Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 14:00
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133241400287504859" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 1868 chrome.exe 1868 chrome.exe 4352 chrome.exe 4352 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1868 wrote to memory of 2412 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 2412 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 736 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 1544 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 1544 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 4256 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 4256 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 4256 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 4256 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 4256 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 4256 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 4256 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 4256 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 4256 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 4256 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 4256 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 4256 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 4256 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 4256 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 4256 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 4256 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 4256 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 4256 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 4256 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 4256 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 4256 1868 chrome.exe chrome.exe PID 1868 wrote to memory of 4256 1868 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://atomictransportdiv-my.sharepoint.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffde5089758,0x7ffde5089768,0x7ffde50897782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1792,i,14094208406698128455,3562421830605919784,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1792,i,14094208406698128455,3562421830605919784,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1308 --field-trial-handle=1792,i,14094208406698128455,3562421830605919784,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3096 --field-trial-handle=1792,i,14094208406698128455,3562421830605919784,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3144 --field-trial-handle=1792,i,14094208406698128455,3562421830605919784,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4468 --field-trial-handle=1792,i,14094208406698128455,3562421830605919784,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 --field-trial-handle=1792,i,14094208406698128455,3562421830605919784,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 --field-trial-handle=1792,i,14094208406698128455,3562421830605919784,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2804 --field-trial-handle=1792,i,14094208406698128455,3562421830605919784,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
120B
MD5c77bdd1dc05445283b2370696779114b
SHA14138640a5f50fa3cdc142a52fd98eb56ca37122b
SHA25651e590dbcef6b38ac81a757c7e7a29baf16d4f95165e402f31c39b9c7c7060ea
SHA512527fe9a638cd4d3b8dd7fb29b961f42fda2ea175f23ebc72913f395bc11957d1f0db4c5d8aaaedfded97793524e7d4e224f2457ad7248a76dd86bb1e204b5240
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD551932021dd81913f11461e0b51f292e2
SHA1b352a155fdb995828cf22042f38292956b487d56
SHA256574b74d14e6cbc5e72bd6aae5dfb1b2e066d6c9f85df6be94dd08383e00579f8
SHA5125d2fbcd3f830e4b0b5944f471a3f376e59a3ca602b39c679c343efab6a07a7f83f425b4787b5443359810bc8ecce8c0e45db9f1ea0fdc759e36c5de672c12597
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
874B
MD513e44484d1fff57ed8ed27ad4cbb75eb
SHA1dcf15a93df6a324620fcef0bdde938a7e1b20335
SHA256ff37f9ec8341582e4870a6f11343a7331c531df1a7019f6471d4c24c82033888
SHA5125441f952c9033ac15d8182442ceac1bee1606ea20603509a1275420477894351359ed87b3a139582a0257337a45d43af1de4351195f9eb3110ef996c459b0657
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5af1e03f5ec84624ee78c028d8ee2bc95
SHA126a76197c5aa0940371bb6b17bdb8646e05489d0
SHA25645bb0339fa3710e523ba46b34754c51e169670db89357a95508de081ac6ca515
SHA512b7223713811c67953522119e78901725a09fcef9055ce69cdbe7c97f430f91a616a24970aac5165b4af4b8edecbc68433ea2fe56ca5454d456ae0b512b6903f5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD50a97e898479fec6b8c24bac52702a1a3
SHA16f1d85a52718ec2a03a1f2dd74c2d0015d0c2005
SHA2560b8ad07f9d66c2677357e4e67653213dfab4961f0451e0e51c761463a72548d7
SHA512e3808d45920afef2507f48891cdf099a734db352f84f4f975205383338c9110565972f024ca8e51d5b4497fc0869d33f4484fa1de266d8246c14ca30a09ab4bb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5f1d482352b6ae9b1e1aefdb9e3e1fa3f
SHA1438b8dddb304073f638a373c4c5069aa4b534726
SHA25647194758f21f2df0f2c96a733b7c97daacd38e20d60ffbb38f88baabcb7e9e55
SHA51260616f891a07a2c515fcdf836856b763d3f29445a5c7311b5edeb94f6c96dbae54f6d0d2727984080a45fc81d4bb6f2da22bdb38174b857df6028b8335b4d45a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
144KB
MD58f80c26c46b1b9d6f30257ec221a8312
SHA1c6e0ea4b670fc7651c04979f0cff4b629a0b8100
SHA256d4d85f418d175e358ffd91b2350ab6740c69017f3ab6382cd3009802c3ba3a3d
SHA512dd6c58b154204937f1072f2289799ff622ad1203b3d4bf8df58efa5d7eea9d618d3ff0b82d3574cf88f73822daa197d26b7fd1855472a5940ad72b9eaf53a715
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_1868_YGFOLLPSWMAOJLPQMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e