Analysis
-
max time kernel
300s -
max time network
274s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
07-12-2024 04:33
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://office.aeentrabar.com/kTNoOGHr#[email protected]
Resource
win10ltsc2021-20241023-en
General
-
Target
https://office.aeentrabar.com/kTNoOGHr#[email protected]
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133780196621673121" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 8 chrome.exe 8 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 8 wrote to memory of 1232 8 chrome.exe 82 PID 8 wrote to memory of 1232 8 chrome.exe 82 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 5112 8 chrome.exe 83 PID 8 wrote to memory of 1132 8 chrome.exe 84 PID 8 wrote to memory of 1132 8 chrome.exe 84 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85 PID 8 wrote to memory of 4732 8 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://office.aeentrabar.com/kTNoOGHr#[email protected]1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffb1b81cc40,0x7ffb1b81cc4c,0x7ffb1b81cc582⤵PID:1232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=588,i,1925798988736334970,8409280777914416041,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=1816 /prefetch:22⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2184,i,1925798988736334970,8409280777914416041,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2124 /prefetch:32⤵PID:1132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2268,i,1925798988736334970,8409280777914416041,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2436 /prefetch:82⤵PID:4732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3132,i,1925798988736334970,8409280777914416041,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3148,i,1925798988736334970,8409280777914416041,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3792,i,1925798988736334970,8409280777914416041,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4524 /prefetch:12⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4676,i,1925798988736334970,8409280777914416041,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:4428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4628,i,1925798988736334970,8409280777914416041,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5048,i,1925798988736334970,8409280777914416041,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:3600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5320,i,1925798988736334970,8409280777914416041,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5300 /prefetch:82⤵PID:2204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3228,i,1925798988736334970,8409280777914416041,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3240 /prefetch:82⤵PID:1180
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1556
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD536ca93725615fd532be11c20dcab172c
SHA14279103fdadb7ceab83daede4acb5a2daa3a5697
SHA256956d184ee98c9f144288fb8b39717f1095714263d96cf7db1254a45e82ae81fe
SHA512ba43c96b4ebf7ead588abb4c0f09c5dbc6c670e44f0e75a2801920bcdcfdf12c8e38298294ad68e2ca037c705436f8e55d2b9a60cac7546b1b6b953056348c1f
-
Filesize
360B
MD51f9d609e4e320894d2d7c3c07866ac1f
SHA174d5008e500cb4d72a1cbe2cb5769e15cbcd6339
SHA2565077ff142348a7a555d73403ebac4f6dfa21da50c16ace3c86439462dfe69ddf
SHA512c827c10ab50cbe8848f44942fd642eec3340e0ad2c2acee450692d8b6744b5f795d606b150fad0d3c0b7918d884d4014a96bc4c9c6ccd91441c4de26c5385201
-
Filesize
3KB
MD547a8eee5e38028724791da12073a8fd4
SHA1a00995b579275de72fc8dcb9d0913e8b4c5cf76c
SHA2568af78fe6dae39dbeb651b0afc83b3cd035c5f91e714a96a5c883efca6c3ae591
SHA51215becfb8d382a7db37908484e2626654a2962fd497925c8ab44f266a36ddc890112fcae921a4b3e5f17e21caa7ab7ca0e071f160ef9a3c844679b3033b6fce4a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5495bbfc0dab78655074ecee667d29544
SHA11ec4a435c5d01c53dd4852e7804559e260245618
SHA25613b6cfa64aa4452bf54534f99a8abcdee7599f5b7965886d208c3d7feb7059eb
SHA512de9a384bbe0844387203743b109a6bebf406a518cd3acb8731d61071f5be70dd5090d1ccfc5ebe5a8e81aa3483e18abe2bf1751d3cdaea55d22b765848a5ffab
-
Filesize
1024B
MD5f3a317ec56b44c686e04f472790d147c
SHA1844588466a02fc159cf363ba7855b02c299ed4fa
SHA256b70e6d26667c42723adb2db056d82116b14c1f353d1b3a60fef72b7d930d6810
SHA51259eab9a98b59966a4fc42c8d907008bec7b6cd9ba06b84b76c0175e0f8f8ec456746bba79e951fabb8973090e66d716293153d251067beca7f8f337503be3054
-
Filesize
1KB
MD5925fa64e624d75ec9ed1ca11c6fbb1b8
SHA101b70ef72ab5542b2e9b5c0f667ce6fa741c8635
SHA25603d5dd856200aeb7eedc7596bcfbb941f94a207f799315c983badf6ae63f87cf
SHA5124038a384cb4d9388809f928f89da3d28a8b255414d9ff8a411efc5fcfa6c0a415c25c79286dc61e81e5853d1a4af869f2b4df738747ef994ece95f049bcac4c1
-
Filesize
12KB
MD5e20e0c8459849e5eeb982e171298bd6d
SHA11bf6afb033663dafb5fd03419b885d3117a6cbc0
SHA256c9a28aff457667aaf836a1b90289aec040e2ed7eba41ef48e6db357ff7e39934
SHA512d4b50da5e2465cd7c392fe48a6421e330c326e50b9f5e103452f24e41d97000e4e56d5f9be2751c9a8ca61fd4bee25f13022fcfe41c012b141879168480c65c0
-
Filesize
12KB
MD576e546eeda37441ce2e943abb0cfb77a
SHA19bcf6fa42adf7c057b99cb7f45af67c8bdd6f771
SHA256b679905276d9ed66105437c7d98613e76a7301f7b48b90552e85a8df5b7be3d4
SHA512859a5490114fdaf8c866e80e0d4be4b55e0439cfe6c184a891635c55b2bc35d6a45fa89285df4d6be810e604fe2fffdde47d86f12cf626f6874e6143295153c9
-
Filesize
118KB
MD5b8a5cff505ccbb6ae778d11b379f91e5
SHA18c68edd1d8b83f96a20222b87dc3f01004371c2a
SHA2569292fa9e24ede1ec15105b9b818a2545e0408ee574d127d2811fe7cbf4bfba5b
SHA5125f7c509f5311c1d66f5411f477d142569b79379bac435b712a582e933e89523868a33b88aae677e5a35e10bdda94e13fc9ebe07fa0900087aaa0df5d3dfc0781