Analysis
-
max time kernel
300s -
max time network
278s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2023, 13:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://bit.ly/3op5zga
Resource
win10v2004-20230221-en
General
-
Target
http://bit.ly/3op5zga
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133263069501310933" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3040 chrome.exe 3040 chrome.exe 4456 chrome.exe 4456 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe Token: SeShutdownPrivilege 3040 chrome.exe Token: SeCreatePagefilePrivilege 3040 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe 3040 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3040 wrote to memory of 540 3040 chrome.exe 83 PID 3040 wrote to memory of 540 3040 chrome.exe 83 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 1060 3040 chrome.exe 85 PID 3040 wrote to memory of 3060 3040 chrome.exe 86 PID 3040 wrote to memory of 3060 3040 chrome.exe 86 PID 3040 wrote to memory of 3568 3040 chrome.exe 87 PID 3040 wrote to memory of 3568 3040 chrome.exe 87 PID 3040 wrote to memory of 3568 3040 chrome.exe 87 PID 3040 wrote to memory of 3568 3040 chrome.exe 87 PID 3040 wrote to memory of 3568 3040 chrome.exe 87 PID 3040 wrote to memory of 3568 3040 chrome.exe 87 PID 3040 wrote to memory of 3568 3040 chrome.exe 87 PID 3040 wrote to memory of 3568 3040 chrome.exe 87 PID 3040 wrote to memory of 3568 3040 chrome.exe 87 PID 3040 wrote to memory of 3568 3040 chrome.exe 87 PID 3040 wrote to memory of 3568 3040 chrome.exe 87 PID 3040 wrote to memory of 3568 3040 chrome.exe 87 PID 3040 wrote to memory of 3568 3040 chrome.exe 87 PID 3040 wrote to memory of 3568 3040 chrome.exe 87 PID 3040 wrote to memory of 3568 3040 chrome.exe 87 PID 3040 wrote to memory of 3568 3040 chrome.exe 87 PID 3040 wrote to memory of 3568 3040 chrome.exe 87 PID 3040 wrote to memory of 3568 3040 chrome.exe 87 PID 3040 wrote to memory of 3568 3040 chrome.exe 87 PID 3040 wrote to memory of 3568 3040 chrome.exe 87 PID 3040 wrote to memory of 3568 3040 chrome.exe 87 PID 3040 wrote to memory of 3568 3040 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://bit.ly/3op5zga1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedaa59758,0x7ffedaa59768,0x7ffedaa597782⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 --field-trial-handle=1836,i,15756752707071064581,755324964510413543,131072 /prefetch:22⤵PID:1060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1836,i,15756752707071064581,755324964510413543,131072 /prefetch:82⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1836,i,15756752707071064581,755324964510413543,131072 /prefetch:82⤵PID:3568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3124 --field-trial-handle=1836,i,15756752707071064581,755324964510413543,131072 /prefetch:12⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3144 --field-trial-handle=1836,i,15756752707071064581,755324964510413543,131072 /prefetch:12⤵PID:956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4872 --field-trial-handle=1836,i,15756752707071064581,755324964510413543,131072 /prefetch:12⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5160 --field-trial-handle=1836,i,15756752707071064581,755324964510413543,131072 /prefetch:82⤵PID:464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 --field-trial-handle=1836,i,15756752707071064581,755324964510413543,131072 /prefetch:82⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 --field-trial-handle=1836,i,15756752707071064581,755324964510413543,131072 /prefetch:82⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4036 --field-trial-handle=1836,i,15756752707071064581,755324964510413543,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4692
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408B
MD5b6af3c38ed3818438b3bd3391a6a33bd
SHA19c55646ca81ae2f8634f19a97e7bbb934268a7cc
SHA256598ba172b5ae508a92b05388f3e8abb045e3cd0ae59978c41a3c326dc4ed6154
SHA51299ab9f041ca6b09dce120fd5b4054639e7006dcd8ca7eb9e11d974ba3dcce700fa03ade6273d98f3aca93d75f95f90a5f818304abd50c75aea46fc60c113ce8a
-
Filesize
1KB
MD539279ebbc291bbdcfa7906148c66c726
SHA17740358422a4b055da3fe0fa0cf51b5a6ff703c2
SHA256e2de1babe8dc5aa506d1323eaded1f4be036696adcb145ac8c101f573b5d4d81
SHA512e4989c829713a424dc3114641e4718acfedaa368e23431ea0359e65a7a0a59c9fb585353c31005b2326ee8c8219f54273f37aeadd82fa65e312fb9a9da9b3918
-
Filesize
1KB
MD5ae1a72f725529b15cdfb0a61d753ccbe
SHA1f37d8f65a415998c6d46cc34d0d58ae2183e721e
SHA256c518ef4c7d8ad9b914d1fb56f2c0eb6f5af33c4b3236bb1d70f77cb96edac4a7
SHA51270d8b2be61cbacef6ef3a8e8161bfe1c074f31c0a8e84c52a40c7cbbe4b685677d720c256135200f7d9233dd36df7648f4e56ec79050768210f4aeec35350725
-
Filesize
874B
MD526fdd94dba7779c53ba18c8c81d28c39
SHA1c76c861de1e4b5f9c36e545422f52c1a860685ba
SHA256b2aebcae149c0e1b299b62b5129deed0a54fcf93b740039752af3aa44078fecc
SHA512f798a7faff20059941bcc71f2f03cb0ab837578fe567cfdbfb5033bedbec5b3235f64817aa513d1d2b19113a4e4045cc7b2159f196f6152aee757f8823904fb7
-
Filesize
6KB
MD5d54c56d39f0c216a500303f9764fae37
SHA1c0f7c026ed9970fa9833ee91bd3a397eba120c14
SHA256c569ee01c53908acaf68253bb5e80895b4bc478d0572d0464d8056181d9f08cd
SHA51293a9e86d4ceb4009c92e9dbd76c2b24c710d0bb576a39f1ca8866be59e2311713fd6100d0612c5831845585705f37d53b381246e917ee3869ccb05bf964ac0cc
-
Filesize
15KB
MD5b9056521b07e9e4dbd581924837da23c
SHA1d2b0ff492c2fddb1a0eca4e1fd2a88dba63c9dc3
SHA2569247d74c3f4c506be93fd7f255eb94bb358137b0d499f301bf9fd81bbfa96795
SHA5120a6241001dadddfa0ce48a95ce474e96dec297b0be11105204bf0a2f03d695c25846c5ab5e011e9991a375e1fa279e0d585fd0ef6442d56d9b01025f022926b5
-
Filesize
199KB
MD5ab065d96c6ef9939a235866cb9943cb1
SHA17df9dd11e47345bebd45dd48f2d96c4a6c4908bb
SHA2564ec1037437a9d4c367ec6d866de1a1f4f61a6e472a73e13ff3870b6b8a34cf09
SHA5127aeb7cfbed358ea52f0fd037bb0a40902a0b6414d7122eee5ea3a658c59d1abb665aa6b57d693727dca82ad256394f6925d7b0ea2961bb44db068023861e042e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd