Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2023 08:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://PQW6LYQGZJU4.HQE1JZCUR8QS@wn0sdwk0001j9
Resource
win10v2004-20230220-en
General
-
Target
http://PQW6LYQGZJU4.HQE1JZCUR8QS@wn0sdwk0001j9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133291387742405368" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1236 chrome.exe 1236 chrome.exe 3456 chrome.exe 3456 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1236 wrote to memory of 3352 1236 chrome.exe 84 PID 1236 wrote to memory of 3352 1236 chrome.exe 84 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 1828 1236 chrome.exe 85 PID 1236 wrote to memory of 628 1236 chrome.exe 86 PID 1236 wrote to memory of 628 1236 chrome.exe 86 PID 1236 wrote to memory of 4072 1236 chrome.exe 87 PID 1236 wrote to memory of 4072 1236 chrome.exe 87 PID 1236 wrote to memory of 4072 1236 chrome.exe 87 PID 1236 wrote to memory of 4072 1236 chrome.exe 87 PID 1236 wrote to memory of 4072 1236 chrome.exe 87 PID 1236 wrote to memory of 4072 1236 chrome.exe 87 PID 1236 wrote to memory of 4072 1236 chrome.exe 87 PID 1236 wrote to memory of 4072 1236 chrome.exe 87 PID 1236 wrote to memory of 4072 1236 chrome.exe 87 PID 1236 wrote to memory of 4072 1236 chrome.exe 87 PID 1236 wrote to memory of 4072 1236 chrome.exe 87 PID 1236 wrote to memory of 4072 1236 chrome.exe 87 PID 1236 wrote to memory of 4072 1236 chrome.exe 87 PID 1236 wrote to memory of 4072 1236 chrome.exe 87 PID 1236 wrote to memory of 4072 1236 chrome.exe 87 PID 1236 wrote to memory of 4072 1236 chrome.exe 87 PID 1236 wrote to memory of 4072 1236 chrome.exe 87 PID 1236 wrote to memory of 4072 1236 chrome.exe 87 PID 1236 wrote to memory of 4072 1236 chrome.exe 87 PID 1236 wrote to memory of 4072 1236 chrome.exe 87 PID 1236 wrote to memory of 4072 1236 chrome.exe 87 PID 1236 wrote to memory of 4072 1236 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://PQW6LYQGZJU4.HQE1JZCUR8QS@wn0sdwk0001j91⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa66269758,0x7ffa66269768,0x7ffa662697782⤵PID:3352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1816,i,6522721595086735713,8399386895319332806,131072 /prefetch:22⤵PID:1828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1816,i,6522721595086735713,8399386895319332806,131072 /prefetch:82⤵PID:628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1816,i,6522721595086735713,8399386895319332806,131072 /prefetch:82⤵PID:4072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3088 --field-trial-handle=1816,i,6522721595086735713,8399386895319332806,131072 /prefetch:12⤵PID:884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3096 --field-trial-handle=1816,i,6522721595086735713,8399386895319332806,131072 /prefetch:12⤵PID:3948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4512 --field-trial-handle=1816,i,6522721595086735713,8399386895319332806,131072 /prefetch:12⤵PID:2892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3372 --field-trial-handle=1816,i,6522721595086735713,8399386895319332806,131072 /prefetch:12⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 --field-trial-handle=1816,i,6522721595086735713,8399386895319332806,131072 /prefetch:82⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4948 --field-trial-handle=1816,i,6522721595086735713,8399386895319332806,131072 /prefetch:82⤵PID:1216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4760 --field-trial-handle=1816,i,6522721595086735713,8399386895319332806,131072 /prefetch:82⤵PID:760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4776 --field-trial-handle=1816,i,6522721595086735713,8399386895319332806,131072 /prefetch:12⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2796 --field-trial-handle=1816,i,6522721595086735713,8399386895319332806,131072 /prefetch:12⤵PID:3356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=212 --field-trial-handle=1816,i,6522721595086735713,8399386895319332806,131072 /prefetch:12⤵PID:1936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4760 --field-trial-handle=1816,i,6522721595086735713,8399386895319332806,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4500
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
882B
MD5b3aefd785f8b758a38c06d44d602fbeb
SHA11600ae7215136b6a0b816a1e97108fdcc27d5908
SHA256fd2b45384fa28fc84bf0286444adcf7e868bba5c5fab9c014fc1c6043d8e55c1
SHA512c2ae4ba2f2f33c771a61745dd96a29ee9cc8ac475df884d8abf7befa15a0c5cbbbb0966ef62dbec8f9fbf40397038741cb95489635020ebc620aa39d9dd6e98f
-
Filesize
6KB
MD50bd6c975f039d166a345da8d096ce3ec
SHA17513bba639a3710c74d5b47063f8f4a29b433ad5
SHA256fbf08d18742f740801d9bcb053f3b2202af76f3f7790d1aa98897c8dd403040b
SHA512b64304519820ea772d468b83e698c82ccfbfa761f7b8eb59a7e34461899f52eca2217011bfc0d60882459d30f69a6dc8559738a9c33cfd1a8b3246ace077f4e2
-
Filesize
6KB
MD5e1e4dbeec44896f53797bb69b5b44751
SHA1079e70caa490478ba9a5ac1526030f850d4bccce
SHA256d53ffc659fa06ef504000669e34366d4a3bb2482b378a1ec3d6c3604e3164c93
SHA512409da2b2270856f2ca0177fe52b0134e9daef28dd94c30ea7d8dc004da054ae026b63b51ee0d77b07adc11044344c10c4a5e3d38b398f5b9b9ed9fa647f671ee
-
Filesize
15KB
MD5de77578ee97f40d83891b8075db9a11d
SHA1b46ba0782571c7963488757f19e75d7b1958a1a7
SHA256c4ec1f5fe34c2f3473881d5d398f993517d4ec4b7d09b5acdd62563217a2615d
SHA512725a4840d10d0817822d4600e7f576a03c4a26cf7c78e6be676aecd5fec1c16bb20d37062bc5387a94a139b4c4cea1c1757740af9c02dd7fd84ca6de3fd8a3fb
-
Filesize
151KB
MD520beadd6a60af5a08661f7f107a4d83a
SHA1cd1d34b74f0889ab3ca25ba59129765405c4aaa0
SHA25677f9916c46c68b9e6e4c351360faf5a1ec997e27cb79daae5fde5ee0308e66bf
SHA512df868a62f53d16cea99891783b088bf05da25c364d1fd00dd6fa3c63425f7976732f25ee5e6a358b3b7171be1d3fd2127489c8b224c0f7284d5f2c8efef06eb5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd