Analysis
-
max time kernel
1799s -
max time network
1687s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-03-2023 05:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://google.com
Resource
win10v2004-20230220-en
General
-
Target
http://google.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133226448451550846" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2012 chrome.exe 2012 chrome.exe 3716 chrome.exe 3716 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2012 wrote to memory of 3368 2012 chrome.exe 87 PID 2012 wrote to memory of 3368 2012 chrome.exe 87 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 384 2012 chrome.exe 88 PID 2012 wrote to memory of 2068 2012 chrome.exe 89 PID 2012 wrote to memory of 2068 2012 chrome.exe 89 PID 2012 wrote to memory of 4312 2012 chrome.exe 90 PID 2012 wrote to memory of 4312 2012 chrome.exe 90 PID 2012 wrote to memory of 4312 2012 chrome.exe 90 PID 2012 wrote to memory of 4312 2012 chrome.exe 90 PID 2012 wrote to memory of 4312 2012 chrome.exe 90 PID 2012 wrote to memory of 4312 2012 chrome.exe 90 PID 2012 wrote to memory of 4312 2012 chrome.exe 90 PID 2012 wrote to memory of 4312 2012 chrome.exe 90 PID 2012 wrote to memory of 4312 2012 chrome.exe 90 PID 2012 wrote to memory of 4312 2012 chrome.exe 90 PID 2012 wrote to memory of 4312 2012 chrome.exe 90 PID 2012 wrote to memory of 4312 2012 chrome.exe 90 PID 2012 wrote to memory of 4312 2012 chrome.exe 90 PID 2012 wrote to memory of 4312 2012 chrome.exe 90 PID 2012 wrote to memory of 4312 2012 chrome.exe 90 PID 2012 wrote to memory of 4312 2012 chrome.exe 90 PID 2012 wrote to memory of 4312 2012 chrome.exe 90 PID 2012 wrote to memory of 4312 2012 chrome.exe 90 PID 2012 wrote to memory of 4312 2012 chrome.exe 90 PID 2012 wrote to memory of 4312 2012 chrome.exe 90 PID 2012 wrote to memory of 4312 2012 chrome.exe 90 PID 2012 wrote to memory of 4312 2012 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://google.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9bada9758,0x7ff9bada9768,0x7ff9bada97782⤵PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1812,i,908317271506404182,847981294831263140,131072 /prefetch:22⤵PID:384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,908317271506404182,847981294831263140,131072 /prefetch:82⤵PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1812,i,908317271506404182,847981294831263140,131072 /prefetch:82⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3112 --field-trial-handle=1812,i,908317271506404182,847981294831263140,131072 /prefetch:12⤵PID:2964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3144 --field-trial-handle=1812,i,908317271506404182,847981294831263140,131072 /prefetch:12⤵PID:1712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4536 --field-trial-handle=1812,i,908317271506404182,847981294831263140,131072 /prefetch:12⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 --field-trial-handle=1812,i,908317271506404182,847981294831263140,131072 /prefetch:82⤵PID:2168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5048 --field-trial-handle=1812,i,908317271506404182,847981294831263140,131072 /prefetch:82⤵PID:4284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 --field-trial-handle=1812,i,908317271506404182,847981294831263140,131072 /prefetch:82⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3836 --field-trial-handle=1812,i,908317271506404182,847981294831263140,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3716
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:984
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD5aa87a102df21f83df1c2893ab78fee99
SHA19fbf26247579e68e0ac74a2c9fa1478394bae7c0
SHA2569df0d14845038059fd3ce6f78f0706eb7df86e65200e07b2d14b09ca9b72fcd8
SHA512029636ce6bba36c0a12806f1beb4ea6f722820ecbee632ee2488c2fec55be4b3694eaa82b41743a326ecd449a5673c0e5893fca2e588c41aa63d670ac488e5ea
-
Filesize
2KB
MD5db786c4a76b438dac01e69ff8043f155
SHA1a2a2bbd8f0e37409ecc7fe10b563fcd87544bcaa
SHA2564c4ad8ca9a573cab593a1145da5ed777518a20c9b5db91e928eddfa9188c735e
SHA5120061a0ef0d91cb12a9a951f3fdcf6de220995a175c0e008ae10cc4ff7076c5c4ec44f0b5f9c09c30b4e4c400d484820fa367913826e1720d744ee0771feb2425
-
Filesize
2KB
MD5bbda1ecf2a51ade411d1110d7971a3b9
SHA106c0fe50e1086eb3a776dbce804a9aa3f652b5e3
SHA2564a6663068d2badc4bd0504f1e871e6adcf2d4d8553ebedbf5f3f4bbdb53281e0
SHA51270b6db098c8563ad5b43cfb6dee655ee10d2c41068dc55341a5fb9bc293e7fdee843ad4dd1cbb6c4707970c04c69899e73dbac587154161119835334897e36d6
-
Filesize
2KB
MD575773e30b6d8c531ec5339aba2b3ba03
SHA1f33793be67103b6c8da4872f4a37340d84fe4dd4
SHA2564a9963351b48cc12addcf31b629b65f5dabe80d1b5c2d8fa726e357c18758ecf
SHA51225a594f9e3c68662aeade73301e4d14f492f0bb46fe267d26329c8b57413e3339d26665645f360f43685973d7b5593bb83f16e0e8c2bd32adfbc360cd7c96731
-
Filesize
539B
MD59277c5f15c4a5ab9affcb9c4bd02e0b7
SHA1bc3aba6425b34a01f9042216349126021bbf691b
SHA256b676155677173bc60869bb024e4e1086caab71d5a95f72615a4262f5ba77b28d
SHA512725df129e983ca94efafe41aeeebb1054bd0916f75339ad1ee166172fc5737dfc49ee97e8b71ac714fbe19e6411d24c35e754d00063c11fcdb584af412a3fb93
-
Filesize
6KB
MD59d01532c6baa50527184c742bfe291cc
SHA15e5675ef8b59d0f039cacbe29880aea60457a198
SHA2569d30c61219d5f6ae01952569777687494859d45ac980d53b8eb5aad5fc01c3d3
SHA5122257ae1c4873312b0c5aff70e64d65ca03b07332ea5edc9e4a787704506fcadaeb351f761ab309eb83841e11eb7ce2d116b7189ea1a9791d2f8f7ef1194ea8d7
-
Filesize
15KB
MD5f9ea4da23c43fbecdde6cfe2a64258a6
SHA18c7f0deb44e6069ea38e5f36c507877cadc27875
SHA25631d798215cb4c8d706892ec8af6f20aabc5bc8894fc3c9fdbf01ba306b3e8487
SHA51228a9ab77cb5214e8765a1604ca8e97e6f13ce401a24ebe7441f0d446603eea657624edefa6c667c4e06de4257e89798a22a88b2f14d05842d08f41fa4c738387
-
Filesize
143KB
MD59ee1ce023259762f087b08086ff7b53f
SHA1fa7a082db5fa5cab3587b95ad00c937ebfd0b168
SHA2568c06eb5c6aab12bf674e123415e7e179afa16753dd68c361493571261ad1b81a
SHA512868a728c9d5bf3913320644e9c6ea0318f10d72e647ded7d5b5e11aa389d4f4becc25c6cc9b9f49d4d597dfebd348a62a50f947d0aff486e1d031ce111f49296
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd