Analysis
-
max time kernel
22s -
max time network
21s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
21-03-2023 22:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://go.aspiremag1.com/l/t6vzmTEfGBq0PGmfJ4R9Sjh4hEzLYPlzTp-Ae7dfrEM
Resource
win10v2004-20230221-en
General
-
Target
https://go.aspiremag1.com/l/t6vzmTEfGBq0PGmfJ4R9Sjh4hEzLYPlzTp-Ae7dfrEM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133239165714707799" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4112 chrome.exe 4112 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4112 wrote to memory of 2156 4112 chrome.exe 87 PID 4112 wrote to memory of 2156 4112 chrome.exe 87 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 1096 4112 chrome.exe 88 PID 4112 wrote to memory of 4672 4112 chrome.exe 89 PID 4112 wrote to memory of 4672 4112 chrome.exe 89 PID 4112 wrote to memory of 1700 4112 chrome.exe 90 PID 4112 wrote to memory of 1700 4112 chrome.exe 90 PID 4112 wrote to memory of 1700 4112 chrome.exe 90 PID 4112 wrote to memory of 1700 4112 chrome.exe 90 PID 4112 wrote to memory of 1700 4112 chrome.exe 90 PID 4112 wrote to memory of 1700 4112 chrome.exe 90 PID 4112 wrote to memory of 1700 4112 chrome.exe 90 PID 4112 wrote to memory of 1700 4112 chrome.exe 90 PID 4112 wrote to memory of 1700 4112 chrome.exe 90 PID 4112 wrote to memory of 1700 4112 chrome.exe 90 PID 4112 wrote to memory of 1700 4112 chrome.exe 90 PID 4112 wrote to memory of 1700 4112 chrome.exe 90 PID 4112 wrote to memory of 1700 4112 chrome.exe 90 PID 4112 wrote to memory of 1700 4112 chrome.exe 90 PID 4112 wrote to memory of 1700 4112 chrome.exe 90 PID 4112 wrote to memory of 1700 4112 chrome.exe 90 PID 4112 wrote to memory of 1700 4112 chrome.exe 90 PID 4112 wrote to memory of 1700 4112 chrome.exe 90 PID 4112 wrote to memory of 1700 4112 chrome.exe 90 PID 4112 wrote to memory of 1700 4112 chrome.exe 90 PID 4112 wrote to memory of 1700 4112 chrome.exe 90 PID 4112 wrote to memory of 1700 4112 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://go.aspiremag1.com/l/t6vzmTEfGBq0PGmfJ4R9Sjh4hEzLYPlzTp-Ae7dfrEM1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd04a39758,0x7ffd04a39768,0x7ffd04a397782⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1816,i,8477618782252258731,9080273433593352304,131072 /prefetch:22⤵PID:1096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1816,i,8477618782252258731,9080273433593352304,131072 /prefetch:82⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1816,i,8477618782252258731,9080273433593352304,131072 /prefetch:82⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3204 --field-trial-handle=1816,i,8477618782252258731,9080273433593352304,131072 /prefetch:12⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3188 --field-trial-handle=1816,i,8477618782252258731,9080273433593352304,131072 /prefetch:12⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4768 --field-trial-handle=1816,i,8477618782252258731,9080273433593352304,131072 /prefetch:12⤵PID:4260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 --field-trial-handle=1816,i,8477618782252258731,9080273433593352304,131072 /prefetch:82⤵PID:556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4932 --field-trial-handle=1816,i,8477618782252258731,9080273433593352304,131072 /prefetch:82⤵PID:4680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 --field-trial-handle=1816,i,8477618782252258731,9080273433593352304,131072 /prefetch:82⤵PID:1552
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2820
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58d608382626e5f9b187cf774a594ec18
SHA1251dd1e7108c2cd32a973a96cef7fc759d28b0d3
SHA2561f40ef766a321d8536316ee83b2ef127d40b870b546e22c6a138422bfe17ecdb
SHA5121353d4fdd68470fbb650070006259c6fa5ade499c26023b78c018798cb6e060ce8ef38b43c3001311df074ea242ae0848c9843d84bd6903d7313129d27bcf2a8
-
Filesize
6KB
MD50e731d7e6ead975a9b90d484843bd832
SHA1e02b0e88bf5117c6eed95a6522cf5a0273c324c3
SHA256fcf6bbc78e87a5178aecd5f4cf07c9a174fdafc722f69b13751594b53fccdbc4
SHA51255718f229deb1509997d8bb7568feff4ee2d138a975839456c9e6ca94c989c96c3b471fd81ace3f9b5c86cc68049a5ae26a9533226f1963d51af70f0c649d256
-
Filesize
15KB
MD5b14a12a015c8f36f5f192c129636136d
SHA12bde3886daed5b6912250ee1c1dcac3de793c43b
SHA256ab7f55a6e55318a3e9dce045a73d51fe67009fbec40396665660c46cba7a49a8
SHA51204af9d59fe4affde5837720eddc56eed8fd70f64c3e148961be9a2f498739f5f256769b6c51e6a8f3761d09411584c5101f14fae05d2015a332e0f7a585bcac4
-
Filesize
144KB
MD50c82c6154a06f1a5d3c53b5023362696
SHA13a1607f15dfac38cb5074616193da5c9094a3e9e
SHA25678faf60a556b0b53a0abcf9ec8bb9ca08561721396f2e0230043ff94e882e1a9
SHA5122cdaff3db475247eddcedf23857b8f60a52ffcc6363332c73070000efbe50b7142c8a0c99a69e7e8f7737028a7ea880b74b4d9e29ed99a34a818d85c410ad0fb
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd