Analysis
-
max time kernel
300s -
max time network
278s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 21:21
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://g-ld.life/[email protected]
Resource
win10v2004-20230220-en
General
-
Target
https://g-ld.life/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133245193137135394" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 1616 chrome.exe 1616 chrome.exe 3912 chrome.exe 3912 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1616 wrote to memory of 2304 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 2304 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4656 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4804 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 4804 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 1160 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 1160 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 1160 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 1160 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 1160 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 1160 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 1160 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 1160 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 1160 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 1160 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 1160 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 1160 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 1160 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 1160 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 1160 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 1160 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 1160 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 1160 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 1160 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 1160 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 1160 1616 chrome.exe chrome.exe PID 1616 wrote to memory of 1160 1616 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://g-ld.life/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd49339758,0x7ffd49339768,0x7ffd493397782⤵PID:2304
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1820,i,3310982773410576306,2143237702766292298,131072 /prefetch:22⤵PID:4656
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1820,i,3310982773410576306,2143237702766292298,131072 /prefetch:82⤵PID:4804
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2176 --field-trial-handle=1820,i,3310982773410576306,2143237702766292298,131072 /prefetch:82⤵PID:1160
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3124 --field-trial-handle=1820,i,3310982773410576306,2143237702766292298,131072 /prefetch:12⤵PID:220
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3144 --field-trial-handle=1820,i,3310982773410576306,2143237702766292298,131072 /prefetch:12⤵PID:312
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4508 --field-trial-handle=1820,i,3310982773410576306,2143237702766292298,131072 /prefetch:12⤵PID:2088
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 --field-trial-handle=1820,i,3310982773410576306,2143237702766292298,131072 /prefetch:82⤵PID:4044
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5164 --field-trial-handle=1820,i,3310982773410576306,2143237702766292298,131072 /prefetch:82⤵PID:2656
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 --field-trial-handle=1820,i,3310982773410576306,2143237702766292298,131072 /prefetch:82⤵PID:3788
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 --field-trial-handle=1820,i,3310982773410576306,2143237702766292298,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3912
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2132
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\83996879-c71d-4681-b1bd-e075cf8371d5.tmp
Filesize15KB
MD51363a3471aecab78d493fc399dbd7e84
SHA1d19166065cb285e9ab650d55a1cd42c0d7c47de4
SHA2569a3df6cc655f52332a5fbbba2766589150a8311500c5ca5d3c624d53d5c5bc6f
SHA5127c6029fc8ee01655a042ed719aa3f8dab7e3788a871eb9283f12a5d8c25ec7039014751e12e7d2b34a14d312179a62a2bc11cc14a853f8680dadef68f8df3ce8
-
Filesize
96B
MD5ed03c30c9b71651133a47bffb43f6390
SHA135bad4bd7fc0c602d1cc3bf1c6deae6bb1e97c34
SHA256f5a9d39aba8371652b4955f18bfcb4871db0923dc44c6b655100d9c256ef58e3
SHA512e948a0df1bbab667abca51408b5543b0e0f0bab50e7449eead7903f55df19ef5381eb8861f0e21db582d117b844f9bf14b5a214cb2277f81db1c7649f67a79bd
-
Filesize
1KB
MD5603a5a95ede6e8352f430773b7c8e16b
SHA1157b73922b9473fc51c8aef1361a92bff0a4bc3d
SHA2561a71a66cabd7e8ae0330bc17cf8012f946eda033a07f865971987eed57f54999
SHA51218ac56fcaa3446e5b1d395de460877010584a064e61ff87263ef646a0f087260c729cfffd799fd5d970ea595e59375eb90c233afb585a246764c1a2b000bb9b6
-
Filesize
872B
MD5fcbaec93cca76d2967ec87a05793ce6e
SHA18ddec27606cd093a8ded8f5c477b0d8701e63bef
SHA25621ba4da4ce50d1443cd938efddba53dc556e64162efe06056bc8ae85f1d25528
SHA5124ee35a0cddb302c3561a1b9ca7e72626882c98343d9a265e1b9be20665232c79c1d8f64bbd1b6c0bbcf8c099bbf06702613431f46ee564af0dfdb34dc88a3368
-
Filesize
6KB
MD5021a5a98f5d2949b4d133c96b78a42f7
SHA19b64aad5fc482c72e73c2926d5c44e7e7965d102
SHA25647219d9ca801a9f1c3e1cf948df75b48c4ef5205a4f8b2903444d69bf46459f1
SHA5122ea224945970a70fb1ee9add97b4b1f1e7eca79caff54ad68e7cc9cb18092a9671c0fe4ea2fc51e4260f751e8976ea801c5eb78d5625d543b659791299655f0b
-
Filesize
144KB
MD5d5b2dc20b894f5eca8e5e217a17f9027
SHA1b2beb717d205252fa045c9e0dc147972e9e1a769
SHA256efc9dbbb126ccb77cb9f53afb3a439cb8ba7d6f8f0e67878e7bbb83055ce24e3
SHA51262cce82ad7ebe57cc4365be7e7587ca10d698c2fddeb88491f4289c241dcd1283c3adf30b6d672110da53815930195f8f2fa5eb3ed0cf28873808d642ed03017
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e