Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2023 17:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://urluno.com/HXGXm
Resource
win10v2004-20230220-en
General
-
Target
https://urluno.com/HXGXm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133294308606624803" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2275444769-3691835758-4097679484-1000\{03AE6B48-6497-43C1-8E38-27DEF9FC0526} chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5020 chrome.exe 5020 chrome.exe 3864 chrome.exe 3864 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5020 wrote to memory of 3412 5020 chrome.exe 86 PID 5020 wrote to memory of 3412 5020 chrome.exe 86 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1744 5020 chrome.exe 87 PID 5020 wrote to memory of 1764 5020 chrome.exe 88 PID 5020 wrote to memory of 1764 5020 chrome.exe 88 PID 5020 wrote to memory of 1168 5020 chrome.exe 89 PID 5020 wrote to memory of 1168 5020 chrome.exe 89 PID 5020 wrote to memory of 1168 5020 chrome.exe 89 PID 5020 wrote to memory of 1168 5020 chrome.exe 89 PID 5020 wrote to memory of 1168 5020 chrome.exe 89 PID 5020 wrote to memory of 1168 5020 chrome.exe 89 PID 5020 wrote to memory of 1168 5020 chrome.exe 89 PID 5020 wrote to memory of 1168 5020 chrome.exe 89 PID 5020 wrote to memory of 1168 5020 chrome.exe 89 PID 5020 wrote to memory of 1168 5020 chrome.exe 89 PID 5020 wrote to memory of 1168 5020 chrome.exe 89 PID 5020 wrote to memory of 1168 5020 chrome.exe 89 PID 5020 wrote to memory of 1168 5020 chrome.exe 89 PID 5020 wrote to memory of 1168 5020 chrome.exe 89 PID 5020 wrote to memory of 1168 5020 chrome.exe 89 PID 5020 wrote to memory of 1168 5020 chrome.exe 89 PID 5020 wrote to memory of 1168 5020 chrome.exe 89 PID 5020 wrote to memory of 1168 5020 chrome.exe 89 PID 5020 wrote to memory of 1168 5020 chrome.exe 89 PID 5020 wrote to memory of 1168 5020 chrome.exe 89 PID 5020 wrote to memory of 1168 5020 chrome.exe 89 PID 5020 wrote to memory of 1168 5020 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://urluno.com/HXGXm1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0f8d9758,0x7fff0f8d9768,0x7fff0f8d97782⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1824,i,14623025659788060619,2551243438548668860,131072 /prefetch:22⤵PID:1744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1824,i,14623025659788060619,2551243438548668860,131072 /prefetch:82⤵PID:1764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1824,i,14623025659788060619,2551243438548668860,131072 /prefetch:82⤵PID:1168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3216 --field-trial-handle=1824,i,14623025659788060619,2551243438548668860,131072 /prefetch:12⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3208 --field-trial-handle=1824,i,14623025659788060619,2551243438548668860,131072 /prefetch:12⤵PID:3888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4524 --field-trial-handle=1824,i,14623025659788060619,2551243438548668860,131072 /prefetch:12⤵PID:764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3216 --field-trial-handle=1824,i,14623025659788060619,2551243438548668860,131072 /prefetch:12⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4800 --field-trial-handle=1824,i,14623025659788060619,2551243438548668860,131072 /prefetch:82⤵PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4812 --field-trial-handle=1824,i,14623025659788060619,2551243438548668860,131072 /prefetch:82⤵
- Modifies registry class
PID:3660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 --field-trial-handle=1824,i,14623025659788060619,2551243438548668860,131072 /prefetch:82⤵PID:3272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5304 --field-trial-handle=1824,i,14623025659788060619,2551243438548668860,131072 /prefetch:82⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 --field-trial-handle=1824,i,14623025659788060619,2551243438548668860,131072 /prefetch:82⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=212 --field-trial-handle=1824,i,14623025659788060619,2551243438548668860,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3864
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2232
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD57c9134fbf86f4672efec676e046f80d7
SHA1c8150813fd8d710719595641ca425c8acba4b741
SHA25669d0a7f6e72fe1c78eb2205e02b012633f3f739007bdbdf89295181c21a3b8cf
SHA512a86d97b726fedb66f64a92a2009b2b173fe11cf46ba1cb586265fcd9e9257f98e19a49de8cae6894e3f472cfae717492fdab76892ee095794d2dfefd19d4ec5a
-
Filesize
2KB
MD51dc8b695f3b9d7035110552f53c642bb
SHA14f5ee37d8abd347da8de735352bdeb9fcd9b4ee1
SHA256a933f46b54cd0fbb60272da46fca12e7c99c41e929212d9e5ccd66296bfd3623
SHA512e6497d6a99fba25450ed5c5751867a05a9b67659d475727cf5315e9d054ad21952fe6cff9de395d5042f3f2732db06849c00e6bd48983aff4d208a69af496b40
-
Filesize
538B
MD588f8ee001c77e42837b674a2c72ce1ee
SHA17c259eea4aab2093e310c5aeb5d1b67d6e39ce7e
SHA256588054fc967cd1cfc4be4454d3d82ec971f22dac14daab9ec7d4b95b4e375fd4
SHA51221c37b65efd4a1e5d6198e1f0d5701af1556242ce17bb2cc36d56c5cb61b316e479873c784986cb459f5f1f4b3af48d8e9ffcbd7d221dee76e028751e452391e
-
Filesize
538B
MD5b0bfc9d6591bcb7b7d1ff0236db5a13e
SHA1c2a26383455aa8d140a18c13c4ba506888b0afd8
SHA256850b0d906c1acd04ea9d6e94113346799bd27bc9ba1612a971652d5037b04cbc
SHA512739ac443b951725321f1277355f4881e2db82a55880e4b7506e51cdd4d5049bc6f22fdd54758fd95093563be03d80a2220714e2bfb23c8d7c04c41f139519476
-
Filesize
6KB
MD531d6266bd8f540060aebcce6a7d4696e
SHA1229e5f36ba4bfcb6933f70757eed8e151b253a3b
SHA256d7661d427c24af839e064f513541e0f9bba650454185b95c3cde2a452d0068f2
SHA51206991fea4f3de287a20f1c0084ec5f19367ebe424d68fd2c350a244c9a61ae8e07966b5a3964ac6c04eb2c50c1a68b1c9feada4eda8a5d1d8e1a48363a455fb9
-
Filesize
15KB
MD5c0de1904ebb1c8e0023ad83c7bb0adc8
SHA149a97a058124f316e24a1633e7a2a3365d2f3aec
SHA2564b8c57b1d95614292bf8369b3f2fe617a284e180e9986a70f99459451a54148e
SHA512f7ff665145cfc5c452a846ca3748ae626d0e4eadff459652e2ca4e25e1d5319b536eefca8f2a556b0c35adf8f3045ff8208a456ea2da14b2547e12bf30c306e7
-
Filesize
152KB
MD5a600e1255b6392f1fd842242f20ad197
SHA1db3990c5933d55585cd3d72919bfb0213b9ff27e
SHA256a9f0d6eb3b0480c7b1729681a80f5fa43524aec5b5fdf3092f67e6b13bdba8de
SHA5126ce25b495ac5f195634df1cedea7a85f1646449cbfae5707dc1f7f246a0fd854c575900352977aa3413d64da4c43fbe348cd94675c5b5cc5381dba1f69c52d3c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd