Analysis
-
max time kernel
19s -
max time network
21s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-10-2024 16:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://online3.superoffice.com/cust9038/CS/scripts/customer.fcgi?action=ejLink&key=1006:5751:99627:5cb76958801314774d0be2b4ee5072efa260f41f&sai=1343427
Resource
win11-20241007-en
General
-
Target
https://online3.superoffice.com/cust9038/CS/scripts/customer.fcgi?action=ejLink&key=1006:5751:99627:5cb76958801314774d0be2b4ee5072efa260f41f&sai=1343427
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133736547005443654" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5008 chrome.exe 5008 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe Token: SeShutdownPrivilege 5008 chrome.exe Token: SeCreatePagefilePrivilege 5008 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe 5008 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5008 wrote to memory of 1020 5008 chrome.exe 80 PID 5008 wrote to memory of 1020 5008 chrome.exe 80 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 3688 5008 chrome.exe 81 PID 5008 wrote to memory of 2436 5008 chrome.exe 82 PID 5008 wrote to memory of 2436 5008 chrome.exe 82 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83 PID 5008 wrote to memory of 2992 5008 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://online3.superoffice.com/cust9038/CS/scripts/customer.fcgi?action=ejLink&key=1006:5751:99627:5cb76958801314774d0be2b4ee5072efa260f41f&sai=13434271⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff2076cc40,0x7fff2076cc4c,0x7fff2076cc582⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1692,i,12994048853916576742,1781759543783584217,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1688 /prefetch:22⤵PID:3688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2008,i,12994048853916576742,1781759543783584217,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2096 /prefetch:32⤵PID:2436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2168,i,12994048853916576742,1781759543783584217,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2180 /prefetch:82⤵PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,12994048853916576742,1781759543783584217,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3100 /prefetch:12⤵PID:4692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3088,i,12994048853916576742,1781759543783584217,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:1104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4256,i,12994048853916576742,1781759543783584217,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4276 /prefetch:12⤵PID:1096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4768,i,12994048853916576742,1781759543783584217,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4784 /prefetch:82⤵PID:1424
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1980
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5dd8f7e9892ab9727671d489ec1a5b2b8
SHA13540813ea1845082c7d70db5c732473b60df7d3a
SHA256fb14aa49a0e369b7fdf0c67b8f8ba1b6d9ca00bf0bb2558dbee439b81c0cced5
SHA51210082470bbf69351250345a1ae64496ba3443db94a20565edd54bc9ae57f2478effe63dcf91952cc8a1130e564eb1d941cd602eab2fe751912da325c7945d873
-
Filesize
2KB
MD50a02b79f6a2221a6305dbd6d56e511b8
SHA1050baed3be3b811a190e7c9ac01019eb4d4e78f5
SHA256eb1161b14ccb82b8c809b95588ce6f75aeea602f6fbc471bbb15d45d70ac5bdc
SHA512c38c08a030a15075c9dca226d0823ad7d5e92afc93112cce577f9c09844e33aa4dfdaf218a5b07966e97f394f82f1e605cf426a00845c7a327fe2000ff2800e5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5ddc14f63cc4d1e22e6e68ecfa1b07b03
SHA12966930b4fc41187ecabf213600f3e00acc3361d
SHA2568942c0dc58c23e9d0f9f631fb4cb711f378f6f456aa4c4b4b7868796899ef6e7
SHA512017ebd6e03a6e5d46c50f00f8bf2e9dade0f6f1495427406d94762f3d735329ae6e98fa7c73e78d1739e677901443fa87e5a59db42a2d63d8b5df1a2ab3689bb
-
Filesize
9KB
MD5b4386629fb17026252336f65c5180314
SHA186fcb23c0e563122b1a6ee0f98b133da1427380e
SHA256c8cfb18b1c7e2cabb59ef69d8e080a6efc7fa0b10c06c601327be2e257e32945
SHA512d0e6d28a0a562cac7de85babc03b1f2554f8062db78e19f27276f45f570001ee3d67d7c093d1c064d3c3fe02f4d581f3ce4852ea4da7a8246bd683e8fde3ea8b
-
Filesize
116KB
MD5599896c6d1965669eee15ab12aaef84f
SHA179fcc999a4922e6884a98a88f7d09f0a7ec6f37a
SHA256accb23095181a91251ca346b915fe70595c8a960dba6a8933ee24eca64be566a
SHA51222158db3c4b9fdfdeab2b84f07a8a0be331b5f12d92f163075a56c6047200fb894aa98c7346625aa6eae22e079691c35e9207571cda8ccd3615eb175d7f3b079