Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
23-03-2023 11:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcS_7HfNZZeie-lUAyl9Y6vIgMzH-azWpf4iuHGs-9ma_A1qmmrSBHXK5VsBK1hkdiJPMQ&usqp=CAU
Resource
win10v2004-20230221-en
General
-
Target
https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcS_7HfNZZeie-lUAyl9Y6vIgMzH-azWpf4iuHGs-9ma_A1qmmrSBHXK5VsBK1hkdiJPMQ&usqp=CAU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133240477259612701" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3824 chrome.exe 3824 chrome.exe 4008 chrome.exe 4008 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3824 chrome.exe 3824 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe Token: SeShutdownPrivilege 3824 chrome.exe Token: SeCreatePagefilePrivilege 3824 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe 3824 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3824 wrote to memory of 1076 3824 chrome.exe 84 PID 3824 wrote to memory of 1076 3824 chrome.exe 84 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 3300 3824 chrome.exe 85 PID 3824 wrote to memory of 1476 3824 chrome.exe 86 PID 3824 wrote to memory of 1476 3824 chrome.exe 86 PID 3824 wrote to memory of 5104 3824 chrome.exe 87 PID 3824 wrote to memory of 5104 3824 chrome.exe 87 PID 3824 wrote to memory of 5104 3824 chrome.exe 87 PID 3824 wrote to memory of 5104 3824 chrome.exe 87 PID 3824 wrote to memory of 5104 3824 chrome.exe 87 PID 3824 wrote to memory of 5104 3824 chrome.exe 87 PID 3824 wrote to memory of 5104 3824 chrome.exe 87 PID 3824 wrote to memory of 5104 3824 chrome.exe 87 PID 3824 wrote to memory of 5104 3824 chrome.exe 87 PID 3824 wrote to memory of 5104 3824 chrome.exe 87 PID 3824 wrote to memory of 5104 3824 chrome.exe 87 PID 3824 wrote to memory of 5104 3824 chrome.exe 87 PID 3824 wrote to memory of 5104 3824 chrome.exe 87 PID 3824 wrote to memory of 5104 3824 chrome.exe 87 PID 3824 wrote to memory of 5104 3824 chrome.exe 87 PID 3824 wrote to memory of 5104 3824 chrome.exe 87 PID 3824 wrote to memory of 5104 3824 chrome.exe 87 PID 3824 wrote to memory of 5104 3824 chrome.exe 87 PID 3824 wrote to memory of 5104 3824 chrome.exe 87 PID 3824 wrote to memory of 5104 3824 chrome.exe 87 PID 3824 wrote to memory of 5104 3824 chrome.exe 87 PID 3824 wrote to memory of 5104 3824 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcS_7HfNZZeie-lUAyl9Y6vIgMzH-azWpf4iuHGs-9ma_A1qmmrSBHXK5VsBK1hkdiJPMQ&usqp=CAU1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffde6489758,0x7ffde6489768,0x7ffde64897782⤵PID:1076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1904,i,11248370746377986,13076723447938022856,131072 /prefetch:22⤵PID:3300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1904,i,11248370746377986,13076723447938022856,131072 /prefetch:82⤵PID:1476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1904,i,11248370746377986,13076723447938022856,131072 /prefetch:82⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1904,i,11248370746377986,13076723447938022856,131072 /prefetch:12⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3028 --field-trial-handle=1904,i,11248370746377986,13076723447938022856,131072 /prefetch:12⤵PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4692 --field-trial-handle=1904,i,11248370746377986,13076723447938022856,131072 /prefetch:82⤵PID:1900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=1904,i,11248370746377986,13076723447938022856,131072 /prefetch:82⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4704 --field-trial-handle=1904,i,11248370746377986,13076723447938022856,131072 /prefetch:82⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2484 --field-trial-handle=1904,i,11248370746377986,13076723447938022856,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4008
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3844
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD528708c29df9dd3e3c5cbdc1607d25d43
SHA186aedf7dc6a6747a4fdc9c062432ad2bb41db5a3
SHA2563e5902c6a06dc7ba102feac3f62a1d14f5dadd0f78d941f8e5bcaf637e61427a
SHA512d87e68d57214a4e6c04468762959da86ad08e6e4b196ae747e1ae7e84abe894313c543ae288fdabee9a738125d8c3307673a23ae3823d74695a6a3b729108957
-
Filesize
6KB
MD5ac7aaf0b3adda09d9580fe90fe6c086a
SHA179b240de348850a0bbdc485f0ebb38eaead8eb85
SHA25660676dace764a8021824d99bbb2a93fe35352b87f994c84681e10f264f8b1e80
SHA51288c4fde3f455c32bbe4f0416d81ccf9294c9323e0c4e217f7a9dbb9ca6e24e2aea493bc89c4c1de0c9f57316d3e11c0326120b93274b74cc84918cfd285ebda6
-
Filesize
15KB
MD552bc79d1586a8c44966ec5e0308f6c61
SHA176f70120f3c019239a77c11b88458580b7df7765
SHA2568bf434100f56a73b1359b9491b9d2d0caeb77c433aff2beee47444201ae7cbf4
SHA512ca42ef9f39ec9a694d812f8b470116e744a50d8c600a6ae41bec42b917ea9de1c4d986bf1aeb304204ca7dbcc7f1e6b8bff5a7d43acd553d0500b5d14a9d3081
-
Filesize
145KB
MD537280705788e398832d1d235b23a88bf
SHA1d10f104a22473beb3265553766650315493afcfe
SHA2563fa3db72fa62d7e8c291cbf0a93a3e580eb1114e3a8d27866780eb9bf8828a98
SHA51251b053dc5dfde66a54f1130aeb7f61513ce3012a8df07c38ec3ad14cd7f34e529b10979f38f273ee03dd160610944975cdf23921ad0497b37c63814a7a600f77
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd