Analysis
-
max time kernel
48s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
28/03/2023, 14:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://youtu.be/M1-IVBkZr7w
Resource
win7-20230220-en
General
-
Target
https://youtu.be/M1-IVBkZr7w
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1408 chrome.exe 1408 chrome.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe Token: SeShutdownPrivilege 1408 chrome.exe -
Suspicious use of FindShellTrayWindow 50 IoCs
pid Process 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe 1408 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1408 wrote to memory of 860 1408 chrome.exe 27 PID 1408 wrote to memory of 860 1408 chrome.exe 27 PID 1408 wrote to memory of 860 1408 chrome.exe 27 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 276 1408 chrome.exe 29 PID 1408 wrote to memory of 1016 1408 chrome.exe 30 PID 1408 wrote to memory of 1016 1408 chrome.exe 30 PID 1408 wrote to memory of 1016 1408 chrome.exe 30 PID 1408 wrote to memory of 1468 1408 chrome.exe 31 PID 1408 wrote to memory of 1468 1408 chrome.exe 31 PID 1408 wrote to memory of 1468 1408 chrome.exe 31 PID 1408 wrote to memory of 1468 1408 chrome.exe 31 PID 1408 wrote to memory of 1468 1408 chrome.exe 31 PID 1408 wrote to memory of 1468 1408 chrome.exe 31 PID 1408 wrote to memory of 1468 1408 chrome.exe 31 PID 1408 wrote to memory of 1468 1408 chrome.exe 31 PID 1408 wrote to memory of 1468 1408 chrome.exe 31 PID 1408 wrote to memory of 1468 1408 chrome.exe 31 PID 1408 wrote to memory of 1468 1408 chrome.exe 31 PID 1408 wrote to memory of 1468 1408 chrome.exe 31 PID 1408 wrote to memory of 1468 1408 chrome.exe 31 PID 1408 wrote to memory of 1468 1408 chrome.exe 31 PID 1408 wrote to memory of 1468 1408 chrome.exe 31 PID 1408 wrote to memory of 1468 1408 chrome.exe 31 PID 1408 wrote to memory of 1468 1408 chrome.exe 31 PID 1408 wrote to memory of 1468 1408 chrome.exe 31 PID 1408 wrote to memory of 1468 1408 chrome.exe 31
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://youtu.be/M1-IVBkZr7w1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefba19758,0x7fefba19768,0x7fefba197782⤵PID:860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1188 --field-trial-handle=1260,i,18187675291840638467,14643517752462426520,131072 /prefetch:22⤵PID:276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1260,i,18187675291840638467,14643517752462426520,131072 /prefetch:82⤵PID:1016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1556 --field-trial-handle=1260,i,18187675291840638467,14643517752462426520,131072 /prefetch:82⤵PID:1468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2196 --field-trial-handle=1260,i,18187675291840638467,14643517752462426520,131072 /prefetch:12⤵PID:336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2232 --field-trial-handle=1260,i,18187675291840638467,14643517752462426520,131072 /prefetch:12⤵PID:316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2984 --field-trial-handle=1260,i,18187675291840638467,14643517752462426520,131072 /prefetch:12⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1412 --field-trial-handle=1260,i,18187675291840638467,14643517752462426520,131072 /prefetch:22⤵PID:1496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3520 --field-trial-handle=1260,i,18187675291840638467,14643517752462426520,131072 /prefetch:12⤵PID:2240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3876 --field-trial-handle=1260,i,18187675291840638467,14643517752462426520,131072 /prefetch:82⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1852
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\2cbe6355-d490-4339-a9e4-a10806c2ae9a.tmp
Filesize5KB
MD5d7e38ef77724b698cda75e08518ff486
SHA186196016fd9646df68ab646917f26433f91d8289
SHA2565af2b452e60b3b157f635959b84d0dc8f0144f483a6fb980055e8e5f31aecd60
SHA5128651588d5b9ad56803b7372cbf808f1b7c4a9a8e869444f7edcb11506ca2dbf46f8f19f1de3cdcaaa30c5a50b800a37502c20e32f620299c66eab890f7689d28
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENT~RF6caa06.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
854B
MD58fb6c7009ca790740ec65f618d01322f
SHA1a2428d5fcb94d4591db2146fcc32e9778209a0ef
SHA256f395e0ba075a7e33ff7e3bb1179a8692b2b621fa9a5c3d5d64da3758ac02af4e
SHA512dc176175dfa764f41ebb983eda88ac2cc50dfd3859cd7e03905e65397f162be6030af1ec586a2c74b01fd4a0c662c56ed9873c4dbff578b5729a63d949fbd60d
-
Filesize
527B
MD5cdd5fb3b7b1c77ca55477224b61bb8e2
SHA1bac7af0b9ac8c9d80fd9c49bba2f60b7858b5838
SHA256cebec806cd9926c6ab2c32a22211973ad275cd21badb0248653d761edf9a2dce
SHA5124f949b63b83224d999ba53d0ec523603244dab8ea5cd48b45295536a3ba5f96ddcb000627576d776aba1f97d12d432a8488568ad19dd56b45d7f3ad9a3046f42
-
Filesize
4KB
MD547dcf5e2510615a0acbeadf65c23fce7
SHA14570f9325d3f1be8c090958da5ca90ba3b555341
SHA25666ebce5d952b9120e46cc6ae745e9141a6cd418808c52b075200c15e9f6619a0
SHA51224f35907a36e770ecef36e3023de6c194f2a372be232a3c6c5f5e2761b6a30515b677e57e5d9f61795af85432150cf820630286addfdf15307f9cdeaca78d200
-
Filesize
4KB
MD51c76982b94b3aad57171cb42dae81128
SHA19df77f5aa05916573d4b4f80e17a788303c043ef
SHA25666153afa70e4c4c2cde5782f7eb9d0285a1067467fd9435fc1af5a7ca6d81129
SHA512acb54baae3c9105acf792f3a7415b9cbebfb95d5610e8169bd6e39aec52bce41a8515c250a19caf2cb8c516e5dfcc292805b1c3358eef7fbddf4fa54e4114a0c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize129B
MD5a744740987f19c907bae9daa9cbbc32b
SHA189a5ddd57adb4f01bdfcece6d4df2a6e751a228e
SHA256303a7fc89bdc12c0a199598ad472d9ec9e2c48ca9293e05d9e16a63d3b489bec
SHA5122382e459c859ebca40169588cab29a0253cd0e52b64bbdc1f8baddcb5e9f758b3c7891f8eaf0d2ca9ed3fb070d80305bb767716cabbda00ed4f021c234f1a702
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000004.dbtmp
Filesize16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
144KB
MD59b11fe638642f499da6c5c3f73b0d332
SHA1994378ac7eb3a55b7f8c1f8cb044f137c048c741
SHA256f5cf2779d4ed21c81e5f0c71e211659f28ced08bdf12e72a32ca7468cbfd33e6
SHA512f743f17f8a3afef7572d61b367b28bed58b5dd67c46677979a1f3f33fe9f8230467a1d1862f1c4a7a5fe97a0c527a2280c967897601be2d0db318b9f8f068868