Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2023, 07:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bit.ly/3Llb9cF
Resource
win10v2004-20230220-en
General
-
Target
https://bit.ly/3Llb9cF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133275730898522904" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3048 chrome.exe 3048 chrome.exe 3652 chrome.exe 3652 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe Token: SeShutdownPrivilege 3048 chrome.exe Token: SeCreatePagefilePrivilege 3048 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe 3048 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3048 wrote to memory of 3936 3048 chrome.exe 86 PID 3048 wrote to memory of 3936 3048 chrome.exe 86 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3924 3048 chrome.exe 87 PID 3048 wrote to memory of 3436 3048 chrome.exe 88 PID 3048 wrote to memory of 3436 3048 chrome.exe 88 PID 3048 wrote to memory of 3088 3048 chrome.exe 89 PID 3048 wrote to memory of 3088 3048 chrome.exe 89 PID 3048 wrote to memory of 3088 3048 chrome.exe 89 PID 3048 wrote to memory of 3088 3048 chrome.exe 89 PID 3048 wrote to memory of 3088 3048 chrome.exe 89 PID 3048 wrote to memory of 3088 3048 chrome.exe 89 PID 3048 wrote to memory of 3088 3048 chrome.exe 89 PID 3048 wrote to memory of 3088 3048 chrome.exe 89 PID 3048 wrote to memory of 3088 3048 chrome.exe 89 PID 3048 wrote to memory of 3088 3048 chrome.exe 89 PID 3048 wrote to memory of 3088 3048 chrome.exe 89 PID 3048 wrote to memory of 3088 3048 chrome.exe 89 PID 3048 wrote to memory of 3088 3048 chrome.exe 89 PID 3048 wrote to memory of 3088 3048 chrome.exe 89 PID 3048 wrote to memory of 3088 3048 chrome.exe 89 PID 3048 wrote to memory of 3088 3048 chrome.exe 89 PID 3048 wrote to memory of 3088 3048 chrome.exe 89 PID 3048 wrote to memory of 3088 3048 chrome.exe 89 PID 3048 wrote to memory of 3088 3048 chrome.exe 89 PID 3048 wrote to memory of 3088 3048 chrome.exe 89 PID 3048 wrote to memory of 3088 3048 chrome.exe 89 PID 3048 wrote to memory of 3088 3048 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://bit.ly/3Llb9cF1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ffc4f719758,0x7ffc4f719768,0x7ffc4f7197782⤵PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1812,i,7826343526835260069,11128427823656117309,131072 /prefetch:22⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1812,i,7826343526835260069,11128427823656117309,131072 /prefetch:82⤵PID:3436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,7826343526835260069,11128427823656117309,131072 /prefetch:82⤵PID:3088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3184 --field-trial-handle=1812,i,7826343526835260069,11128427823656117309,131072 /prefetch:12⤵PID:3740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3192 --field-trial-handle=1812,i,7826343526835260069,11128427823656117309,131072 /prefetch:12⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4584 --field-trial-handle=1812,i,7826343526835260069,11128427823656117309,131072 /prefetch:12⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4488 --field-trial-handle=1812,i,7826343526835260069,11128427823656117309,131072 /prefetch:12⤵PID:4164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 --field-trial-handle=1812,i,7826343526835260069,11128427823656117309,131072 /prefetch:82⤵PID:4192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4636 --field-trial-handle=1812,i,7826343526835260069,11128427823656117309,131072 /prefetch:82⤵PID:4684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5168 --field-trial-handle=1812,i,7826343526835260069,11128427823656117309,131072 /prefetch:12⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5228 --field-trial-handle=1812,i,7826343526835260069,11128427823656117309,131072 /prefetch:12⤵PID:4428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2488 --field-trial-handle=1812,i,7826343526835260069,11128427823656117309,131072 /prefetch:12⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2840 --field-trial-handle=1812,i,7826343526835260069,11128427823656117309,131072 /prefetch:12⤵PID:1396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4632 --field-trial-handle=1812,i,7826343526835260069,11128427823656117309,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3652
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1464
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
883B
MD576d2fe0c2637316b0748c8694e46d77d
SHA12b6ddf6e81ebc3c329a3f3eb80656368fd55b565
SHA25603a319b83fff8ec39661bbacaf614fa5587c37f633a8c7911e5b31a6083f9af7
SHA512f81408fa74c75541ac43167b0b2577c1877ad284c5cb8077b64ef423eaa9bcd9fe1e271874b0061fbab7ba63a2e054c22851b5d200edb29cccc88d4c2c672443
-
Filesize
538B
MD556dd55db4d4c14619086d7d471e53770
SHA1b354e96bac6af996f3603e8499f16b2a037649bb
SHA256d0722da8472d4f3d42044864dc739b54c1147eef00383344f0839b04a38a1c2d
SHA51228843ceb0590fde4acfd823987ead30d848b164f86e95f85c013a91b08a963473e25917fb4e799c85c1acad613f39892fbcd310cc64d0f9150d7fa12e4ee9f3e
-
Filesize
6KB
MD5e23c1e8d4ef9695695a061b17afbfec1
SHA1b88b977e889888b391c55e3f817ef6c8631e3eca
SHA2565836e20b75403676878dc8389aff9e4efa84183d5b2de44f1fdb18bab071f28c
SHA512ced6af7cc864a383a737a28b628f7e7295acd2a7a44865485ba9ee9d5c1a78c7e0a5df7cc2ddc0933028c489f8e8829612c760a2220787c93696e1ca747489e8
-
Filesize
6KB
MD56f99fc305de149b242f5d9b8a7605a0c
SHA1be2ca7b477707696116bccdb717e6675302a6fbf
SHA25638628cb464a25ecb3afaa41f573c82ccf0a1a93533a0563a4f140df297b7f8e5
SHA5128d63af69e607dab55ebd778e56d69985a7f48945bebcd73e0178f04219e22c30a49bf31fd70c52b61a53854c65d7028da1a07b751633ca206162970d43ff0f73
-
Filesize
6KB
MD5bbe5399b0bfdaff5c653ee8729415dfa
SHA1f9b7d9875493d474cd3dbf54153fad49ea3ef287
SHA25618a8c327247e1eab432a9d48f14dc9a508be1231021d89059115187112f8d178
SHA5129000e63e82ecb6dd83f74d5dfa8cadd8910b967f423e2cdad03ab84b895827756cbd728aaed3265aaaecb440ef467cf89064bfcec10e1f7df7d26458de6bdf09
-
Filesize
147KB
MD5356afebdd4eb522d3b3eede5b8adb21e
SHA10cc865cf92ff798bba534a0ac62e2c718f582036
SHA2562edd3db680cfb2de38526820b75b2323a731bd47b0463b8226d9abc8e37aeef9
SHA512cb70d93cdcdc6ea039f9541d06169c8963a6abee8b02efc0a85402b1950fad04897f2279144d1b87ea9a8778edfbf40dc99e879d07e383924cfa9c82521e1943
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd