Analysis
-
max time kernel
114s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
26-06-2023 20:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://goo.gl/maps/Bz55PcrMxjuphjdZA
Resource
win10v2004-20230621-en
General
-
Target
https://goo.gl/maps/Bz55PcrMxjuphjdZA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133322856344047679" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3688 chrome.exe 3688 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3688 wrote to memory of 220 3688 chrome.exe 83 PID 3688 wrote to memory of 220 3688 chrome.exe 83 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2200 3688 chrome.exe 85 PID 3688 wrote to memory of 2468 3688 chrome.exe 86 PID 3688 wrote to memory of 2468 3688 chrome.exe 86 PID 3688 wrote to memory of 4884 3688 chrome.exe 87 PID 3688 wrote to memory of 4884 3688 chrome.exe 87 PID 3688 wrote to memory of 4884 3688 chrome.exe 87 PID 3688 wrote to memory of 4884 3688 chrome.exe 87 PID 3688 wrote to memory of 4884 3688 chrome.exe 87 PID 3688 wrote to memory of 4884 3688 chrome.exe 87 PID 3688 wrote to memory of 4884 3688 chrome.exe 87 PID 3688 wrote to memory of 4884 3688 chrome.exe 87 PID 3688 wrote to memory of 4884 3688 chrome.exe 87 PID 3688 wrote to memory of 4884 3688 chrome.exe 87 PID 3688 wrote to memory of 4884 3688 chrome.exe 87 PID 3688 wrote to memory of 4884 3688 chrome.exe 87 PID 3688 wrote to memory of 4884 3688 chrome.exe 87 PID 3688 wrote to memory of 4884 3688 chrome.exe 87 PID 3688 wrote to memory of 4884 3688 chrome.exe 87 PID 3688 wrote to memory of 4884 3688 chrome.exe 87 PID 3688 wrote to memory of 4884 3688 chrome.exe 87 PID 3688 wrote to memory of 4884 3688 chrome.exe 87 PID 3688 wrote to memory of 4884 3688 chrome.exe 87 PID 3688 wrote to memory of 4884 3688 chrome.exe 87 PID 3688 wrote to memory of 4884 3688 chrome.exe 87 PID 3688 wrote to memory of 4884 3688 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://goo.gl/maps/Bz55PcrMxjuphjdZA1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad6a39758,0x7ffad6a39768,0x7ffad6a397782⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1780,i,5602731165402445135,17372197393671604809,131072 /prefetch:22⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1780,i,5602731165402445135,17372197393671604809,131072 /prefetch:82⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1780,i,5602731165402445135,17372197393671604809,131072 /prefetch:82⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3176 --field-trial-handle=1780,i,5602731165402445135,17372197393671604809,131072 /prefetch:12⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3196 --field-trial-handle=1780,i,5602731165402445135,17372197393671604809,131072 /prefetch:12⤵PID:4152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4480 --field-trial-handle=1780,i,5602731165402445135,17372197393671604809,131072 /prefetch:12⤵PID:700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 --field-trial-handle=1780,i,5602731165402445135,17372197393671604809,131072 /prefetch:82⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 --field-trial-handle=1780,i,5602731165402445135,17372197393671604809,131072 /prefetch:82⤵PID:1288
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4396
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD56ea2e043c20f81293030dbd65c18906f
SHA12d36fb1e8db40c362f5d4c3a7ac9c78503f0e3b6
SHA256b6e2c90906f5aa2671a30372417f3a250671eb0e7822c0d9706350478137bc12
SHA5128114bdcf8bbbe351075513ad840678daf460b1d9dedcc5ee588e8f47ed4ac118f05ad0922426d3946ff152ab8b47347fc5f132c454a1f71d59bba72cca0969ff
-
Filesize
2KB
MD5071254d8e05084c88e3404f02bdc9179
