Analysis
-
max time kernel
600s -
max time network
504s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 16:09
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133244141986816205" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 2056 chrome.exe 2056 chrome.exe 2240 chrome.exe 2240 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe Token: SeShutdownPrivilege 2056 chrome.exe Token: SeCreatePagefilePrivilege 2056 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe 2056 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2056 wrote to memory of 2124 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 2124 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4032 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4700 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4700 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4072 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4072 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4072 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4072 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4072 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4072 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4072 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4072 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4072 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4072 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4072 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4072 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4072 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4072 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4072 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4072 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4072 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4072 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4072 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4072 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4072 2056 chrome.exe chrome.exe PID 2056 wrote to memory of 4072 2056 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://vscode-update.azurewebsites.net/api/update/win32-x64/stable/6a6e02cef0f2122ee1469765b704faf5d0e0d8591⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd840c9758,0x7ffd840c9768,0x7ffd840c97782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 --field-trial-handle=1836,i,15334327675616304811,7249328288452122348,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1836,i,15334327675616304811,7249328288452122348,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2164 --field-trial-handle=1836,i,15334327675616304811,7249328288452122348,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3120 --field-trial-handle=1836,i,15334327675616304811,7249328288452122348,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3124 --field-trial-handle=1836,i,15334327675616304811,7249328288452122348,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4760 --field-trial-handle=1836,i,15334327675616304811,7249328288452122348,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 --field-trial-handle=1836,i,15334327675616304811,7249328288452122348,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=1836,i,15334327675616304811,7249328288452122348,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4944 --field-trial-handle=1836,i,15334327675616304811,7249328288452122348,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 --field-trial-handle=1836,i,15334327675616304811,7249328288452122348,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
72B
MD5be2dc264ed33f4460028dd711416aabb
SHA141c76ecaab53ff6d7d52b73a321f43ca968b0dd0
SHA2568978903d6776dc8920408f2de40738930f6a7341c0869894bba8b04dc5171e08
SHA51245e1e8e61f3842b3b4af45bc55a932d3f8f3c533fd8993ea46dcbde4a159bb087919b3305d1a2fefcd19216b493a11ca3e638593e594503f5133ca83e1ff72d0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
964B
MD5ce9bc677eb90d9db8cd54000832cace7
SHA129de288c5958c9addb69086649f5765caaf4405c
SHA25686d2818efa9f58cdfaf4bd77c4a46e1df42c32b43247f5cd4d2c3e518d4e3bd8
SHA512355856f82a3ef907b820810b0096717ed8cf0b1a0460dbfe63915f847ee50b65afa88147a9f8109bb745640242a760e19bf92d2fd16163b7ba617773292f7ecd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD59b3f6abad32b22889da13a35e1bbdfdd
SHA18fbafaa598f0144e722c8eea242c3d8c2e1ed720
SHA256b33e38924e180916488921b7dc572bb3ed37d5904b09d78ea76daaf0ebf2688f
SHA512ed071c353909ef22d74481a182004b49fae69b25b4ba8071d20c8fe8086bef23f5328ca3926ea3c717e36a10b225db572c020a722ccf388dc17563a5a4de2265
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5465ddceec3a1c24342418ca94a0a6e91
SHA195119783325ff1d73a9f31ec790901556f18cd17
SHA256b8a30b55d09d0e146817b960d89e27831e92cbbd96730a16913076da88ff517b
SHA5129da3a917e1751fa43a790f0b1beaba199a80a0d288f4ebc62028d5a41f1408ed9b6b8ff96e326b4730fc4b76e1526575ee99f76f41cba85343534a0d329fdd46
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5c4e2d89782131b3ae93df0d265cacecd
SHA1d359544521f80da0c7db45f585a87d3be0872f6b
SHA256295aea7c3f2d56ea2844637169608af99f375abac849ee2b13024d2f50f5b41f
SHA51275a377802bf3f1bedb7749b5d2dce6ac716da8e0beba90f8df5cb8e63abc23f880328266c048c92b497414e7ce8ae96b1fe5721d69eb8a30324a2be25c472bea
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
15KB
MD58eaba128f0f29e3483d0ddf45587174b
SHA1a77718bf2bb635e1b5e7c1a9681a38cda8ff1203
SHA256baa43da2814a92284647ac49e1a06e313ed7b0a5e2384533c217689f1c82f6a0
SHA512b2df1da741423cc79d698be34f1964880a1ea08a825fc978ce288bb408e0878354156ccad78cda254324419125e8f75c42ebc1488881bd6a160a45682b1e5dcf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
144KB
MD5d5996e927cef2ef2fb7f7a11e0479d6e
SHA126e0649e1bba76ca25a1f87dd9cfdfceb7b0763d
SHA256649089d0fefa81bd3bb26651313e1fb36cfb86867373d67619746e3199d8a974
SHA5129b4472f7b4aa9f5491108ab6d8ae37f25aed99822100e0f2d84469badc69de65150dccb0303ea733020c976130dbb9008d99c247a5e83ae0add7b6f664392551
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_2056_BGMEYUEAIEJHAXNNMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e