Analysis
-
max time kernel
68s -
max time network
75s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 20:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://hjabdab.r.bh.d.sendibt3.com/tr/cl/vNmOeSeZZzXAmCj3Hnl3yNKJjX64mpOk2njafUQVXtScxKyZYwAbN-jSxezCb50sAJqAMrK77S2IzC89m6BbDj7XZtceJqtPl5d4HahlfOA4PStvhKTOanSiawebHd-yS9SOeZuuk1kKu87Er8GP9rUxpDN1VOdtrh3R3cnppbozedbwlsYsCIDtvQgYcUHLSQGH-jJhFlY1MPPbhqhmq4nsS7dDlSNNNorRp2T1usmByqV1jtdM-DF3-mbPzygn3cUpmoKMy6FM6Llgcz9MZNOLPFyLJCzT2GUD6J47vBbPNs55mIsBpojgWtEyfizTFfFkew
Resource
win10v2004-20240802-en
General
-
Target
https://hjabdab.r.bh.d.sendibt3.com/tr/cl/vNmOeSeZZzXAmCj3Hnl3yNKJjX64mpOk2njafUQVXtScxKyZYwAbN-jSxezCb50sAJqAMrK77S2IzC89m6BbDj7XZtceJqtPl5d4HahlfOA4PStvhKTOanSiawebHd-yS9SOeZuuk1kKu87Er8GP9rUxpDN1VOdtrh3R3cnppbozedbwlsYsCIDtvQgYcUHLSQGH-jJhFlY1MPPbhqhmq4nsS7dDlSNNNorRp2T1usmByqV1jtdM-DF3-mbPzygn3cUpmoKMy6FM6Llgcz9MZNOLPFyLJCzT2GUD6J47vBbPNs55mIsBpojgWtEyfizTFfFkew
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133690068123169563" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5040 chrome.exe 5040 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5040 chrome.exe 5040 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5040 wrote to memory of 4588 5040 chrome.exe 84 PID 5040 wrote to memory of 4588 5040 chrome.exe 84 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 1448 5040 chrome.exe 85 PID 5040 wrote to memory of 4440 5040 chrome.exe 86 PID 5040 wrote to memory of 4440 5040 chrome.exe 86 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87 PID 5040 wrote to memory of 1596 5040 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://hjabdab.r.bh.d.sendibt3.com/tr/cl/vNmOeSeZZzXAmCj3Hnl3yNKJjX64mpOk2njafUQVXtScxKyZYwAbN-jSxezCb50sAJqAMrK77S2IzC89m6BbDj7XZtceJqtPl5d4HahlfOA4PStvhKTOanSiawebHd-yS9SOeZuuk1kKu87Er8GP9rUxpDN1VOdtrh3R3cnppbozedbwlsYsCIDtvQgYcUHLSQGH-jJhFlY1MPPbhqhmq4nsS7dDlSNNNorRp2T1usmByqV1jtdM-DF3-mbPzygn3cUpmoKMy6FM6Llgcz9MZNOLPFyLJCzT2GUD6J47vBbPNs55mIsBpojgWtEyfizTFfFkew1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffea180cc40,0x7ffea180cc4c,0x7ffea180cc582⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1740,i,18209608952466427746,16980880437061298053,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1732 /prefetch:22⤵PID:1448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2136,i,18209608952466427746,16980880437061298053,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2168 /prefetch:32⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2232,i,18209608952466427746,16980880437061298053,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2396 /prefetch:82⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,18209608952466427746,16980880437061298053,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,18209608952466427746,16980880437061298053,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:1960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4356,i,18209608952466427746,16980880437061298053,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4596 /prefetch:82⤵PID:1176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4740,i,18209608952466427746,16980880437061298053,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4620 /prefetch:82⤵
- Modifies registry class
PID:4060
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4416
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5aaa28d62d76342b7944353d175021741
SHA11e668ba9b038724ac11a33b8dfa94d466e465af4
SHA256fd718bebc3c4cecbbac2afdec1d81f479445dcca1a11285515215e629e1d4773
SHA5120699e9d30c54b5c2ca52a0f4f569d2b708c76213aa1cde4e599e32ddfc209cc6ace47deaf8b5a5ce541e58e6375e628625566120ab3f25d98c23ab9dbdbdd206
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5b9f78a969b59e3d4e13e9edb86435bdc
SHA117402ccbcb394217bc5547c626e37dd2d8928832
SHA25680c1822737e0654ca3852136fd50a75f092e3f4de716cb737f266dbd3c0da2a1
SHA512d2bc8555e1914e560f89959be91a499edf138e9c9fb5dc51964301c17bd0354753454a214cf33c240cf78aac3c920d2b5fcf3c5c3d303184b8a38586907056c4
-
Filesize
9KB
MD5b68694c0b6e7b5252788b2090af474ee
SHA11523a4130e47801f7c2d04c3b7fc397efe2929a6
SHA25621241b54c1a1770d70abab58f51a515608fcf0c92e5bbe867dc834fe363a4ee7
SHA512a0defa833797ec126ce3f7d3332f71f61ff1bc1f224744e839fea7fb85beaba62b5b3e50abd7b71518c24c8d771fb9ff9d9f9a0b565637f5fad079dcc62fda17
-
Filesize
9KB
MD52d23e16c97ac6354d2f5e5b3ba708ffa
SHA1b42d682f4627efb8b0f357c86e89ca5ad6f2eea8
SHA256cdc0ec88f012a2b6b81ebdcd5c43bbb50ec5bead08062c78ef86a88d6c7b4192
SHA512df4de35c78e9aff5d951d864fd773c89758143fd5a013ddc989c8a48fc598b4d01c6ccf69578b337e495030c862c5db888958e62bb9f8d9c3db2e8eca2a4fc85
-
Filesize
9KB
MD5bd97cb9eff316034f5e57efce437ea52
SHA1ed97758cb189a7c9602dc74d965dee4ea05396cd
SHA2569180b1c611486f2937d988a9b7907e21c0b3d61988042f149db5262b886b5196
SHA5124ba927b57ca7154af37c2b4336ec03b48279d3bb9a87e58cc4bf43a5c56fc9392d1a07aa26fc80b590be686fdc214d70db33c318732c5c0ed8794655e8bcb35f
-
Filesize
99KB
MD59c4cabc999da1f5099f0de84afaf07e2
SHA155c119181f972c32efe032afe3ece883eb5f61e3
SHA25668672fcfe3927c74b0942fc47bf4e11a74ab57c374d217d791d95ce234b5fa08
SHA512d646d93a890ddc9a07945252d34c295f4d87a0a40eb27eb362627a21e2ec6a9082718b25afb4cf981d6d697891ce1a7c97176706e0b16945aeaebef32e12f4e6
-
Filesize
99KB
MD52e0c2c6cccfea0184635c7689d4426ef
SHA1b44ced663021a8f7b9256502ab3811114b3e569a
SHA256de46c42455139d0993af1bb429caa7c48aa9195c34a1b3808b3ec747a19eb35a
SHA512adef43f0220c8b5201d5c375abc7ecb2e01c5c02f2e26bba93a59ee05d18ebff363af4ccbcf7a4ce4ee3a5a0aa295ae80be633083ea4051d4fc553f979ef996d