Analysis
-
max time kernel
133s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 08:45
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.jomba.co.il/account/[email protected]
Resource
win10v2004-20240611-en
General
-
Target
https://www.jomba.co.il/account/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133642971500122587" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3688 chrome.exe 3688 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3688 wrote to memory of 3628 3688 chrome.exe 92 PID 3688 wrote to memory of 3628 3688 chrome.exe 92 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 4760 3688 chrome.exe 94 PID 3688 wrote to memory of 3840 3688 chrome.exe 95 PID 3688 wrote to memory of 3840 3688 chrome.exe 95 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96 PID 3688 wrote to memory of 2704 3688 chrome.exe 96
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.jomba.co.il/account/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0456ab58,0x7fff0456ab68,0x7fff0456ab782⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1896,i,13365998435520059550,17607089284615855678,131072 /prefetch:22⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1896,i,13365998435520059550,17607089284615855678,131072 /prefetch:82⤵PID:3840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2252 --field-trial-handle=1896,i,13365998435520059550,17607089284615855678,131072 /prefetch:82⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1896,i,13365998435520059550,17607089284615855678,131072 /prefetch:12⤵PID:1664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2992 --field-trial-handle=1896,i,13365998435520059550,17607089284615855678,131072 /prefetch:12⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4164 --field-trial-handle=1896,i,13365998435520059550,17607089284615855678,131072 /prefetch:12⤵PID:628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3552 --field-trial-handle=1896,i,13365998435520059550,17607089284615855678,131072 /prefetch:12⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 --field-trial-handle=1896,i,13365998435520059550,17607089284615855678,131072 /prefetch:82⤵PID:1396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4776 --field-trial-handle=1896,i,13365998435520059550,17607089284615855678,131072 /prefetch:82⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:880
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4304,i,5229431749694857451,16836185654682871752,262144 --variations-seed-version --mojo-platform-channel-handle=3920 /prefetch:81⤵PID:5392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5d5fef4d122e97a04eba93151851aa956
SHA152f089b5ecfa19b488a07e01bdc28acf428b0bcb
SHA2565aa94e7e7b1e59014a6badd16d54bce8bbf8128b49af7e6c77e414dda0fec38f
SHA51241bd87f10f920f1e5774c5c942f44b8ebac8d7c14c97d7f9b67cd5632e47bae756f8432cc1e4c20a1fdd0f0b78d5a6caa76f06a59347a38208729d416056d138
-
Filesize
138KB
MD5a470e592f08265ec2b5e79d43df3a387
SHA1c1cb3cd999a70247214ab50174200f53ebf12521
SHA25602487ad10a445d360fba5e0d294071b778232c9447fb84f053b7f1ea861feddb
SHA512b425754de22169a99d83f56135defa059a42bb934c6081f139138fbbcae6e033e330333894dc5c1e5f52002bb26e2a1c5fb957e415a48213c73b285aa70c8528
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58