Analysis
-
max time kernel
600s -
max time network
489s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23/03/2023, 14:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://res.cloudinary.com/dikycpkja/image/upload/v1679490959/image-7_q2phkp.png
Resource
win10v2004-20230220-en
General
-
Target
https://res.cloudinary.com/dikycpkja/image/upload/v1679490959/image-7_q2phkp.png
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133240550315221818" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2516 chrome.exe 2516 chrome.exe 844 chrome.exe 844 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2516 chrome.exe 2516 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeCreatePagefilePrivilege 2516 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2788 2516 chrome.exe 88 PID 2516 wrote to memory of 2788 2516 chrome.exe 88 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 2696 2516 chrome.exe 89 PID 2516 wrote to memory of 3004 2516 chrome.exe 90 PID 2516 wrote to memory of 3004 2516 chrome.exe 90 PID 2516 wrote to memory of 4200 2516 chrome.exe 91 PID 2516 wrote to memory of 4200 2516 chrome.exe 91 PID 2516 wrote to memory of 4200 2516 chrome.exe 91 PID 2516 wrote to memory of 4200 2516 chrome.exe 91 PID 2516 wrote to memory of 4200 2516 chrome.exe 91 PID 2516 wrote to memory of 4200 2516 chrome.exe 91 PID 2516 wrote to memory of 4200 2516 chrome.exe 91 PID 2516 wrote to memory of 4200 2516 chrome.exe 91 PID 2516 wrote to memory of 4200 2516 chrome.exe 91 PID 2516 wrote to memory of 4200 2516 chrome.exe 91 PID 2516 wrote to memory of 4200 2516 chrome.exe 91 PID 2516 wrote to memory of 4200 2516 chrome.exe 91 PID 2516 wrote to memory of 4200 2516 chrome.exe 91 PID 2516 wrote to memory of 4200 2516 chrome.exe 91 PID 2516 wrote to memory of 4200 2516 chrome.exe 91 PID 2516 wrote to memory of 4200 2516 chrome.exe 91 PID 2516 wrote to memory of 4200 2516 chrome.exe 91 PID 2516 wrote to memory of 4200 2516 chrome.exe 91 PID 2516 wrote to memory of 4200 2516 chrome.exe 91 PID 2516 wrote to memory of 4200 2516 chrome.exe 91 PID 2516 wrote to memory of 4200 2516 chrome.exe 91 PID 2516 wrote to memory of 4200 2516 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://res.cloudinary.com/dikycpkja/image/upload/v1679490959/image-7_q2phkp.png1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7fffe48c9758,0x7fffe48c9768,0x7fffe48c97782⤵PID:2788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1792,i,15775005892470758452,3067696392055586062,131072 /prefetch:22⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1792,i,15775005892470758452,3067696392055586062,131072 /prefetch:82⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1792,i,15775005892470758452,3067696392055586062,131072 /prefetch:82⤵PID:4200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3176 --field-trial-handle=1792,i,15775005892470758452,3067696392055586062,131072 /prefetch:12⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3184 --field-trial-handle=1792,i,15775005892470758452,3067696392055586062,131072 /prefetch:12⤵PID:4192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4840 --field-trial-handle=1792,i,15775005892470758452,3067696392055586062,131072 /prefetch:82⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 --field-trial-handle=1792,i,15775005892470758452,3067696392055586062,131072 /prefetch:82⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2700 --field-trial-handle=1792,i,15775005892470758452,3067696392055586062,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:844
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
705B
MD5a47c5b1d29035f4822dd65e43c39a08b
SHA16ac4bcebd29ad2ea5852af0813e7aeeaed94a618
SHA25645d363f8197e700ac3811566aad4931fd8639e39544c53fd624b6322e919c11f
SHA512564960507194dad43a2f55c46e3997051b3c6a6685fe7f70c974efb57923d1a98edc5bb8cffa9b6b17ac21836e579a9b123f7eaec5c80a4731427a5e0c788403
-
Filesize
539B
MD581325da73d6d732744c4fef397460e0e
SHA15d7ab68d9dd86d21d1bdec274491debfcc8c097d
SHA256621fe76c0bfc4854cf61297b22314ea2013aff94adf9138a0d7b1b22291937bb
SHA512f604e4d29cd2aebe2ea53db5eda1e572ccb036838c4fc9816e378feb8cb2215e19c86936c5ca652e1d5fd393ab466a6120e966642214f948a8d6540ec893f57d
-
Filesize
5KB
MD53e235a406cd187549d82d0b3fb63882f
SHA188c5415a640202410e32a51f99447985bb574e59
SHA25634118cc34ec8de6efcce2d240e0784cdc2fe943091b9736b5b315bd34eb7e02c
SHA5127abf3dae81d0bf50257cca8b4e1c4a86ec57a391f7a7afcb6732e851ab8efe2a234ac75e5d2ef27fc47a959e0cd15769528e5f0411905f50e1f143afcf39247b
-
Filesize
5KB
MD5aaad2cbfadbc391f32f3d678045cd848
SHA1c6bc2c1af5c45831c3b8475248890856a46a70b3
SHA256930b922da0946fe7ad3b30a7798d6772e712102d792a94ffec3afbec181d08a0
SHA51265cea387b9ae1c369a79d524b3f36d99c98b8d438dec4b9d11496626bed7399ec045d2944e3fd17a3b8b66283079e32506c4182880953bb32fe4bac31ea21193
-
Filesize
6KB
MD577b4b57a855a98fe24796f1997484d66
SHA130c08c66beefb4b24a0e0bc62498da742c3a83e6
SHA256bd47150925e3d795dbf210f30c63c224272113db4a36d2d1ba28c4610adf6add
SHA5129051191b524e5f16722a945a46ce523fd4d4519d0afae73f2aa99d386159a9462c56734a4847352dfac56a78a53aeebd6c6d5d2c9f7b0d30028ed533e193260f
-
Filesize
145KB
MD50fc5b3476bfc77b9f6c42750ca57336a
SHA17cb62eefadadb7d129f736fc38bcab86e5a6ef68
SHA2560d05ad2f186eb27ca6567b5a1678e6646c5d0dfef7a5b63b30775f061ee78b94
SHA512650fe0591463938050689dc71894976a93f28facc3f31faa7587b583905023b2145a0bd5995b054d87aa9cba1cba2e669a95427eebc026fc84c02f93993be055
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd