Analysis
-
max time kernel
300s -
max time network
294s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2023, 13:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://bit.ly/3b6ctvx
Resource
win10v2004-20230220-en
General
-
Target
http://bit.ly/3b6ctvx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133288042248564984" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2640 chrome.exe 2640 chrome.exe 2968 chrome.exe 2968 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe Token: SeShutdownPrivilege 2640 chrome.exe Token: SeCreatePagefilePrivilege 2640 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe 2640 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2000 2640 chrome.exe 87 PID 2640 wrote to memory of 2000 2640 chrome.exe 87 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 1876 2640 chrome.exe 88 PID 2640 wrote to memory of 216 2640 chrome.exe 89 PID 2640 wrote to memory of 216 2640 chrome.exe 89 PID 2640 wrote to memory of 4600 2640 chrome.exe 90 PID 2640 wrote to memory of 4600 2640 chrome.exe 90 PID 2640 wrote to memory of 4600 2640 chrome.exe 90 PID 2640 wrote to memory of 4600 2640 chrome.exe 90 PID 2640 wrote to memory of 4600 2640 chrome.exe 90 PID 2640 wrote to memory of 4600 2640 chrome.exe 90 PID 2640 wrote to memory of 4600 2640 chrome.exe 90 PID 2640 wrote to memory of 4600 2640 chrome.exe 90 PID 2640 wrote to memory of 4600 2640 chrome.exe 90 PID 2640 wrote to memory of 4600 2640 chrome.exe 90 PID 2640 wrote to memory of 4600 2640 chrome.exe 90 PID 2640 wrote to memory of 4600 2640 chrome.exe 90 PID 2640 wrote to memory of 4600 2640 chrome.exe 90 PID 2640 wrote to memory of 4600 2640 chrome.exe 90 PID 2640 wrote to memory of 4600 2640 chrome.exe 90 PID 2640 wrote to memory of 4600 2640 chrome.exe 90 PID 2640 wrote to memory of 4600 2640 chrome.exe 90 PID 2640 wrote to memory of 4600 2640 chrome.exe 90 PID 2640 wrote to memory of 4600 2640 chrome.exe 90 PID 2640 wrote to memory of 4600 2640 chrome.exe 90 PID 2640 wrote to memory of 4600 2640 chrome.exe 90 PID 2640 wrote to memory of 4600 2640 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://bit.ly/3b6ctvx1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe48c9758,0x7fffe48c9768,0x7fffe48c97782⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1800,i,15366340701981769864,17736130855018189324,131072 /prefetch:22⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1800,i,15366340701981769864,17736130855018189324,131072 /prefetch:82⤵PID:216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2156 --field-trial-handle=1800,i,15366340701981769864,17736130855018189324,131072 /prefetch:82⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3148 --field-trial-handle=1800,i,15366340701981769864,17736130855018189324,131072 /prefetch:12⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3180 --field-trial-handle=1800,i,15366340701981769864,17736130855018189324,131072 /prefetch:12⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4708 --field-trial-handle=1800,i,15366340701981769864,17736130855018189324,131072 /prefetch:82⤵PID:3076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 --field-trial-handle=1800,i,15366340701981769864,17736130855018189324,131072 /prefetch:82⤵PID:2120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4652 --field-trial-handle=1800,i,15366340701981769864,17736130855018189324,131072 /prefetch:12⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2848 --field-trial-handle=1800,i,15366340701981769864,17736130855018189324,131072 /prefetch:82⤵PID:3548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 --field-trial-handle=1800,i,15366340701981769864,17736130855018189324,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2968
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3436
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD544f8fb9c433a25144851062500d866ef
SHA13da7d7e04207da3935ba5057ce561407f6f8338c
SHA256aaab5e689601e06fbadd198be19c152f48c5231f7763f87dd037689d3b309c45
SHA512de1f1d6145060a7687f977e497d92015a4c2710fae43876dbc3eebd85f130d7ea32bfc524ba8b5bc0efc43bcf8612d707d63486868dfc2d94d021f71dbff83b8
-
Filesize
908B
MD5348172d0cde7ce14ca34bcfcf4cdde92
SHA11510e2230796e5935351c308694e619403ba2df0
SHA256b1a13d3d2c0e22dc07aafcae1358de65ad61e716fdb65b552283bcbae783acfe
SHA512346b8dbb8f50c64c2af7c783b06ed3c53e820cfea9503dfdca39f71893ce571cf5869a0b839144b967e92ad5c63ffd59a0657da31efa0a47025a39cd3d557646
-
Filesize
829B
MD5c55285792b2cf749e72db2cd0291a40a
SHA19b04962c9216ece98cd9d5279187fd8fc30d2837
SHA256e6160a289307c76a070f6b32e328a79d55a3a55a8de91162b7daed1584b9fba8
SHA512cf09fc224f62ab672011bed3ff980131ea376a055b42f4c8e18a522934ce14f8dc4b51e0e1b4cf3f60d79cc470fafd304b7e9a2256194ec30c8f780b83c07c12
-
Filesize
6KB
MD50eb3d7a53800240174808802b652f3ce
SHA15c1bb29e8edc9302029f39b3b514dc96f7bbd177
SHA2560e794ffdf80d55e98587a67da4bf076c3f2f289686a3541d27bb161584479f3e
SHA5122491d99abce2f12a9c9fe9a4b34904c7792a16a09c12adfb84cf0717fec9ab9284378e7b905094c04862a4e629951af2977831504fe381e85d2ea6d65f7e7d0f
-
Filesize
6KB
MD59d10810bb111a1cac839371e4331ad17
SHA14cc0f6fe47e3c9ae7343722f0be72e203b307807
SHA25698005e6ebcf67642369f6fb75f8ec116b32fe4b12fc84b353428c2701fb7e0d5
SHA512fb9b1f6077934037c1f3d70ac894c3176855c8eefc0008739a9501489e3c303c8cbd1fbe88f9ccccbfae4a18199f3b94a7cd8e8897f7272256ad5ed6b5e8cffb
-
Filesize
5KB
MD55ac54f1d77699137af8f8b2dac2a6188
SHA106d68c72c8856ddf2db9ab62332f851f42e48504
SHA25626c1fa17cdc2c7911f4e2d3bdffa93c09b0b28881c9697d617d6fe54ccbe37c1
SHA5122c02fbf25a758d9bf2cb67dd0f71e355f260b797f0ab1c249ea8bb644a68e9fbf098f3febd4ec086bd0a52ac01db7abe4f1eb46562f0a5caedf74dea0c275f64
-
Filesize
5KB
MD545f11ebc9a2742107d98e3c6abd03024
SHA17a26444f02180d66c166eda8badb190d0f0a80b1
SHA25648560f80d3120a1b536df6be0b25d14ffc013ed8aa02251466dd3ab19af96e88
SHA51238b3692712042978b6e0c1b51bc070671db200a574c2a52e55e2a37ffae332c98c4c1221294a572e824efd49d3db38ff4a71848c1613ba877785fc9627e47e3c
-
Filesize
151KB
MD5d7352b38de510ee062aa57a733d62497
SHA10f72441e56d0d1c1e8fcc56d2c7619e0869588c6
SHA256d2a59a98b8cc608fb1b8055ecde83de200beb5730efaec9b77b2bd86bf15b5c6
SHA512f1f1711c87b7d8b93f1b0d0038a1caed67bbabee011d75b55d5f0453a4901a56f856e03e823dcfcaff1f484d0316eaed0f1672e8833e8f69c3d19d3e6968bac9
-
Filesize
97KB
MD53e193eb132d01e7660b24a68f2bdce76
SHA1fd228c98a680872815bb4d5e08d0b20ea9b8b5fa
SHA256585327fd94ac2f540630ce88c1c4d49a86f0b87668923a6be2ec1cd0ebf5c7f3
SHA512131be28a051efec7d2d5df59ebe86216abd8d03da91dca4a011b1479d20cd577594cf9c0f0980b43c6d6d95fc51dd6d892632b0a39573c0a8a6b8ea0f297012b
-
Filesize
96KB
MD5a1d457cf7baf68b33c9bad906e86547e
SHA124310bd00d4688e1efe1a355e29060a3495ca6f0
SHA256199d5ecfe449be514e54186487589dd8daa2323204261f03989f67388f619e39
SHA5122fb75c23f4fb0da1b1008754fa3945b404bc16324a88ebc9b846c3f88f258d25cdd1b87185ae453109ae6ecd4ff5086d47b76223daeaae8b95cb3733b5f206e4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd