Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
26/06/2023, 19:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://uce565ef5ebcb1230ab9ff55944b.previews.dropboxusercontent.com
Resource
win10v2004-20230621-en
General
-
Target
https://uce565ef5ebcb1230ab9ff55944b.previews.dropboxusercontent.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133322825760275287" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1528 chrome.exe 1528 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1528 chrome.exe 1528 chrome.exe -
Suspicious use of AdjustPrivilegeToken 60 IoCs
description pid Process Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeCreatePagefilePrivilege 1528 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1528 wrote to memory of 3248 1528 chrome.exe 83 PID 1528 wrote to memory of 3248 1528 chrome.exe 83 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 4636 1528 chrome.exe 84 PID 1528 wrote to memory of 3196 1528 chrome.exe 85 PID 1528 wrote to memory of 3196 1528 chrome.exe 85 PID 1528 wrote to memory of 2064 1528 chrome.exe 86 PID 1528 wrote to memory of 2064 1528 chrome.exe 86 PID 1528 wrote to memory of 2064 1528 chrome.exe 86 PID 1528 wrote to memory of 2064 1528 chrome.exe 86 PID 1528 wrote to memory of 2064 1528 chrome.exe 86 PID 1528 wrote to memory of 2064 1528 chrome.exe 86 PID 1528 wrote to memory of 2064 1528 chrome.exe 86 PID 1528 wrote to memory of 2064 1528 chrome.exe 86 PID 1528 wrote to memory of 2064 1528 chrome.exe 86 PID 1528 wrote to memory of 2064 1528 chrome.exe 86 PID 1528 wrote to memory of 2064 1528 chrome.exe 86 PID 1528 wrote to memory of 2064 1528 chrome.exe 86 PID 1528 wrote to memory of 2064 1528 chrome.exe 86 PID 1528 wrote to memory of 2064 1528 chrome.exe 86 PID 1528 wrote to memory of 2064 1528 chrome.exe 86 PID 1528 wrote to memory of 2064 1528 chrome.exe 86 PID 1528 wrote to memory of 2064 1528 chrome.exe 86 PID 1528 wrote to memory of 2064 1528 chrome.exe 86 PID 1528 wrote to memory of 2064 1528 chrome.exe 86 PID 1528 wrote to memory of 2064 1528 chrome.exe 86 PID 1528 wrote to memory of 2064 1528 chrome.exe 86 PID 1528 wrote to memory of 2064 1528 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://uce565ef5ebcb1230ab9ff55944b.previews.dropboxusercontent.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd44409758,0x7ffd44409768,0x7ffd444097782⤵PID:3248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 --field-trial-handle=1324,i,1989864326472577332,14051569743320398953,131072 /prefetch:22⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1324,i,1989864326472577332,14051569743320398953,131072 /prefetch:82⤵PID:3196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1324,i,1989864326472577332,14051569743320398953,131072 /prefetch:82⤵PID:2064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3204 --field-trial-handle=1324,i,1989864326472577332,14051569743320398953,131072 /prefetch:12⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3212 --field-trial-handle=1324,i,1989864326472577332,14051569743320398953,131072 /prefetch:12⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4756 --field-trial-handle=1324,i,1989864326472577332,14051569743320398953,131072 /prefetch:82⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 --field-trial-handle=1324,i,1989864326472577332,14051569743320398953,131072 /prefetch:82⤵PID:1780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 --field-trial-handle=1324,i,1989864326472577332,14051569743320398953,131072 /prefetch:82⤵PID:4660
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:208
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
538B
MD5cfd5280d11c241a43d78c1fc0e078211
SHA14fc7f2d8e44cab824782d32fd4c0b6d8be2974e4
SHA2569ab6182c08fabb1e29fb28bb39f4bd39f4d1390f0b0fcc9c57e66b4dac6c6da0
SHA512fea71d93ef087df6f9b96cf856ec3eef9cba53337a0b81f11be16767daf5015b3fd6c03e9d3e04adf9352dacebb69fb3819af107458f4a4fd93eb026f7422269
-
Filesize
6KB
MD5d0da86d1225909219caf70bac391eef1
SHA14d8dfe4141c4da7f1388ac7f67fed493adb48881
SHA25646d0f3b6e7f073479c9615b3915f15ced7063f67b2e2bcf26d1b7952185dea7a
SHA5127927a1b9709cb7d8c303af6c314e1bc0a78d4a9dcb2a995a7c869fe3c9a2ff8f5b1cae63313f1ee931879d74e56bfad868866c0697e60f211827140b83107597
-
Filesize
15KB
MD5d7624d8d9e4b28ec13832229ff9195c5
SHA1348ad6d76239329e442b046a9d5139b4bf06bc39
SHA2567b2c74b9a1b417ca8d57131396edbe4b5a7889ead6612a3ab84ca3aaf1790d1e
SHA5128bab05a2745e27f46030bd9b7cffa0bbf2843cbe438e988291ba00b57a833fa64ad5ed23faa03329ee76bbc39780eda390c3778b027d92a2968b4acf21dbd1c3
-
Filesize
174KB
MD5109bb341e104036a3323ba0f726a6de4
SHA183ff7dde9012c5f393dd50b6befcd0b1be586034
SHA256f7c20d6791ce9baa579956898aff5599d053d57c1dc00b70446ef50182d256da
SHA512f2354b849ac385b5c332685f58214d10f1e2d00ccf48ce3d641e044b7cc37c632a782fbca0dbac044c0dae88c2e0c12d6b75e326a7784d727d9e15e7a97c3cc9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd