Analysis
-
max time kernel
30s -
max time network
26s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
17-05-2023 06:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://tinyurl.com/4fzsyn4r
Resource
win10-20230220-en
General
-
Target
https://tinyurl.com/4fzsyn4r
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133287855512172069" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3632 chrome.exe 3632 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe Token: SeShutdownPrivilege 3632 chrome.exe Token: SeCreatePagefilePrivilege 3632 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe 3632 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3632 wrote to memory of 1692 3632 chrome.exe 66 PID 3632 wrote to memory of 1692 3632 chrome.exe 66 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4788 3632 chrome.exe 69 PID 3632 wrote to memory of 4760 3632 chrome.exe 68 PID 3632 wrote to memory of 4760 3632 chrome.exe 68 PID 3632 wrote to memory of 4820 3632 chrome.exe 70 PID 3632 wrote to memory of 4820 3632 chrome.exe 70 PID 3632 wrote to memory of 4820 3632 chrome.exe 70 PID 3632 wrote to memory of 4820 3632 chrome.exe 70 PID 3632 wrote to memory of 4820 3632 chrome.exe 70 PID 3632 wrote to memory of 4820 3632 chrome.exe 70 PID 3632 wrote to memory of 4820 3632 chrome.exe 70 PID 3632 wrote to memory of 4820 3632 chrome.exe 70 PID 3632 wrote to memory of 4820 3632 chrome.exe 70 PID 3632 wrote to memory of 4820 3632 chrome.exe 70 PID 3632 wrote to memory of 4820 3632 chrome.exe 70 PID 3632 wrote to memory of 4820 3632 chrome.exe 70 PID 3632 wrote to memory of 4820 3632 chrome.exe 70 PID 3632 wrote to memory of 4820 3632 chrome.exe 70 PID 3632 wrote to memory of 4820 3632 chrome.exe 70 PID 3632 wrote to memory of 4820 3632 chrome.exe 70 PID 3632 wrote to memory of 4820 3632 chrome.exe 70 PID 3632 wrote to memory of 4820 3632 chrome.exe 70 PID 3632 wrote to memory of 4820 3632 chrome.exe 70 PID 3632 wrote to memory of 4820 3632 chrome.exe 70 PID 3632 wrote to memory of 4820 3632 chrome.exe 70 PID 3632 wrote to memory of 4820 3632 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://tinyurl.com/4fzsyn4r1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff8154e9758,0x7ff8154e9768,0x7ff8154e97782⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1968 --field-trial-handle=1760,i,8375681556226122416,4780543677020040699,131072 /prefetch:82⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1600 --field-trial-handle=1760,i,8375681556226122416,4780543677020040699,131072 /prefetch:22⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2116 --field-trial-handle=1760,i,8375681556226122416,4780543677020040699,131072 /prefetch:82⤵PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2888 --field-trial-handle=1760,i,8375681556226122416,4780543677020040699,131072 /prefetch:12⤵PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2900 --field-trial-handle=1760,i,8375681556226122416,4780543677020040699,131072 /prefetch:12⤵PID:2180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4320 --field-trial-handle=1760,i,8375681556226122416,4780543677020040699,131072 /prefetch:12⤵PID:4692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3652 --field-trial-handle=1760,i,8375681556226122416,4780543677020040699,131072 /prefetch:12⤵PID:4408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4536 --field-trial-handle=1760,i,8375681556226122416,4780543677020040699,131072 /prefetch:82⤵PID:3344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4604 --field-trial-handle=1760,i,8375681556226122416,4780543677020040699,131072 /prefetch:82⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2120 --field-trial-handle=1760,i,8375681556226122416,4780543677020040699,131072 /prefetch:12⤵PID:4228
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4576
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706B
MD52bc5d3e9014f303c9cfbd472cd6e0bd3
SHA1815e312a3c695070fe5065397ff7884d09533c1c
SHA25623fbb15e618ecdab928525280517f0b522c71f0d33126d2e6980c0819af8aa8a
SHA51236ebe548b4ef607a4d064dba481ab49630a6372c4112f40c00b6edae1915fdaf36414d6bd9b6dc20c0c2dbc3610e70d34efe686c15ccc2643d634030639e65f6
-
Filesize
5KB
MD5180d14b739d5919dc11b3b1a03c4b2e8
SHA1ec1808fbb42d26402418c8b2e1bc053561729526
SHA256c1f773c0aa02795432769853a4209c9ceeb9a23449c8bd3dfd602ed07ab147d3
SHA51279f3ce56479129c37afc06a63259f7bdb2209a760f3aba91d137d273928cec64c1d30aced0c97db8c72c7ae3e3b8426469a6ca7c4a2df729864817b929809151
-
Filesize
152KB
MD5e7e3b87270fe6c50f6eff4472f1a7b69
SHA15f9276dd40c5a1cdac29a176441f7c96c191be66
SHA256085c00996cf4a63eb037226c58a0606e2aefaa54cdd26b99ccff3533b0e2c638
SHA51227d2f9357e8b2035adeb4486ffa2772e069833aca36b428f4d7dfa8e8ce9431ba9e8f043d655e4d440b78c8b03ba0f44df392438af3a52643ec852222b96b91d
-
Filesize
72KB
MD5c20c60ce7540f96f3ade486783e1a233
SHA1acf85e541f3883123b646428a35e66a9eee5c49c
SHA256504224214c6e323c0ab04d3ebdf8d3b2b8265d6cbbf533f807db340de1444818
SHA5127161fabdedf2daa604f10da267b8d7211c193b71e76ab4408d244d918f55e832d0a552ef8ae218eff832906d29d22315b8206e6b986620956b6092367a83b444
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd