Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2023, 22:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?c332e9727a3b377a
Resource
win10v2004-20230220-en
General
-
Target
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?c332e9727a3b377a
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133301394375776770" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4260 chrome.exe 4260 chrome.exe 1940 chrome.exe 1940 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4260 chrome.exe 4260 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe Token: SeShutdownPrivilege 4260 chrome.exe Token: SeCreatePagefilePrivilege 4260 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4260 wrote to memory of 3012 4260 chrome.exe 85 PID 4260 wrote to memory of 3012 4260 chrome.exe 85 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 1992 4260 chrome.exe 86 PID 4260 wrote to memory of 2112 4260 chrome.exe 87 PID 4260 wrote to memory of 2112 4260 chrome.exe 87 PID 4260 wrote to memory of 5088 4260 chrome.exe 88 PID 4260 wrote to memory of 5088 4260 chrome.exe 88 PID 4260 wrote to memory of 5088 4260 chrome.exe 88 PID 4260 wrote to memory of 5088 4260 chrome.exe 88 PID 4260 wrote to memory of 5088 4260 chrome.exe 88 PID 4260 wrote to memory of 5088 4260 chrome.exe 88 PID 4260 wrote to memory of 5088 4260 chrome.exe 88 PID 4260 wrote to memory of 5088 4260 chrome.exe 88 PID 4260 wrote to memory of 5088 4260 chrome.exe 88 PID 4260 wrote to memory of 5088 4260 chrome.exe 88 PID 4260 wrote to memory of 5088 4260 chrome.exe 88 PID 4260 wrote to memory of 5088 4260 chrome.exe 88 PID 4260 wrote to memory of 5088 4260 chrome.exe 88 PID 4260 wrote to memory of 5088 4260 chrome.exe 88 PID 4260 wrote to memory of 5088 4260 chrome.exe 88 PID 4260 wrote to memory of 5088 4260 chrome.exe 88 PID 4260 wrote to memory of 5088 4260 chrome.exe 88 PID 4260 wrote to memory of 5088 4260 chrome.exe 88 PID 4260 wrote to memory of 5088 4260 chrome.exe 88 PID 4260 wrote to memory of 5088 4260 chrome.exe 88 PID 4260 wrote to memory of 5088 4260 chrome.exe 88 PID 4260 wrote to memory of 5088 4260 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?c332e9727a3b377a1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9ab99758,0x7ffd9ab99768,0x7ffd9ab997782⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1812,i,10985850705119335024,15186706896134022338,131072 /prefetch:22⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1812,i,10985850705119335024,15186706896134022338,131072 /prefetch:82⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1812,i,10985850705119335024,15186706896134022338,131072 /prefetch:82⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1812,i,10985850705119335024,15186706896134022338,131072 /prefetch:12⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3032 --field-trial-handle=1812,i,10985850705119335024,15186706896134022338,131072 /prefetch:12⤵PID:320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 --field-trial-handle=1812,i,10985850705119335024,15186706896134022338,131072 /prefetch:82⤵PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 --field-trial-handle=1812,i,10985850705119335024,15186706896134022338,131072 /prefetch:82⤵PID:932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 --field-trial-handle=1812,i,10985850705119335024,15186706896134022338,131072 /prefetch:82⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2488 --field-trial-handle=1812,i,10985850705119335024,15186706896134022338,131072 /prefetch:82⤵PID:3640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2832 --field-trial-handle=1812,i,10985850705119335024,15186706896134022338,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3920
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4608
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD53a715e7f9426848e669f7a0d981da921
SHA11f4096fa568b5301e3bc5e7077e2da6978d6c7e8
SHA2562f97f28f7a3f3bfb8ce9e797cd9d0e17d5478bc6710af2fab4c3b9591d3c61e6
SHA5125fbf9d05cba730daf803ef2c50ab2fac4887389b03aa2a49cccc591cfad0dbdf0dd63c3d71dba8efbd5fe2bec542e770555686436e67da0e053e66c873a79246
-
Filesize
4KB
MD51deb8294dd8f2878d55874a548be4e55
SHA1ce5d7831d54db82f9cc9bce065e80bc7414b0b67
SHA2563907c99ddd7d72d677cfe209d6f3d69accdd0e82a0a1a09ae75aff1d86c3d3c8
SHA512993a9835af47242b47bf1aea2b6fabdfd3e098e7f3b3ad7e99cc317a06f77f18d5111ce099ac54e1702cdcc90c34ae85045cf15e9c35c67051a0625da6d1a33f
-
Filesize
4KB
MD5fbda305235367dab99871ea5f0bd1cb4
SHA1ade833eefcab1bf9d016b164c5efb3b97ca5767a
SHA2567b0a662fa57a205371f6725876203d6a49ebc098cf511dcbceae43cd06d94b5f
SHA5127608a8bda13849d93c36e57c77b3cc1430d2a9a3300da627352c09338ed5540493ad51c042c478a539c42ab07f250405eb850021f297576c8d6c7b68d41dd636
-
Filesize
157KB
MD5f640dbf57263f246ffb43579f3a7f271
SHA131abbc18956a61281e3724432ff56070e8b0da8c
SHA2566dd5fef4e206fd38ce343afa5c094471b71be15d65fb8975eb8068b731cc839e
SHA51273062b5060ab7cdbad81e069cd6d007470c811fc1ab6b30b7546953a3cdf6e3c024a98c1ba4362a05a09cc70f9419c0e6329f6dc90a65560f385171bf9827317
-
Filesize
106KB
MD568ebd0ac3b555e6e78936b783f5a100a
SHA1df2cd2f06c2403fec207e65294f9f0c8362a68ca
SHA256c82ddaea1cb284e909d552e7292de0b0e8783efb43c03ad0386c4a0959f98733
SHA512b0107ae84551dec8cb744985d4572c1ef7f8a2c3eed1be7896dc4a6f71195269226400f0dce9d4d19c80e6538741d5532b30589f37554d8bbe3e854da076b51a
-
Filesize
103KB
MD5b83d08b1ca46bcd4ea91d8727021e8e7
SHA1e8909b0cf009d60410ef6028f074ec411745792e
SHA25623a98c1c904f3ed231c0058a81cef2128c4263cc1a6037682532a1bea668772a
SHA512b02acd951658d59084000f3a92e2368f752c4190f388996496236128e38f2c11a7d08e98e3f9ac5a3c779a8aed85a4e0dda266f5302f7cecfa1b613e77c4b983
-
Filesize
4KB
MD5f7dcb24540769805e5bb30d193944dce
SHA1e26c583c562293356794937d9e2e6155d15449ee
SHA2566b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea
SHA512cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94