Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
23-05-2023 11:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://rum.browser-intake-datadoghq.eu
Resource
win10-20230220-en
General
-
Target
http://rum.browser-intake-datadoghq.eu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133293237962474254" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 524 chrome.exe 524 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3536 chrome.exe 3536 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3536 wrote to memory of 3528 3536 chrome.exe 66 PID 3536 wrote to memory of 3528 3536 chrome.exe 66 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3928 3536 chrome.exe 69 PID 3536 wrote to memory of 3968 3536 chrome.exe 68 PID 3536 wrote to memory of 3968 3536 chrome.exe 68 PID 3536 wrote to memory of 4632 3536 chrome.exe 70 PID 3536 wrote to memory of 4632 3536 chrome.exe 70 PID 3536 wrote to memory of 4632 3536 chrome.exe 70 PID 3536 wrote to memory of 4632 3536 chrome.exe 70 PID 3536 wrote to memory of 4632 3536 chrome.exe 70 PID 3536 wrote to memory of 4632 3536 chrome.exe 70 PID 3536 wrote to memory of 4632 3536 chrome.exe 70 PID 3536 wrote to memory of 4632 3536 chrome.exe 70 PID 3536 wrote to memory of 4632 3536 chrome.exe 70 PID 3536 wrote to memory of 4632 3536 chrome.exe 70 PID 3536 wrote to memory of 4632 3536 chrome.exe 70 PID 3536 wrote to memory of 4632 3536 chrome.exe 70 PID 3536 wrote to memory of 4632 3536 chrome.exe 70 PID 3536 wrote to memory of 4632 3536 chrome.exe 70 PID 3536 wrote to memory of 4632 3536 chrome.exe 70 PID 3536 wrote to memory of 4632 3536 chrome.exe 70 PID 3536 wrote to memory of 4632 3536 chrome.exe 70 PID 3536 wrote to memory of 4632 3536 chrome.exe 70 PID 3536 wrote to memory of 4632 3536 chrome.exe 70 PID 3536 wrote to memory of 4632 3536 chrome.exe 70 PID 3536 wrote to memory of 4632 3536 chrome.exe 70 PID 3536 wrote to memory of 4632 3536 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://rum.browser-intake-datadoghq.eu1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffd45de9758,0x7ffd45de9768,0x7ffd45de97782⤵PID:3528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1960 --field-trial-handle=1780,i,11420012189773372630,15322665910308356827,131072 /prefetch:82⤵PID:3968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1600 --field-trial-handle=1780,i,11420012189773372630,15322665910308356827,131072 /prefetch:22⤵PID:3928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2024 --field-trial-handle=1780,i,11420012189773372630,15322665910308356827,131072 /prefetch:82⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2760 --field-trial-handle=1780,i,11420012189773372630,15322665910308356827,131072 /prefetch:12⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2748 --field-trial-handle=1780,i,11420012189773372630,15322665910308356827,131072 /prefetch:12⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4660 --field-trial-handle=1780,i,11420012189773372630,15322665910308356827,131072 /prefetch:82⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4756 --field-trial-handle=1780,i,11420012189773372630,15322665910308356827,131072 /prefetch:82⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4772 --field-trial-handle=1780,i,11420012189773372630,15322665910308356827,131072 /prefetch:82⤵PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4656 --field-trial-handle=1780,i,11420012189773372630,15322665910308356827,131072 /prefetch:82⤵PID:3320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2448 --field-trial-handle=1780,i,11420012189773372630,15322665910308356827,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:524
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3652
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD50a3f0e8a2e3819ff7b0e4aa7d393986b
SHA104781b5999a1ecfec9107bdede93bb54e78b036b
SHA2567789bdddb344b5ba03488b33a4c19b2337f72e4879a1b7756a4532f5431b2b62
SHA512d171da995c2bd65d7385bae02fa65017d45a7d372288f69f08c6fac9fd3e7805a8e5a1626e29558482b1b055d30bdf5286fee7ad043958943644072f374ed930
-
Filesize
5KB
MD5e218390c9c01976fe3d3bff224d4599b
SHA188ac9987a94353b8bc2825f9465d76a4efa20403
SHA25618a0792b6efaf2d9f0af0855cdd6c1f2ddd5d2ba0f83bb764610839f2987f9c6
SHA5122f5073a0dccded94ecc74d2c9429d1f8b2c80ce666b8c6e6542de989fde1049266bf7f4305474ac02061a855f2655c7295ee9216ca62027f83db83c3dc7b65f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\b7cf4ce9-ec32-4d8f-a48a-0b71b65dd80d.tmp
Filesize6KB
MD583ae737582b4a0ea9c79adca8d7fe3f1
SHA103bbe9f5bb5ad7beb343b60570b09cde30f0e6ce
SHA256c3fcb8c19ee64f0f45a92b450f13a894247f1532678b788bc03b602f7a7df74f
SHA5121c4675595d810328d577550e0cfde3c16de193319a177774f578c7d3c9cd04a720511788f02a93aaa0d1e773fc7c61b8bb507ee40ac3e3d9d916ae9086036ea9
-
Filesize
153KB
MD56c9ddc7a1074004fe39983df932f234c
SHA18c282bea51c0e2069db5670ee722dc3a7ff12a8c
SHA2566b571456e99836205d5c583740a698ad530e5dbbf5f6086288a68b88a67894a7
SHA512059c5e8f7f464414d49ceda6f6a4a950131eba0415ee7b5701f1eb7c94308b58fc5eba353d45417356c52e450568cd17485b40b4a04a0df3d927c1e9375f1cd4
-
Filesize
72KB
MD592c85cdb97a5d83638ddc92c8a8450db
SHA1bbcf8664eebf8cfcab7f70c7b8adde7180737074
SHA2569a47c0e5b6b5a188d02c12ddd421d1e9bec0f0c1f39a5cea22b65799ef94ea07
SHA512441c63d57436f7b78d3a3e8a17acfa75763863f4a40ffbdcd9ca2f71b2d6facbe9c685a4e90387f658a06691b2e2886fb8d843933e23aab0a8faa1e11daf7847
-
Filesize
153KB
MD5d0a7a3466c9a442a5bce30e8c6473cf7
SHA1251dba9596581f9e6996fcbd8a07ba19a7a5008c
SHA25647f7b5447d9b54a960daedd53d06f40b391048a4e37e586d6c4ed432a472e798
SHA512478d476063dafe035431cc00a333ba2866f1a27a80d3aa29fb3fdf2c2938927a58c346f3106d477280d5cfe4d2e7fe78f54a8e5f8265a00b68daa713ff293964
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd