Analysis
-
max time kernel
104s -
max time network
98s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
19-04-2023 12:28
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133263881508028560" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1012 chrome.exe 1012 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe Token: SeShutdownPrivilege 1012 chrome.exe Token: SeCreatePagefilePrivilege 1012 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe 1012 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1012 wrote to memory of 508 1012 chrome.exe 66 PID 1012 wrote to memory of 508 1012 chrome.exe 66 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 4772 1012 chrome.exe 68 PID 1012 wrote to memory of 1996 1012 chrome.exe 69 PID 1012 wrote to memory of 1996 1012 chrome.exe 69 PID 1012 wrote to memory of 1540 1012 chrome.exe 70 PID 1012 wrote to memory of 1540 1012 chrome.exe 70 PID 1012 wrote to memory of 1540 1012 chrome.exe 70 PID 1012 wrote to memory of 1540 1012 chrome.exe 70 PID 1012 wrote to memory of 1540 1012 chrome.exe 70 PID 1012 wrote to memory of 1540 1012 chrome.exe 70 PID 1012 wrote to memory of 1540 1012 chrome.exe 70 PID 1012 wrote to memory of 1540 1012 chrome.exe 70 PID 1012 wrote to memory of 1540 1012 chrome.exe 70 PID 1012 wrote to memory of 1540 1012 chrome.exe 70 PID 1012 wrote to memory of 1540 1012 chrome.exe 70 PID 1012 wrote to memory of 1540 1012 chrome.exe 70 PID 1012 wrote to memory of 1540 1012 chrome.exe 70 PID 1012 wrote to memory of 1540 1012 chrome.exe 70 PID 1012 wrote to memory of 1540 1012 chrome.exe 70 PID 1012 wrote to memory of 1540 1012 chrome.exe 70 PID 1012 wrote to memory of 1540 1012 chrome.exe 70 PID 1012 wrote to memory of 1540 1012 chrome.exe 70 PID 1012 wrote to memory of 1540 1012 chrome.exe 70 PID 1012 wrote to memory of 1540 1012 chrome.exe 70 PID 1012 wrote to memory of 1540 1012 chrome.exe 70 PID 1012 wrote to memory of 1540 1012 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://kqyb51aqfe6426181862608.vbde.ru1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb0d5c9758,0x7ffb0d5c9768,0x7ffb0d5c97782⤵PID:508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1764,i,3724574302174064711,11832167724565688183,131072 /prefetch:22⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1980 --field-trial-handle=1764,i,3724574302174064711,11832167724565688183,131072 /prefetch:82⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1976 --field-trial-handle=1764,i,3724574302174064711,11832167724565688183,131072 /prefetch:82⤵PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2740 --field-trial-handle=1764,i,3724574302174064711,11832167724565688183,131072 /prefetch:12⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2760 --field-trial-handle=1764,i,3724574302174064711,11832167724565688183,131072 /prefetch:12⤵PID:4192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4492 --field-trial-handle=1764,i,3724574302174064711,11832167724565688183,131072 /prefetch:12⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 --field-trial-handle=1764,i,3724574302174064711,11832167724565688183,131072 /prefetch:82⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 --field-trial-handle=1764,i,3724574302174064711,11832167724565688183,131072 /prefetch:82⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4744
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD535a4d2f5846904104517ab06c0a88906
SHA1cd6600a7cafa8153825a0c42cc7471898f3b8cf9
SHA256e82abcb0b4602afe53a7a3edd8c4e640e3a9e1d77a7b335e513d9a2c3ae977ea
SHA512bbd432341d650034cc6bfcd58eee5e7d9bffb7d5b8b67ed65115d877add5b0aa217687dd48e6c3fc70b0e686375d3d62503a412306a756e514b7d26987c01afe
-
Filesize
1KB
MD5f276285719e3d8bd1d2b46711cc9356e
SHA18e213c3bd57ec5e7006f25354c2aacc6cb374b7b
SHA2562117b8678b9dcc82ce30ffdd3a97ddf8f960f00d05cd5670666f6bda02d4d283
SHA5129c5d40ad0ef835cef4f94f135ff39512c6f63bb066b92045a8ccd76b2c2f20a26f05d8d3296b0004396f3e7efa68ecbb6750bca51c7da09dafdac275d1692caa
-
Filesize
5KB
MD5836c73cbe17f050f3b01199a5ab2c83e
SHA1818938556c365f63f070495e9961cffb751c33d9
SHA2566676a71c0cd0d43aa24bf132e18b5674ccf82dd33a8a0cb74fa913b09938edd9
SHA512cebd190b6caa5a7d2ad4609397032a3b8efc286966dbc1e2ab185cc56d195a3063cd5b3a1b65bbce07a9902612a5313876327d6b16962c9ed751821e8a3efe6b
-
Filesize
5KB
MD5f5974a119ea4dcaaf573082a62f697f1
SHA13c9e2591fd73327c7baf845e72d52291c7e866d0
SHA256933d4e11d8b53a5f71c807f4fda58c11f1691a9dd0ba2038b316d2c12be072c4
SHA512549fa24eb11c41c6e30c6a554afe5f0b16f7565192f9d098ecbd273dc926da84ac45aee3713d9bfcd76b7df39550c2f8c8994660de901d8144d281b163b5ac8e
-
Filesize
6KB
MD52610e77c1d754fa5ccef8386e737877a
SHA1777044e86b374e4608913ba677b6e2bc43578b9d
SHA256f5939948877d28c4ff04068263e9b2a61fabbbd89da08e5153c507496f6fed68
SHA51240f4e63cad5ee17fe6b9c369e491d1fb7af287f5c2d60dd0c5af38a7f1e6b8b4c003a3743c7ca9af1076569292a6618e7f6552962a501bf0ba04c8365d09f220
-
Filesize
200KB
MD5b4136fec4edfea429cfadebe64c57018
SHA150955f3b5da758d47978eb7f64f2d4f0053940cf
SHA2564da4a0bb2cf0495bfa3c4c28ec4c6e701f3a5c0d59ce428ac7643585002f0712
SHA51260df921415ab733a38b32e6e785dba5e70594c1029055393b8cfc22b765fff517bcc4c939d6b10aa6898f818983c4b761ae717a5b163166dfa341b96c9148cd0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd