Analysis
-
max time kernel
31s -
max time network
18s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
24/03/2023, 11:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://2ydkar7u.page.link/H3Ed
Resource
win10-20230220-en
General
-
Target
https://2ydkar7u.page.link/H3Ed
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133241356463309118" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3544 chrome.exe 3544 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe Token: SeShutdownPrivilege 3544 chrome.exe Token: SeCreatePagefilePrivilege 3544 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3544 wrote to memory of 2968 3544 chrome.exe 66 PID 3544 wrote to memory of 2968 3544 chrome.exe 66 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 2576 3544 chrome.exe 69 PID 3544 wrote to memory of 3820 3544 chrome.exe 68 PID 3544 wrote to memory of 3820 3544 chrome.exe 68 PID 3544 wrote to memory of 4644 3544 chrome.exe 70 PID 3544 wrote to memory of 4644 3544 chrome.exe 70 PID 3544 wrote to memory of 4644 3544 chrome.exe 70 PID 3544 wrote to memory of 4644 3544 chrome.exe 70 PID 3544 wrote to memory of 4644 3544 chrome.exe 70 PID 3544 wrote to memory of 4644 3544 chrome.exe 70 PID 3544 wrote to memory of 4644 3544 chrome.exe 70 PID 3544 wrote to memory of 4644 3544 chrome.exe 70 PID 3544 wrote to memory of 4644 3544 chrome.exe 70 PID 3544 wrote to memory of 4644 3544 chrome.exe 70 PID 3544 wrote to memory of 4644 3544 chrome.exe 70 PID 3544 wrote to memory of 4644 3544 chrome.exe 70 PID 3544 wrote to memory of 4644 3544 chrome.exe 70 PID 3544 wrote to memory of 4644 3544 chrome.exe 70 PID 3544 wrote to memory of 4644 3544 chrome.exe 70 PID 3544 wrote to memory of 4644 3544 chrome.exe 70 PID 3544 wrote to memory of 4644 3544 chrome.exe 70 PID 3544 wrote to memory of 4644 3544 chrome.exe 70 PID 3544 wrote to memory of 4644 3544 chrome.exe 70 PID 3544 wrote to memory of 4644 3544 chrome.exe 70 PID 3544 wrote to memory of 4644 3544 chrome.exe 70 PID 3544 wrote to memory of 4644 3544 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://2ydkar7u.page.link/H3Ed1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xd8,0xdc,0xe0,0xb4,0xe4,0x7ffd93da9758,0x7ffd93da9768,0x7ffd93da97782⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1916 --field-trial-handle=1744,i,15207865171795654889,3961659856037871376,131072 /prefetch:82⤵PID:3820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1744,i,15207865171795654889,3961659856037871376,131072 /prefetch:22⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2036 --field-trial-handle=1744,i,15207865171795654889,3961659856037871376,131072 /prefetch:82⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1744,i,15207865171795654889,3961659856037871376,131072 /prefetch:12⤵PID:2964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2964 --field-trial-handle=1744,i,15207865171795654889,3961659856037871376,131072 /prefetch:12⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4488 --field-trial-handle=1744,i,15207865171795654889,3961659856037871376,131072 /prefetch:12⤵PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 --field-trial-handle=1744,i,15207865171795654889,3961659856037871376,131072 /prefetch:82⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4920 --field-trial-handle=1744,i,15207865171795654889,3961659856037871376,131072 /prefetch:82⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 --field-trial-handle=1744,i,15207865171795654889,3961659856037871376,131072 /prefetch:82⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5000 --field-trial-handle=1744,i,15207865171795654889,3961659856037871376,131072 /prefetch:12⤵PID:4284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3768 --field-trial-handle=1744,i,15207865171795654889,3961659856037871376,131072 /prefetch:12⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4164
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
538B
MD5a0da5a57dd5286648e73513306f21f61
SHA1599f04f94eb1e4188908227411b51458af237c56
SHA256a2728be56e75710675bab5aefc90c836fb49d88d215f032d94cfd5bdb359f24c
SHA5127aaab274ea6168a422dea7e9a0e519fd0d87c3de60419bad244bbdb6dbf3b51ecb2f9f23aea7f4a7840333d1641f33febc7e1a8abbfc2312b1a6e9b4dd410b88
-
Filesize
8KB
MD5b498fb421bf0a2e9c6687171b3d96c3b
SHA1882423fb3c60e43c52f193f83fe87aecbbd3963f
SHA25662bea7b7c48a0a886a8347365175fc7804070e7c85ada133f5506189680def1e
SHA512052b54e774c0dcc79e3a04ee7e454ebbf0b07ba25c91fcf021cd89e5d82aac7848df796e83451d27a59011ec3510002b1c8020b13438279f4908db54e383b23d
-
Filesize
9KB
MD5500e1053e3f99da645db0293bd6a0bd4
SHA11f328ceb8406c8b177173b3766cad937f719b60a
SHA256e533995605066eace49500a525fbcfa3fe8afb452fad15b1f18e614d164291cb
SHA512f8c8b9b269d300672d6d4abefd1b4387888006c8000658eb934379ad67613987c5e82b80cf9bda67872b51c2c15146810c5b012e0aa03c0d5e07b3b8a44e9cad
-
Filesize
12KB
MD5b772644a8c4ecc3e7e762319f061c816
SHA1421e465120f9bdccf147c80276345d419c84c1f6
SHA256b3c937892ab774acc67080d3fca83b9ebb400c2b54c0f2c35ac85d735d25a569
SHA512322b796692d6ad03f3ba8905d52e4a63bff44f360271f7360302b3f93e3b22b95dd514c7161b988ac9129036274819e78a8412e7f1a4de926a4ac844900acf3b
-
Filesize
144KB
MD5040935fa1b25f27f5a441e39d9a50739
SHA1023f32ba240c13dd7ef6843efdbb53891f92b639
SHA256ce72f7190daebd43f472523fc570e8bf53cc452354c2d61eb9d5143760dbef8b
SHA512f2dd45c6b5be2cb17ab5e45d88324c6b7c5a8b95478f1cd3d277c7bf502b8d4f4e5c6a6cb6ac1f9813587e5a905a09d018df00deb3fb941be85734c5d7d15014
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd