Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20-03-2023 06:36
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://clt1549454.bmetrack.com/c/l?u=F223906&e=15E566E&c=17A48E&t=1&l=A7D84FA1&email=13z17J1sF1bD%2Bruqj6wKFbb4kTIUfr69&seq=1#Z3Vyc3UuYmFzZG9nYW5AaGl0YWNoaWVuZXJneS5jb20=
Resource
win10v2004-20230220-en
General
-
Target
https://clt1549454.bmetrack.com/c/l?u=F223906&e=15E566E&c=17A48E&t=1&l=A7D84FA1&email=13z17J1sF1bD%2Bruqj6wKFbb4kTIUfr69&seq=1#Z3Vyc3UuYmFzZG9nYW5AaGl0YWNoaWVuZXJneS5jb20=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133237714175161960" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 4676 chrome.exe 4676 chrome.exe 3392 chrome.exe 3392 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 4676 chrome.exe 4676 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4676 wrote to memory of 2732 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 2732 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 3400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 4400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 4400 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 2056 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 2056 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 2056 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 2056 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 2056 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 2056 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 2056 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 2056 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 2056 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 2056 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 2056 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 2056 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 2056 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 2056 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 2056 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 2056 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 2056 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 2056 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 2056 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 2056 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 2056 4676 chrome.exe chrome.exe PID 4676 wrote to memory of 2056 4676 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://clt1549454.bmetrack.com/c/l?u=F223906&e=15E566E&c=17A48E&t=1&l=A7D84FA1&email=13z17J1sF1bD%2Bruqj6wKFbb4kTIUfr69&seq=1#Z3Vyc3UuYmFzZG9nYW5AaGl0YWNoaWVuZXJneS5jb20=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd7c079758,0x7ffd7c079768,0x7ffd7c0797782⤵PID:2732
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1812,i,2736584251537180279,15753255280899954934,131072 /prefetch:22⤵PID:3400
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,2736584251537180279,15753255280899954934,131072 /prefetch:82⤵PID:4400
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1812,i,2736584251537180279,15753255280899954934,131072 /prefetch:82⤵PID:2056
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3184 --field-trial-handle=1812,i,2736584251537180279,15753255280899954934,131072 /prefetch:12⤵PID:4356
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3208 --field-trial-handle=1812,i,2736584251537180279,15753255280899954934,131072 /prefetch:12⤵PID:4384
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 --field-trial-handle=1812,i,2736584251537180279,15753255280899954934,131072 /prefetch:82⤵PID:3644
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5088 --field-trial-handle=1812,i,2736584251537180279,15753255280899954934,131072 /prefetch:82⤵PID:4804
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 --field-trial-handle=1812,i,2736584251537180279,15753255280899954934,131072 /prefetch:82⤵PID:3364
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2360 --field-trial-handle=1812,i,2736584251537180279,15753255280899954934,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2200
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ea3f2b1b574dd23f90a1d80fdaffffab
SHA1e14c7a983b9ad06d106e49bfa6bb00dcb5a609c2
SHA25659d148b86723fae7e035a0bb28ef733a33033908c71975eaceb317897c55960f
SHA512a6c93684b5e69d9db97562aea193bf620dcca33865cac0a40659946b566f794f620dcf0b68145918678fca36998af4fc06b20deab3556f1919873a70f844440d
-
Filesize
6KB
MD50ee401eb91431903a40ea3ac68894ec4
SHA1d0cf1b750bb6924aa8a9d01565655605a32d669c
SHA256bc39cb4dcf0a1e61b79fc0c579cfe34a8608fd4aa63243d61b80b67ff8b3ee5b
SHA512c384ae2864d9c9cd36082e5df564622fc47dd761cf001d786f878faef7d522d232c57e4de04852aa90fd27ab6c7aaf0d9dd556837022f335e6762944f50eeb51
-
Filesize
15KB
MD548135c05f6456ba7f47e964b67a4e6c1
SHA198675560f963167f53cffe84dd10354905c084cd
SHA256e0e8ed6426c789e2f9b4be53904b32b79297f4420937442625dfc3a5521ef10b
SHA5120628b6a3c0d9da253dab7e1d11154bcd3c6b29952c4112ae5378ccb43ab6562801e9eb5c466adbe575fcae57d4603f2ffe5cc626ca632b412e2f49cf29db11a4
-
Filesize
143KB
MD5a6b424948a8923b030446d7dc818a9da
SHA19fda4f6060822b0a2777ecaacf0dc9a6171de191
SHA25666e10e43c36fe17db8259881e0db4b34b418b3df4dc0dd2be5b8d4acb176fb59
SHA512cdb142388113945cafd64f3b1ff4a760b550b85e599137e87e4db0ed7e95fa587abf20886ecf065b983c44c684599f8cac4054c8ac0340bcb125d047ea66d62f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e