Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2023 01:32
Static task
static1
General
-
Target
-
Size
750B
-
MD5
d979482926874a94fb7d2f4e647d645f
-
SHA1
0a9981e1169750cfc2e000b3b3129f57da5a73fc
-
SHA256
dc77198075064143885f93b2338052c47395d2d5696f1c63bc36359a3f8ee544
-
SHA512
5437d6f1032011feaa7f9d0deb9becff8bb0148e7cd3eed21d126fb096cd7c3d822653c7212ee42a152ae5753f1856376de914dcb7e4ceb4cfbee0f6dbadc33f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133245344169900276" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 2680 chrome.exe 2680 chrome.exe 3204 chrome.exe 3204 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 2680 chrome.exe 2680 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2680 wrote to memory of 712 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 712 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1812 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 652 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 652 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1256 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1256 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1256 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1256 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1256 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1256 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1256 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1256 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1256 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1256 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1256 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1256 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1256 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1256 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1256 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1256 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1256 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1256 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1256 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1256 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1256 2680 chrome.exe chrome.exe PID 2680 wrote to memory of 1256 2680 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffacf3c9758,0x7ffacf3c9768,0x7ffacf3c97782⤵PID:712
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1856,i,6827461844794441501,16455742386888489125,131072 /prefetch:22⤵PID:1812
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=1856,i,6827461844794441501,16455742386888489125,131072 /prefetch:82⤵PID:652
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1856,i,6827461844794441501,16455742386888489125,131072 /prefetch:82⤵PID:1256
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3180 --field-trial-handle=1856,i,6827461844794441501,16455742386888489125,131072 /prefetch:12⤵PID:3660
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3200 --field-trial-handle=1856,i,6827461844794441501,16455742386888489125,131072 /prefetch:12⤵PID:224
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 --field-trial-handle=1856,i,6827461844794441501,16455742386888489125,131072 /prefetch:82⤵PID:1184
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4920 --field-trial-handle=1856,i,6827461844794441501,16455742386888489125,131072 /prefetch:82⤵PID:1456
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4792 --field-trial-handle=1856,i,6827461844794441501,16455742386888489125,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3204
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4504
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\053f11c6-6f08-438f-a303-2b49923bd311.tmp
Filesize4KB
MD54645085ed48a9bf92a1099a39ab5c280
SHA1cad63ae3313558f2bbb73fe4a5b3990e6eb2ab76
SHA25694ad1192622fc6993d11a379ad99907cb5d69a5fa808abb998a76be6898d7ab1
SHA512bb24344fde6cae444ac34fe01d66a0faf201864233f68e80f5dea5a83dc4073e840e6fe114f782c821ffac0e445003c64c21a8dcb268c2be195f9cdc0c64a080
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\434c599f-f5d9-48bf-af5d-2b07001a2673.tmp
Filesize4KB
MD5f3d566ae7966b2e8da722ff9b18c1144
SHA13b72377c0b4fd776e8c0419024361c494dc525e1
SHA256f78cf6a9536f1c8d0314197392e9851b6c6b9aecabff74b9408a6dadcf121cff
SHA512552318564171980b871401ce778f3eb31e0b8584a76dc836af4c303163828aa8419bfc5e2e80701da2ae57a68fc4d5a0b891964c85fc3133e55220cc33a7e1f4
-
Filesize
1KB
MD55694986d22c9bc136ab45af793bb0eb5
SHA1e973e79d7fd482a1ad96f148788b402bb2b76e7f
SHA2567e89ce0a9b2dc0b19869b69d7a03742607cd6b0a2b090f64ab7f6827da5c42d0
SHA512d9e4b5fab4f98af7fc8478a4a6c05ecc9e4d9d95f2e008e9330e39c4911474196b3006e7f2a73cb723c78916a92f74501a93d1971235ee39ec81f614fe5f0354
-
Filesize
538B
MD550120a473f2443d9559fa14a5c892f70
SHA1285f1f352af896bfe450895e99412d5a065f916e
SHA256cfdc4d4d32cdedeee3317762fe96a0772c7115ecdcb9233676b49ac14cebaad5
SHA512fd887b6cfe2daf1413075750aafdb889160e9e4dbacdab147085c63fb62fda0d78d3d3d16abc1ad21185c9da9215ccb5f294fd17fd413ea300d07dd2432e28f0
-
Filesize
4KB
MD57e59ed8aa55dfd188b610035ca948aea
SHA14932fe7cdb755eb7e84b62bda75691e9198ae3a1
SHA256a2164b0972db5c6b425645e841fa46c341f12179f67f0e9f0ae6731c5f2cec70
SHA512755ef83d73b7f9992e548fc7df3a158cc738dc4a629c46244fe0899718c9924a6d23936b287b63463c23667f98abae88328f1a165a360b26734d543a0b9bcb8b
-
Filesize
144KB
MD5d9214c275e88d0a13bf9b4d16695a56d
SHA13deab63321cfde0d0cf9028cfba74fae3b2bc6b0
SHA256b16bed14985fe8a206c1cd7b02b1b08e0158768cc42e230627a793f735fcc93c
SHA512b915c5b34828afd53d3db0654f3c94482a8c86469b795c3e4901dabf7085bad8fa77382023ff7901cb136ebb9a5924140805229ea7823323098864dbc1dba0c3
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e