Analysis
-
max time kernel
2519s -
max time network
2414s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2023, 08:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://google.com
Resource
win10v2004-20230220-en
General
-
Target
http://google.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133294850547305930" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4972 chrome.exe 4972 chrome.exe 4784 chrome.exe 4784 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4972 wrote to memory of 2640 4972 chrome.exe 84 PID 4972 wrote to memory of 2640 4972 chrome.exe 84 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 2080 4972 chrome.exe 85 PID 4972 wrote to memory of 3004 4972 chrome.exe 86 PID 4972 wrote to memory of 3004 4972 chrome.exe 86 PID 4972 wrote to memory of 1876 4972 chrome.exe 87 PID 4972 wrote to memory of 1876 4972 chrome.exe 87 PID 4972 wrote to memory of 1876 4972 chrome.exe 87 PID 4972 wrote to memory of 1876 4972 chrome.exe 87 PID 4972 wrote to memory of 1876 4972 chrome.exe 87 PID 4972 wrote to memory of 1876 4972 chrome.exe 87 PID 4972 wrote to memory of 1876 4972 chrome.exe 87 PID 4972 wrote to memory of 1876 4972 chrome.exe 87 PID 4972 wrote to memory of 1876 4972 chrome.exe 87 PID 4972 wrote to memory of 1876 4972 chrome.exe 87 PID 4972 wrote to memory of 1876 4972 chrome.exe 87 PID 4972 wrote to memory of 1876 4972 chrome.exe 87 PID 4972 wrote to memory of 1876 4972 chrome.exe 87 PID 4972 wrote to memory of 1876 4972 chrome.exe 87 PID 4972 wrote to memory of 1876 4972 chrome.exe 87 PID 4972 wrote to memory of 1876 4972 chrome.exe 87 PID 4972 wrote to memory of 1876 4972 chrome.exe 87 PID 4972 wrote to memory of 1876 4972 chrome.exe 87 PID 4972 wrote to memory of 1876 4972 chrome.exe 87 PID 4972 wrote to memory of 1876 4972 chrome.exe 87 PID 4972 wrote to memory of 1876 4972 chrome.exe 87 PID 4972 wrote to memory of 1876 4972 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://google.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb2de49758,0x7ffb2de49768,0x7ffb2de497782⤵PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=400,i,5818752080666489208,17647516717306002038,131072 /prefetch:22⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=400,i,5818752080666489208,17647516717306002038,131072 /prefetch:82⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2148 --field-trial-handle=400,i,5818752080666489208,17647516717306002038,131072 /prefetch:82⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=400,i,5818752080666489208,17647516717306002038,131072 /prefetch:12⤵PID:980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2964 --field-trial-handle=400,i,5818752080666489208,17647516717306002038,131072 /prefetch:12⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4460 --field-trial-handle=400,i,5818752080666489208,17647516717306002038,131072 /prefetch:12⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4380 --field-trial-handle=400,i,5818752080666489208,17647516717306002038,131072 /prefetch:82⤵PID:2952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 --field-trial-handle=400,i,5818752080666489208,17647516717306002038,131072 /prefetch:82⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2808 --field-trial-handle=400,i,5818752080666489208,17647516717306002038,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4900
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD5b7684253fd6bcc4a3c7df8cd11bf946f
SHA12702f6147b194161520f5b5993a6572ae01884b4
SHA256ab42746ba42eebb25b6d9ab408fc19d912783e8592b306285de82e5a64f18559
SHA51250122fda75b510957507c5bd77c425ce30e786ae3b3d1616c3c9266c2daaf7b2ab17ceeed6504c310f6b175e6577ae1bec009efcc2e1245bdf464d3962e47499
-
Filesize
2KB
MD526a7c5a69c02ed970e377e88fca69681
SHA1cf6ce55a989fe7ce724ff2319d0f4e7763b7fad3
SHA2560f46d226e21825793a22fad9f7518ffdfb2c3befa5aea3eb0a92fa8aac368116
SHA512e02c81d606cecbd0f501d376760dbb52675935be95653341a16ba6761c9bfcb3d2a434fe7deb215d0a3ce124e7cded7e3b6826381d59b0fe7176c0dc45951412
-
Filesize
2KB
MD58fb3bfbe7fdd152d0ad203ae253f508b
SHA132db1044f800e1bdece27b6b636a1f7f3248ff91
SHA256c898305e41b36ca37ba0316231b94cf86b81b671ad97fdc9a51200f96e737aa1
SHA5129b9ab80d9d6a3d97a4ceffcdfc107f9a2fa6615a4817e3ce318be2f626972ae398b69f962581e7245eb4719f22570d0042eeacb95d87fa7cbfafc3409851a431
-
Filesize
2KB
MD54c9d705f4946ed5e38743fc4607ca81f
SHA1354ce1a2a01395403532e687551a1888ba1f0f3e
SHA256da53ecd9e5bb5de234457a517ce92245e04eb6303863aac2e0bdd00bcc34f1de
SHA512961e1697da5a5ec83971a37c7bb4edbae1d8f2dfca81a5c200997363919eaef20f031d7ceeb47d8d3e3b81831f2d467c987e12e1e0c814bb00039f68de5d5b85
-
Filesize
539B
MD5e01fd053dc380ae0749210c9ddbfab10
SHA15211da59e5009e71c0f44c36f154a24a41db7179
SHA2561df8c42802660968a7d59ea4fe4702131700bcf57504c62d9eec259dea1deb53
SHA51205e483e5ce604f530112120d4ddbd1f8bbb50d6a4ccdca5de7f63be6d19fe332631d187ceb2600996fbb7f84ed36e6de23b7c9c07deb2a92ea32190355c08d5e
-
Filesize
539B
MD5714aad57e7afaab562e1551ec7e19f42
SHA130f6587d617ed423966b5e2c390b917892e5738d
SHA256c9111e4ba0dc3db6f99fa4f43aa75b0b41349ee4ebbfd0848124fbf9ee1c7bfb
SHA5125f9453c86c59ed65c5db63cdc84ea21ce4663a0095bb1d170f9478c6626f61be04046005e1b10bd9b774b084256fda64d91440ebdd4b917f0d1e7ae6c8f635c4
-
Filesize
5KB
MD550005ae1d58c8071cdff0804b21b74ce
SHA13a8bdda6d0afc1fe0d4298579175820041cbc1a5
SHA256461b7f1cc24f9c4d48c465e69f5a778a3f57cdfec1f32ac81814e953e7748b1d
SHA512c9a1f0739516a1e1a22ab92b73657042d4e5cfc5baca19ffbb716bcc13122ce0ce6946cc01ab890e292c5fa49d8dc3a14dfbe76b842efac0a64df9897358a161
-
Filesize
4KB
MD5b1ba6467144fc8b84ddf1309d1ef0469
SHA1c92c3261a2f27ae9a6a30b7be51e39c5d5d91518
SHA256e03b6e174457efb349e49ab8e3418d930dd397c139e92ae93fdeeb88180b768b
SHA512cc19cd1fb0c013a571c93d3d76c740b8699ef51f3200abeb429f6576ecbed0ded30592063ae1ceba0eecec70dfc828cf8f42786ef1e46f5523b26c0b78ffe450
-
Filesize
4KB
MD5db581811ec85a2fbe79162d96516995c
SHA14c64b1ff15e902ae3b3bdd5f70d068672bc2704d
SHA2567a435cfac1e0915c07b7a335911536fe82d6aac3b1f5f1ac34232077dcdf9f6d
SHA51298ecb0b4644f03514a9c63c3dd22c96fe0c780fa825916f4260cc510fdef3c305ca5c813496b83ddd93ac5bb334c5a677b081178a8f0f80f61884b448c1bf500
-
Filesize
153KB
MD50b1d5ee3d59de98c7d83a36e6f01a1e2
SHA137447b05d482b644338ac4ecaed35aaec0a44e8e
SHA256c9f79e73dc6610c2cb52a3ae4361879e759678f5309e44d69131ad3fb304db9b
SHA512e7e23bf0bfa6945f7233d1fc348a1a5ae72bf4793146ffdf27ff634f2e1f525af4fe0e0407a15a9a1db7f2d2e413f7847ffcca3d808f421c8a8f8e18194c6d0f
-
Filesize
153KB
MD5de0e977fdb94a682e0c1553355de39ac
SHA10a9d243057f95de48920ffca25f11c3fec5c6378
SHA256a33ed1a3d1177e9d5ec9770e708fcd6811de1165df5fbf180a4606fb7f494da7
SHA512e8cc484951a6f16ff17cd5b3ac7e63af94e084921194d200d39c0a89b0c8fccf6739586713dfe80c998662f778e9f512d4ced1021ab9f91c0a1556911a8ae3ea