Analysis
-
max time kernel
49s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-es -
resource tags
arch:x64arch:x86image:win10v2004-20240704-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
10-07-2024 21:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://b2bconnecta.com
Resource
win10v2004-20240704-es
General
-
Target
http://b2bconnecta.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133651193399538329" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4720 chrome.exe 4720 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4720 wrote to memory of 540 4720 chrome.exe 82 PID 4720 wrote to memory of 540 4720 chrome.exe 82 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 3436 4720 chrome.exe 84 PID 4720 wrote to memory of 2736 4720 chrome.exe 85 PID 4720 wrote to memory of 2736 4720 chrome.exe 85 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86 PID 4720 wrote to memory of 4060 4720 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://b2bconnecta.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb3e29ab58,0x7ffb3e29ab68,0x7ffb3e29ab782⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1896,i,17919282243810963425,12558487145417072215,131072 /prefetch:22⤵PID:3436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1896,i,17919282243810963425,12558487145417072215,131072 /prefetch:82⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2252 --field-trial-handle=1896,i,17919282243810963425,12558487145417072215,131072 /prefetch:82⤵PID:4060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2924 --field-trial-handle=1896,i,17919282243810963425,12558487145417072215,131072 /prefetch:12⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2932 --field-trial-handle=1896,i,17919282243810963425,12558487145417072215,131072 /prefetch:12⤵PID:3428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4128 --field-trial-handle=1896,i,17919282243810963425,12558487145417072215,131072 /prefetch:12⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4736 --field-trial-handle=1896,i,17919282243810963425,12558487145417072215,131072 /prefetch:82⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4188 --field-trial-handle=1896,i,17919282243810963425,12558487145417072215,131072 /prefetch:82⤵PID:3164
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD513dab2bade966a7908d086f8243cb5b9
SHA1bbe65f280f3fdbbcc7501e1e2de40cbed1a4f5b6
SHA2564c7e72387e58431333a450327044eb7ea6da57c0037131408d77a75d49cd95d7
SHA51253dec0a0153231b1ab0eacbfe3de701d399fc578531de37c2de602f1d9275d477c447b5c28f3eacb933e3884935107fcc5ddb9e4acff43485714a3b47def6d96
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
687B
MD5b23f985e26a199ac247892c8630c8700
SHA130fe4c3d0b592a6198de389310895ded2fc93c0f
SHA25699e2c99fbd348bd376c16c99a8cdc2bb1407400fba36e18ad7fbbfac50daef64
SHA512a8b1776c3cbacb41c957fb54071506d096b763d276a3087123ad467849dd992fef6514c8a0072726c2ff4e20f778ef078789f703a7c0fa3cd0dc27189b591210
-
Filesize
7KB
MD52f2db5700233ea569efb10df59570522
SHA1f409fcb21bae95febb9e7ec852b339937949676a
SHA256b7439fe59d301875b40b177ce4a42f19159f072b46ab40b9dc68696ca2302e2d
SHA51254cb088862a2d034e9fce822b5590bf7a62ddf79dbea3146eba746bb24f166f0379a65f73dc58a31d8e030d237941d948a10d95fa94888b2ec3cf66c0fb24b0b
-
Filesize
144KB
MD504f1dcda1e99b7402923000b96ea64a5
SHA1eb94897994176462350e155dfea745809e424b6e
SHA2568e5423cb0375e3c5f3853b2b77e4f30d3dba8ad59e38ac623f8cec94bcaa9840
SHA512550c706d4dac557b9a756d0dce330170e39d7830a765089af4746567733dacdff70f5dfc0583c37dfe40ad9d8a511a0a80449d50fca51bcaa8b87ca08ebba700