Analysis
-
max time kernel
21s -
max time network
22s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 12:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.google.com/search?q=lake+buckhorn+lodge+ellijay+ga&rlz=1C1GCEA_enUS937US937&oq=Lake+Buchhorn+Lodge+Ell&aqs=chrome.1.69i57j0i22i30.9994j0j15&sourceid=chrome&ie=UTF-8&safe=active&ssui=on#fpstate=ive&vld=cid:1fb45c73,vid:SXguBGCrszE
Resource
win10v2004-20230220-en
General
-
Target
https://www.google.com/search?q=lake+buckhorn+lodge+ellijay+ga&rlz=1C1GCEA_enUS937US937&oq=Lake+Buchhorn+Lodge+Ell&aqs=chrome.1.69i57j0i22i30.9994j0j15&sourceid=chrome&ie=UTF-8&safe=active&ssui=on#fpstate=ive&vld=cid:1fb45c73,vid:SXguBGCrszE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133305272057581767" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3784 chrome.exe 3784 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: 33 5020 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5020 AUDIODG.EXE Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe Token: SeShutdownPrivilege 3784 chrome.exe Token: SeCreatePagefilePrivilege 3784 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe 3784 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3784 wrote to memory of 484 3784 chrome.exe 83 PID 3784 wrote to memory of 484 3784 chrome.exe 83 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4528 3784 chrome.exe 85 PID 3784 wrote to memory of 4760 3784 chrome.exe 86 PID 3784 wrote to memory of 4760 3784 chrome.exe 86 PID 3784 wrote to memory of 3860 3784 chrome.exe 87 PID 3784 wrote to memory of 3860 3784 chrome.exe 87 PID 3784 wrote to memory of 3860 3784 chrome.exe 87 PID 3784 wrote to memory of 3860 3784 chrome.exe 87 PID 3784 wrote to memory of 3860 3784 chrome.exe 87 PID 3784 wrote to memory of 3860 3784 chrome.exe 87 PID 3784 wrote to memory of 3860 3784 chrome.exe 87 PID 3784 wrote to memory of 3860 3784 chrome.exe 87 PID 3784 wrote to memory of 3860 3784 chrome.exe 87 PID 3784 wrote to memory of 3860 3784 chrome.exe 87 PID 3784 wrote to memory of 3860 3784 chrome.exe 87 PID 3784 wrote to memory of 3860 3784 chrome.exe 87 PID 3784 wrote to memory of 3860 3784 chrome.exe 87 PID 3784 wrote to memory of 3860 3784 chrome.exe 87 PID 3784 wrote to memory of 3860 3784 chrome.exe 87 PID 3784 wrote to memory of 3860 3784 chrome.exe 87 PID 3784 wrote to memory of 3860 3784 chrome.exe 87 PID 3784 wrote to memory of 3860 3784 chrome.exe 87 PID 3784 wrote to memory of 3860 3784 chrome.exe 87 PID 3784 wrote to memory of 3860 3784 chrome.exe 87 PID 3784 wrote to memory of 3860 3784 chrome.exe 87 PID 3784 wrote to memory of 3860 3784 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://www.google.com/search?q=lake+buckhorn+lodge+ellijay+ga&rlz=1C1GCEA_enUS937US937&oq=Lake+Buchhorn+Lodge+Ell&aqs=chrome.1.69i57j0i22i30.9994j0j15&sourceid=chrome&ie=UTF-8&safe=active&ssui=on#fpstate=ive&vld=cid:1fb45c73,vid:SXguBGCrszE1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec8b79758,0x7ffec8b79768,0x7ffec8b797782⤵PID:484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1792,i,13528878726413761789,9534419287281532773,131072 /prefetch:22⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1792,i,13528878726413761789,9534419287281532773,131072 /prefetch:82⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2256 --field-trial-handle=1792,i,13528878726413761789,9534419287281532773,131072 /prefetch:82⤵PID:3860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3096 --field-trial-handle=1792,i,13528878726413761789,9534419287281532773,131072 /prefetch:12⤵PID:1408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3104 --field-trial-handle=1792,i,13528878726413761789,9534419287281532773,131072 /prefetch:12⤵PID:1316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4460 --field-trial-handle=1792,i,13528878726413761789,9534419287281532773,131072 /prefetch:12⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4668 --field-trial-handle=1792,i,13528878726413761789,9534419287281532773,131072 /prefetch:12⤵PID:2644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5160 --field-trial-handle=1792,i,13528878726413761789,9534419287281532773,131072 /prefetch:82⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 --field-trial-handle=1792,i,13528878726413761789,9534419287281532773,131072 /prefetch:82⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 --field-trial-handle=1792,i,13528878726413761789,9534419287281532773,131072 /prefetch:82⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2952
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4fc 0x36c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5020
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
539B
MD56aaf31588104c1931dc185705e327453
SHA1db81a33534f18622adcf6866538ab57245085a3c
SHA256f825c8a7b5eec89262ba806e28f337fa7177bb4344cb3a058271a5e76804449c
SHA512c64d0473b4980abadd9866dc92f19b5a22664c6cb899632e62652eba240b25600740b6b421ee647610717905fb1e662f73a7a01ed972f1f6f7fa2aa9098846c7
-
Filesize
4KB
MD52b745a8d8f99d88bba1902d10504e725
SHA19e7025447d220c37949345fefe9cdd6ec2460bb3
SHA256f753c45629fb89dda4c39f4dc14ebd5f97a8eb50f38e95eb820714fe432ac3e2
SHA5124fa18d736fbca04b3029765cfde907dab27ea32037f4dbd5789dd3d3a16237dcc9faed0430de6fd45e21e9a3544401636d8f569612ec9a99f75c170968cfb3ba
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe56c8b4.TMP
Filesize120B
MD591f42cf0c4e2bc81698889091d1cf6f8
SHA1d77c4bd1bba075bdb0f87ff206e85684831795c6
SHA2562a696eda24a63c9008eabf7b904bce1887f20d86ff9b8c7daaa401567642bfe7
SHA512aae8056647a627d233ec2687e8612882c85f1ee24acb0bfbd34bc003a6fcc59ebec5476980fb95e4b46ba973c1c4409f1c8dbefe9ddf08882b9d128302d3d6ca
-
Filesize
157KB
MD56f25139727dbfc9df1bd25269af7ea71
SHA1f12cb50d6f3b3f51571f4096a6e83c4070da4857
SHA2566b1d628f50837433425fa517b248373b165ec3ca4745452c72afe3a6d78b3d92
SHA512e90dddaaf6c7aae0ef94e7b5396abd1c85d6507edc04df491f9149aca63acf069fd1e7700c8323be1b5e18dba026108380272568569ac066a5cc3b3180cc67ad