Analysis
-
max time kernel
60s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2023 04:27
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1376 3404 WerFault.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133239364644788432" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 4284 chrome.exe 4284 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4284 wrote to memory of 1764 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 1764 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 3356 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 2680 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 2680 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 2944 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 2944 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 2944 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 2944 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 2944 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 2944 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 2944 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 2944 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 2944 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 2944 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 2944 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 2944 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 2944 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 2944 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 2944 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 2944 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 2944 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 2944 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 2944 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 2944 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 2944 4284 chrome.exe chrome.exe PID 4284 wrote to memory of 2944 4284 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://forms.office.com/Pages/ResponsePage.aspx?id=2eYxeGzc0Uyexh3CtBMxlW2j8qLfVydHnvI57sJlyCxUOFdYUDlYT0w4R1dFWkhWWldPRko4VVQ3Wi4u1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8fae59758,0x7ff8fae59768,0x7ff8fae597782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1812,i,3349944347421219104,2662872155152930047,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,3349944347421219104,2662872155152930047,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1812,i,3349944347421219104,2662872155152930047,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3232 --field-trial-handle=1812,i,3349944347421219104,2662872155152930047,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3244 --field-trial-handle=1812,i,3349944347421219104,2662872155152930047,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4000 --field-trial-handle=1812,i,3349944347421219104,2662872155152930047,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 --field-trial-handle=1812,i,3349944347421219104,2662872155152930047,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5196 --field-trial-handle=1812,i,3349944347421219104,2662872155152930047,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3504 --field-trial-handle=1812,i,3349944347421219104,2662872155152930047,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 472 -p 3404 -ip 34041⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3404 -s 17481⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
216B
MD51bfcbe1cad142521de7d2dfd10c1ed45
SHA1069abecd1b53882cd45d40077cea74001a0a280f
SHA25644b26c61b20eb358c76300637dd947e9f6404cacee66ad17881fe8a94db3a192
SHA512d9dd4c27b0558648fc12194189e0c91d0ce283be9b3045257d2d4e18bb301d1091219b08cb21b83cc422fed612485a1c28db109659f542451c3ee37e8917ea06
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD590b8df7ecf25e2fc0999478981282e7f
SHA161564604817070d85cf7e8259dc975f9669f2f03
SHA256855cbd2d51d5ba2f2fd67296d5345987690d8d0727e51aeae20fa5ef0f8bd70d
SHA51254762285a6c5ed223935161f56fbc01f13a3c9f565780982813ebb6a9d204263b53af135d376c015b3b640763559f7a6d553b1a55cd70560c4e9a073a23f1354
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD598f8a68ff4ed28e1fc4c54d0f52fcf18
SHA12459f13f1d5f0fc02cafd6d94532b3c6f5823a50
SHA2568d0b7faf9fd6d4e098a526fd50e59c2e7be9b7e8b4ca50a63ebb5368414a51a7
SHA5128940b8c1648224666a65c83902d751a90f6b2ebf1e8b1233442d5c22b88327159d402951b88cf23303422490e1e23448c25ddb45cdd31d50602b1df43a47c62f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
15KB
MD5b14a12a015c8f36f5f192c129636136d
SHA12bde3886daed5b6912250ee1c1dcac3de793c43b
SHA256ab7f55a6e55318a3e9dce045a73d51fe67009fbec40396665660c46cba7a49a8
SHA51204af9d59fe4affde5837720eddc56eed8fd70f64c3e148961be9a2f498739f5f256769b6c51e6a8f3761d09411584c5101f14fae05d2015a332e0f7a585bcac4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
15KB
MD5ba9db78e7eab493b02ab6480616ee876
SHA1434080a0eccbe971ce20b4f9400c454ab8bc944a
SHA256d42b4084ff9db554298a99a3ab2a384a640b6ac180d9778d9c330c64ce085697
SHA5123fa3e4992bfad601a9817defb22ee83504ccdb51f692de7c0aff0d0e67ddab08807c3c4d1ed5418fe5fd3ad99d370605bc40ba42745195266cba4c92914aee23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
144KB
MD52950879112ad052a3686482cbe1fafe5
SHA19261c966a72fabeed129aa4e1e189b772ea11c46
SHA2565ceb0c3cfbbb0b526e236c2d83c6010d5957148faa9c0c844322f32a394ca393
SHA5125882f3dffa1138f0049f1a324f43600637c3c6ce063b8ed62ed3cd6cf9b0e1d77a1f3efc94f14ccd60691c1cf908347acaaa8de2c663aac24cccf46621667a29
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_4284_JSWOLDFAHFMNNSBKMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e