Analysis
-
max time kernel
17s -
max time network
21s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21-03-2023 16:38
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133238903533492981" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 2072 chrome.exe 2072 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe Token: SeShutdownPrivilege 2072 chrome.exe Token: SeCreatePagefilePrivilege 2072 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe 2072 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2072 wrote to memory of 2084 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 2084 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 4492 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 2980 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 2980 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 3064 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 3064 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 3064 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 3064 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 3064 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 3064 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 3064 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 3064 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 3064 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 3064 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 3064 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 3064 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 3064 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 3064 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 3064 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 3064 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 3064 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 3064 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 3064 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 3064 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 3064 2072 chrome.exe chrome.exe PID 2072 wrote to memory of 3064 2072 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://jira.impdir.com/browse/RISK-1247101⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffddc179758,0x7ffddc179768,0x7ffddc1797782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1264 --field-trial-handle=1824,i,779973947592475124,16278271603049174972,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1824,i,779973947592475124,16278271603049174972,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2140 --field-trial-handle=1824,i,779973947592475124,16278271603049174972,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3156 --field-trial-handle=1824,i,779973947592475124,16278271603049174972,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3152 --field-trial-handle=1824,i,779973947592475124,16278271603049174972,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4448 --field-trial-handle=1824,i,779973947592475124,16278271603049174972,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 --field-trial-handle=1824,i,779973947592475124,16278271603049174972,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1824,i,779973947592475124,16278271603049174972,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\94fc47e2-6960-4291-a72a-0bb6d5b18e39.tmpFilesize
5KB
MD5ecd0ab161fd78f06b486edbe028d452a
SHA1d1f6e3658fde6b72922fa1918bd6990e7aa92f92
SHA256a29b4dbecdfd169ce7e32af11430f2a99db5a34458647e3b1df46d2b680b9e8c
SHA51266c880ac3d61174538ad5576d186f81d01d10ca4af6608b76f805ddcd753529bfabe63ec1b86afe45b87c96fc3848718d404a9967192dda6fbcbbb554574d945
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
706B
MD5e03ce2455a84f55305cc20d1a4c60c0c
SHA1dc578dfe66794be56a7c7c44c0c21c368bb61f31
SHA256919f521babda82544e00bddfe08eac15a523f17c2bcd1c1d93dc397ca970c03d
SHA512e98a97517707494dccbec78d554177cc22a854a5eed1ee0df6d13257bb980cc55a914f0cfb938ec1f171f170ac7ebd24bca3076fe7a450f21e03c15ac93a2cd1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\af1a9d25-5471-4f8a-b49b-efeba75557f8.tmpFilesize
144KB
MD50d1571ff63fa89174cf11f7eb83b0cfd
SHA16abba5d9f91357e034adf6c1c8af4c167a168019
SHA256b87e687c96f2372e9915d69e7c2fc3849a86d5ed76ca59bdbbc1d1228db8f15f
SHA51283bd81e2ee81c4a21aa3fc677c11fb4dc426b34aa45825d2dcf2289a7f7bd7371dac5f8d629c796d9fc63c2398fb9a811e381f4dc04ca9f3b6466822a84db942
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_2072_MCPMXQMSOVNFACNHMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e