Analysis
-
max time kernel
66s -
max time network
65s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2023 07:00
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133245468677266788" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 1368 chrome.exe 1368 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe Token: SeShutdownPrivilege 1368 chrome.exe Token: SeCreatePagefilePrivilege 1368 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe 1368 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1368 wrote to memory of 2204 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2204 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 2164 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 1872 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 1872 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 4260 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 4260 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 4260 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 4260 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 4260 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 4260 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 4260 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 4260 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 4260 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 4260 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 4260 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 4260 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 4260 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 4260 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 4260 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 4260 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 4260 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 4260 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 4260 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 4260 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 4260 1368 chrome.exe chrome.exe PID 1368 wrote to memory of 4260 1368 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://danli.veroo.ru1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x108,0x10c,0xdc,0xd8,0xe0,0x7ffbd3f59758,0x7ffbd3f59768,0x7ffbd3f597782⤵PID:2204
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1816,i,6115328845679887577,848478646601639594,131072 /prefetch:22⤵PID:2164
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1816,i,6115328845679887577,848478646601639594,131072 /prefetch:82⤵PID:1872
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1816,i,6115328845679887577,848478646601639594,131072 /prefetch:82⤵PID:4260
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2968 --field-trial-handle=1816,i,6115328845679887577,848478646601639594,131072 /prefetch:12⤵PID:3704
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1816,i,6115328845679887577,848478646601639594,131072 /prefetch:12⤵PID:4968
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4488 --field-trial-handle=1816,i,6115328845679887577,848478646601639594,131072 /prefetch:12⤵PID:876
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 --field-trial-handle=1816,i,6115328845679887577,848478646601639594,131072 /prefetch:82⤵PID:4876
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 --field-trial-handle=1816,i,6115328845679887577,848478646601639594,131072 /prefetch:82⤵PID:4168
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2256
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\03043bc4-e4e8-4347-aaa7-f5382385c27a.tmp
Filesize5KB
MD5c1e1449ada96b6f4cb5ebc90ef5abf52
SHA1f8c3f6dcd0798176bb655e4726778bfcbad0ae02
SHA256562d6d20a9489ea1b759cd61d8bbde69307a09ff9741b19b540373336f095671
SHA512540458c88ae3dfe16aa18a1a8ea7a1e2263e75eb563f0c8e88e8e4ad463a135a4f7a1862ea9ee12a093060cbdbc86ad7c4dc38f015fd1148c9cfe4b59830fba9
-
Filesize
216B
MD50098fdd05d5fcec254ef7c78b9a79bec
SHA1b76ad9b93c9aee6075b5354618dd257d5dcd065e
SHA25611199e66bf01ade6199c9d8d7273cf47618f70dbb8b898292ea35f94eaa66705
SHA51291df06b1f5df173c2085ec26ef79437ef0e2841bef074f4004d20d087e7b97b9ef9d8a0c8ffa9f5895efd75f9631dc63c19aa00173f81e79053f8e6c08945bc3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\62c74193-4b52-434c-895c-58ebd8e24444.tmp
Filesize538B
MD536f6190ea6c72dba48dcc69d95cb9e39
SHA139a499713aca7f733351c8d5ac67f5f07032de4f
SHA25688781428748c6f08ea86f3519003ccef0d7e9e7024a21cdbfd4daa18d1a725fe
SHA51230509fcc4726639bbd37aeb393c4052169ea66e23c4922121688c627f5d5a2b923f2a9235c5fd71582f573ca17db07778f53301bba94b0c8db5975fc58cab7d3
-
Filesize
5KB
MD5fa2f8e3210d81d038da9d66212796c9c
SHA16ebbe295438e1e0d707fac3b60fc91e827490a84
SHA25605c80438087d546116a967724324f8be425e1f2a55eb22e0075c90951ceca410
SHA512f97b598f360a5b8a852be30efdd4a363781eb55aaa5de0e0213e67b7f28646df4c4c971e441765695ee9353425e07148b6d34c7923a48fb203a1f5f5247ea8be
-
Filesize
6KB
MD516c48d13c02a22f4ebbac37e1fe2c591
SHA12127b5b504335da49ca83b84b3d40626d138baba
SHA25691099b3cec962d7de2965d036d9531abab178487072b787d8a2286b7ab1b7ddc
SHA5128b2d1d4a905fa8c7adef18160a52580e2c6c255dd740cea2694180d765e5488d76f2e5e48fd49849561f0fb571d8aea30dddec5ef306daac44005a4749eca9ca
-
Filesize
5KB
MD567b31d23b9cce4a2c4ee7bd6e53fa9b8
SHA12af1ff503d5c33d6d554cb1d68c667ad826b88ac
SHA256f2b09f3a1fdde84ba84682a5cb5c25476e9d0898b05b00f0687a1f4080471d06
SHA512dc7deaf82eb042cbe226ef1be542a3513c6985a05638acb93fd11bb4d517680967627be5628f9604f2a87d83acf42e04f86723444454a1398cc75b66cfb0e9e8
-
Filesize
144KB
MD5dde43bf8fbfc890658535f5c0c60978d
SHA16bb4ca893f0eced6c357168cc85828c03a6ff0ae
SHA25637e0e40d2fddd9e66edfb092d7d2a32e25ff797759e3e0eda4dc35eb52dd3be3
SHA512f7d68f3b3d728a737d69824e3b1733c24315dcb205c4c3ffa3950e00caa8a814eb046214191983215e837640a989774cf88d532d87aefb8e5ff3fa1a550fe31e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e