Analysis
-
max time kernel
599s -
max time network
502s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2023 17:56
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133239850409782529" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 840 chrome.exe 840 chrome.exe 2292 chrome.exe 2292 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 840 wrote to memory of 3656 840 chrome.exe chrome.exe PID 840 wrote to memory of 3656 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 4712 840 chrome.exe chrome.exe PID 840 wrote to memory of 784 840 chrome.exe chrome.exe PID 840 wrote to memory of 784 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe PID 840 wrote to memory of 4996 840 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://8y8cdufnlw63f4eaf87bef4.online-sheet.ru1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xdc,0x100,0x104,0x84,0x108,0x7ffa90389758,0x7ffa90389768,0x7ffa903897782⤵PID:3656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1800,i,15115548405454914000,13478325925428308594,131072 /prefetch:22⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 --field-trial-handle=1800,i,15115548405454914000,13478325925428308594,131072 /prefetch:82⤵PID:784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2180 --field-trial-handle=1800,i,15115548405454914000,13478325925428308594,131072 /prefetch:82⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1800,i,15115548405454914000,13478325925428308594,131072 /prefetch:12⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3024 --field-trial-handle=1800,i,15115548405454914000,13478325925428308594,131072 /prefetch:12⤵PID:1772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4500 --field-trial-handle=1800,i,15115548405454914000,13478325925428308594,131072 /prefetch:12⤵PID:924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 --field-trial-handle=1800,i,15115548405454914000,13478325925428308594,131072 /prefetch:82⤵PID:3436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 --field-trial-handle=1800,i,15115548405454914000,13478325925428308594,131072 /prefetch:82⤵PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1800,i,15115548405454914000,13478325925428308594,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2980 --field-trial-handle=1800,i,15115548405454914000,13478325925428308594,131072 /prefetch:12⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5670756fefc47efe6dc418231b69a0a8a
SHA1099649de32ce85822537116f5a088062f54cd2bf
SHA256270abd5995424146bf8eff8a6f15b088d6a471e7649d8e1558245ddb54c4cc70
SHA5125395b4082561a7e1cd2cad96ded7b3de7a6e763d1542aed79d7a9c535f194b99a8ab03fd8b09b3d411a9ac96df13a886d7b6293bcd9e437680eaceddf46a37b6
-
Filesize
264B
MD5b839015301ebc42fa27635efd02104fb
SHA1b492038a73110ffc9f86b9db1632965054650bbb
SHA2563a7981350e6c349d00d19e53466a423fd581eac12b5197d56e2288350514a1df
SHA5122f3fdab1ef1a263bda05711131ac5aa0e58ded11ea26a2a5131c11216d6fa9f0de69ded0deabde637c3ffccb492328433ef9d8c5263c0e3680e396ddabf4403b
-
Filesize
168B
MD502ada67661ae8b92ee425fc0da443b8e
SHA10c6f7a8c28179b73f7b19e15fda05c952d437182
SHA256f0bf46cdfe030a2eae3893a78c2d2e74e3d17006122ec3458e0c6f43dc4b39fc
SHA51251714e80963b5ed81413e4a10ab2ee2782f2fc37736ca237b51471ef04a9f85e884faa9acbe8000f72b75abd802696eb89aab89e9459980add19e35ec897e766
-
Filesize
1KB
MD5a3dc4fa88360e097f0be5d03090f5ab4
SHA1f7159760bf101add04a750446ec086fa884f945e
SHA2566d85b95815a6ee8ad05a8b9c488acfdaca06bc5c6da467b6309cb2d5c5c54b76
SHA5129972729e4261f6f87000c6ba730e7929caaf3eb2e3203b5a1d7e96d394388ec4b776171ba830c86276e9525b33f533a4ec63fda02e71c8e40e005005a0b582ae
-
Filesize
1KB
MD5c4d6dedf2d65772f5f2b3d8a5af7a5ae
SHA163660b98fb10780a750bb1a9b6e16225c4e9a9bf
SHA25602e7a580958ca59907165e9734891e9d29f51df61525214bf2e179dae7207aa9
SHA5127f475bb7c9f14cc4505c0bb34876619b69529240bf820796d4a36ca640f2a5ae13f6204b6b9b530838bbb0de500d3e50f1ee4da71ccd539bede9d37a52cb7fd3
-
Filesize
4KB
MD5c6a7afcda52e6152b900db2bc9725c66
SHA12f3d61934c1d90c84e6d3ef9b80f60b1c3865234
SHA2565f6a3a18e43897a53b693be7c7414b40d53a8a15eaa28b53e393e106f8400c85
SHA512328b9b82d69d53a241a01d3f62ef47da5d791447f49f9fb5bd892c2723cfcfb96887013d82432f4ea58d22f49a06ac29d68b054ac54702b30dd2ab955fec2419
-
Filesize
4KB
MD528066281de255dcb7d09eb7fdb34907a
SHA1568dec2105d3fed7a9ce0f99e1263d4d85c24f22
SHA256ac1f839af363a6ab8bd80451600de37e8819291e61f9c5069809c516b2be57cb
SHA512cf160e95a6b2f13035ea0fb2b87247ed03f511533ef10f80ce4bba6ecccb7eed02711dc17e125c7c71ce8b8749f81fa180623d07775fd8dfa59db7a28c5125a0
-
Filesize
4KB
MD5b56928b6fa26e145288af141f2900ce7
SHA11bac9f6c93b4bbfd52a7f3f79d997d7d060fad04
SHA25660f2f81904331f42f9f3e91e916c254524c6f3f5139c985a2e1269d82c4722d2
SHA512b8a1681ee6e361583a30af609306c8001a4682bdea3f027d2938851bc44caee1b7fc777d7b5208f7044d8041a77aa615bf5b30902ef87a92e8b939a213c93c03
-
Filesize
4KB
MD5a069acf33945174f16db3795e1e21d83
SHA182fe89177755e3e5978dbc6c22ecb6ef6e3dfed9
SHA2566b780abc35e0475499381050fa4650ea427af5c007e5cb5d2500d3357352f5e6
SHA5125512586bf5cf11fb682e13fbbe5fcebfa1bcb4cebf1905a54cc7c9154e615195873de185041b2e8b4190b86e4f4581fc7c699be6b51fb509b67b16142dda6b42
-
Filesize
144KB
MD523176228924f2b2dfd0b899bc996427b
SHA12af840154445dd806d8d08e023f7a92f2f774f46
SHA25606e3d0dd8c5ef6378e77003488f7d503109d0a13fad0b82e591c22c99fb8838a
SHA5121f0877b203b38cad23da89ff800e5c765ab9d0a35c162589a74bb197a38af098f28e5a818d37291534cc5baf81e3706b135c985fdaba516faf7c053b7f40bd27
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e