Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 08:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bit.ly/3xTO6hz
Resource
win10v2004-20230220-en
General
-
Target
https://bit.ly/3xTO6hz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133221336656596406" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2240 chrome.exe 2240 chrome.exe 928 chrome.exe 928 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1760 2240 chrome.exe 87 PID 2240 wrote to memory of 1760 2240 chrome.exe 87 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 4692 2240 chrome.exe 88 PID 2240 wrote to memory of 1580 2240 chrome.exe 89 PID 2240 wrote to memory of 1580 2240 chrome.exe 89 PID 2240 wrote to memory of 4496 2240 chrome.exe 90 PID 2240 wrote to memory of 4496 2240 chrome.exe 90 PID 2240 wrote to memory of 4496 2240 chrome.exe 90 PID 2240 wrote to memory of 4496 2240 chrome.exe 90 PID 2240 wrote to memory of 4496 2240 chrome.exe 90 PID 2240 wrote to memory of 4496 2240 chrome.exe 90 PID 2240 wrote to memory of 4496 2240 chrome.exe 90 PID 2240 wrote to memory of 4496 2240 chrome.exe 90 PID 2240 wrote to memory of 4496 2240 chrome.exe 90 PID 2240 wrote to memory of 4496 2240 chrome.exe 90 PID 2240 wrote to memory of 4496 2240 chrome.exe 90 PID 2240 wrote to memory of 4496 2240 chrome.exe 90 PID 2240 wrote to memory of 4496 2240 chrome.exe 90 PID 2240 wrote to memory of 4496 2240 chrome.exe 90 PID 2240 wrote to memory of 4496 2240 chrome.exe 90 PID 2240 wrote to memory of 4496 2240 chrome.exe 90 PID 2240 wrote to memory of 4496 2240 chrome.exe 90 PID 2240 wrote to memory of 4496 2240 chrome.exe 90 PID 2240 wrote to memory of 4496 2240 chrome.exe 90 PID 2240 wrote to memory of 4496 2240 chrome.exe 90 PID 2240 wrote to memory of 4496 2240 chrome.exe 90 PID 2240 wrote to memory of 4496 2240 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://bit.ly/3xTO6hz1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd77ed9758,0x7ffd77ed9768,0x7ffd77ed97782⤵PID:1760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 --field-trial-handle=1808,i,3190545152024652773,11015301305508548718,131072 /prefetch:22⤵PID:4692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1808,i,3190545152024652773,11015301305508548718,131072 /prefetch:82⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1808,i,3190545152024652773,11015301305508548718,131072 /prefetch:82⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3176 --field-trial-handle=1808,i,3190545152024652773,11015301305508548718,131072 /prefetch:12⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3204 --field-trial-handle=1808,i,3190545152024652773,11015301305508548718,131072 /prefetch:12⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4596 --field-trial-handle=1808,i,3190545152024652773,11015301305508548718,131072 /prefetch:12⤵PID:496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3376 --field-trial-handle=1808,i,3190545152024652773,11015301305508548718,131072 /prefetch:12⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 --field-trial-handle=1808,i,3190545152024652773,11015301305508548718,131072 /prefetch:82⤵PID:3932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4524 --field-trial-handle=1808,i,3190545152024652773,11015301305508548718,131072 /prefetch:82⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4800 --field-trial-handle=1808,i,3190545152024652773,11015301305508548718,131072 /prefetch:12⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4884 --field-trial-handle=1808,i,3190545152024652773,11015301305508548718,131072 /prefetch:12⤵PID:1884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=212 --field-trial-handle=1808,i,3190545152024652773,11015301305508548718,131072 /prefetch:12⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4524 --field-trial-handle=1808,i,3190545152024652773,11015301305508548718,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:928
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4332
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141KB
MD5974a5d33dc1679b3449776f499226b2e
SHA1d507fa112288c2d72d3adc8da0d26365b574db5b
SHA2565fc5ee2992952a9d4300382fd69c166ae943e6d352e8f07c004e8c8110eea370
SHA512071eacd35388c6d18125270407a5fe2b39880888bf7a20cf0cc976c4403e75190148c6f93b8074108868b255ee85e23fd05f3283729c6e84fc3c849d488c1e76
-
Filesize
1KB
MD5bb8e1f0c42666c4350b714e3553d0d8a
SHA1b085fdac26a2d0011553f6157eef4bd9d98b472b
SHA256dd18b557e013bb25eae903e6bf960fe89350d238c9b3b6e2fd554e6475920704
SHA512488537dbe6226b2145ff4f6e5343e06a78f904da19848664abccb104b3a87e56c988f4e3b9b59c685d8a0ad44092f1015f7e5f5671e0f512274252088ec6ebd3
-
Filesize
5KB
MD5bfc0ccea55e78564ecc476de6f73e2ff
SHA15e4b7598e8d00b2e87a9a1a4706c017be6e144db
SHA25684e8b4e3b4d293bafd792d0fc338a629c154b089013f43eb0694b0d514126917
SHA512cf36ee1a0360c88f880baf1efd78b3956e0c3708aa893f4c14af781893f7ce99c599366af5ea1a6db2c6d30ad92f96f761be0382c4ba73194ba2d790a80ccd69
-
Filesize
5KB
MD546b751df6f80e7360669bf966cfd3ce4
SHA17805addfc92184bb5c8333277be38df5dc8da386
SHA256a6c7e8815bbb48df4d8791763d507ad6d0a6ac1818bcee3b54c255a28409a2be
SHA512c7c9c44fe61bf40eaa08c9fda5879bf6b56511f45a82d1fd3b217fe0240f8fd2550742e49444f450f147b30863928cf77524e0e600ebe058c0813bafb8107836
-
Filesize
5KB
MD51a08b027fb792da4e52c8bd46eeab203
SHA16054fa956789de5b6cd253bed69f885efbf36871
SHA256e07c4e8e6e6f21a6a40cef7d1972fb4ddb020e4c9c4bc26deee8f16c695c4837
SHA512c5086d1a99d617cfceb0a6db2beb6bb142ac3c9236e7743d9715eb069e471608665fb3499bb3ec32614290006864eb9cffcb31aa253503a7f3c6ce10f09382c9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd