 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.ssa.gov/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0f1dab58,0x7ffa0f1dab68,0x7ffa0f1dab782⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 --field-trial-handle=1912,i,4494904201152365751,9770938797926204962,131072 /prefetch:22⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1912,i,4494904201152365751,9770938797926204962,131072 /prefetch:82⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2216 --field-trial-handle=1912,i,4494904201152365751,9770938797926204962,131072 /prefetch:82⤵PID:2692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3016 --field-trial-handle=1912,i,4494904201152365751,9770938797926204962,131072 /prefetch:12⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3024 --field-trial-handle=1912,i,4494904201152365751,9770938797926204962,131072 /prefetch:12⤵PID:2732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4340 --field-trial-handle=1912,i,4494904201152365751,9770938797926204962,131072 /prefetch:82⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4492 --field-trial-handle=1912,i,4494904201152365751,9770938797926204962,131072 /prefetch:82⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4532 --field-trial-handle=1912,i,4494904201152365751,9770938797926204962,131072 /prefetch:12⤵PID:3324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3296 --field-trial-handle=1912,i,4494904201152365751,9770938797926204962,131072 /prefetch:12⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4524 --field-trial-handle=1912,i,4494904201152365751,9770938797926204962,131072 /prefetch:82⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4648 --field-trial-handle=1912,i,4494904201152365751,9770938797926204962,131072 /prefetch:82⤵PID:4904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4608 --field-trial-handle=1912,i,4494904201152365751,9770938797926204962,131072 /prefetch:82⤵PID:3880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4560 --field-trial-handle=1912,i,4494904201152365751,9770938797926204962,131072 /prefetch:12⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1548 --field-trial-handle=1912,i,4494904201152365751,9770938797926204962,131072 /prefetch:12⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD594c63c297263900915c525f80dabeca2
SHA1aec7f251db59f10229862fff122780d95b7fe799
SHA256e8e1dfac2989b8eac228eda602fb22a2eabb1be99b33faea6605ed67c2279a90
SHA512ac2eafda8269d2787b1dfe68a7134965a8fd1309a373596128d9e492e5519c475d0cae5b928e077f862af6cb55cde155f0b7f389e113bb296d4b3ff7ff36862e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\6f4e6f19-0ca6-4003-b4f1-3631e4ab69db.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD567f2f92d69ee84ff211c68bfddb8427e
SHA1eb9459c4c8a4bc9549d79e486afe7d4cfb6f9d86
SHA256f2dc1a51d0deb3d6fc2caeb5c9b9295383117b2d2a6055858045869cb3eb5255
SHA5126ebe192b3f1394e5091d8eeae2a0c18ac000cae278d906b90d7872dba552ebcabfad50ad56d65abf5b0ce5cca24b2c363ec01512a42edecfb42df5fe43b98564
-
Filesize
257KB
MD5cabaebfc9e2df908946fa986b871038d
SHA177ad7c9f5a03e25201a477389f56d3ca99f2087f
SHA256e11ae540a9ed347dad313781579e2b26428b1e379a5cb52e3cb42845f0ee77c4
SHA51207a0df2ff5831d81ae16e248fb4c6e0438495939e9742c52ec1b2c345dda6b632776aae19c5bd8ca462b4ec30f4443ae80a55184eecfb1958efe1bf95d890ec5
-
Filesize
257KB
MD59b626893c815e5c616817dc72b6ceaf8
SHA1cc37c8de55425e4b57fd2ae86e63d31ba52b1f23
SHA256bd78b813d10ec88a761b10c9279c5c81c27afbdf9e379260a69a0d0020c75b2d
SHA5120706c71c0ed13dd5649e9517cc219dc81893584ab5baa62e596a8e3ed4498d67b483c849cb87179160934c28961a6b4cc2b059b82bccece77c49400f52e2d589
-
Filesize
88KB
MD57cf275f42bcab3821650e406b83dee43
SHA1f8acfc1df4632a3dfde075546450cede3750570b
SHA256938ca515c9beec212ff46da347102bb29556755119b9f0071a981d5b0377b424
SHA512f227263f3a1aa7e7c75cc847534eccf7a1b0432be3840eab63f3e3ab948dae5f8157cc6800c087dd114ab10a88bca35ba3e77716556f2176fdbc4f6568e6949e