SHA1c72a91331f80757a7c2727b1ff7b814b3636711a
SHA256c8ed832fb99017e5040600e66e8e23df346b7158fa0851c6fa3b515b4a03b23d
SHA51287be000b005e0ea129d38ea2ec2e5b3eaa0c8bcb3339b0137eadf14e8a275a0131de3c69dcdb958cfc49841aaa5ebbf101002a4b78aefa26b49bf387740b6fe6
-
Filesize
539B
MD5054d94505f8e8c99ad2240b45ea20911
SHA14748fa8759c873b6db1654719b4136ee19848692
SHA2567eb9a7646a6c76d3a03c9d2d189e8dc4e955a64059fae0dcf2f787cce077ccba
SHA512f2e56bb501453ec1cad3c89f5d058ff6c566f990e850944406831bc6d9635d5ffbab397e8daade2f84ba295e64ecffd20614a9b23ce1acf71a89447b33a716a3
-
Filesize
6KB
MD53507cc8278ca957cb31764a5e6b32c44
SHA1fec0be131eaf85a1ea7fe0445b0c558ace2ef94a
SHA256ffbc88096c2df5be0cd5fbb162095c8b665acfe70b24333bf0304d1a0fe7f72e
SHA512c0484e51dfa10ae7c0023cbf655c9a63f00667e615b6b8cc4d1d1a9ee48b3fc56ce81e279beb9ec711b6fea956fd7c49b904fd7922c9869eb17c38ec42983be8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\28da9c56fde4021055a681112c092453f74d8dd8\cd199f8d-634a-4603-8c4e-c280564e1c9b\index-dir\the-real-index
Filesize72B
MD53bbfe1060fc58f5824e7d98e1af82b3e
SHA12070f75d5a16e26ac5764c80f899fb2d4c023c8d
SHA25607a50c8b22b74e25a2ac5047a3577e3d6b839a24b9294c8a23f3dc55d4cb9f90
SHA5122ffd5657af764f7bcdc6fa0c9a37bd1a45db5b75f0b86c798cb39faa7356a86050933397dac7651f4f4bcee41058b7a2e9dc648d01648b5800e20f9e89c4d0c6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\28da9c56fde4021055a681112c092453f74d8dd8\cd199f8d-634a-4603-8c4e-c280564e1c9b\index-dir\the-real-index~RFe57b333.TMP
Filesize48B
MD5ad9df970abf8bc02d0b389361fc0a69b
SHA13dcce653cd934916a8ba722aa32c65c2cfe85ebc
SHA2565b91272d817eb7e9c1e6d204adfaf73373a8df00e3e3f90066eb30c8e5e92c0c
SHA512c9fb904ee51ab8dda71cb6df2c1bb52d186a8a0840bb38ea9f0b20ff6410d6a99267331eec2bf1e5ffc17d677b7bd05761ba8dd4c5edced9d3f30ba74d5c2f87
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\28da9c56fde4021055a681112c092453f74d8dd8\index.txt
Filesize113B
MD537483a29ca4b7876bf256e276247f37f
SHA1a6af0bb4607113503393f72a0be459690ecd910b
SHA2562690dc00a698f3d3b6c5b6783cdad8ccdcaf8821368e084e878e9da3b4bff48c
SHA512f21fb2ece62cea6ced390aec94f5e9edc17920ded1a21e02590e04a798f18115632d665393ad0a52e94933cf7dd3b20115903e8a8b162681f1df31986c264310
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\28da9c56fde4021055a681112c092453f74d8dd8\index.txt~RFe57b362.TMP
Filesize119B
MD5eaec78c6a672924595b53b2dd60539ae
SHA179042baa978c717bc784612953244c9266de22a0
SHA25600b6df1150c16a786890efadebda02a9f876a6aae0447e84d8c9231306600bb6
SHA512b17af056fe2c38b6668c1bfd9b27d463e22c3f0cc4fa03c5ec62504b67ca449018fdf420e4c914dfec3072845fe4e65f364064e294561b7bf42bef2fc838c7d4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5965fc29e13fbbb0f0d6f9880ab52bde1
SHA19250b616484e7f4b8894920455d8324c95e3c10b
SHA2566062bcd1697086f72a176ef704a0a63cfc18b872ddba9c40cc9c47c4ad3f2ae8
SHA512f136f712272d7913ce6116d17504af628177e6268c859ce59eceeef77ce42ece1096a129647a397b167074036c2d8905b3a80869bd55f8dc62b9c0e77eac0739
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57b2b6.TMP
Filesize48B
MD52fabc37683361cd53c98eae07e8568f4
SHA1b60ae914e80139af08747265a6d14e40669be11e
SHA256620e8e4f88310dbb34aa660e4266de5f396a5de757f4db4b06dc05ef186e3239
SHA512f50b696f42efd55e47b23939aa4516a1e2605480a14d3f34aadf0429f982e15a46bf4aee971b1f6b223f19c9524f754510f16cb31c4f2800511cbf0d6865b5b1
-
Filesize
174KB
MD510019deb243dc691cf1699cbef521a70
SHA1755931198cefc4a2fb91ca2701d2206d597b568d
SHA2560c4b0ecbb561ba7da4b1db7dbd4bacb60b8220e107bfad8399d7efd875360a62
SHA512f597f74bbb554604651f6e50b095d016811032f72ac6faa69e25e9828a6e346918d635b12202c43c7e6c49540ad99e7c126905f93270190e08207d82866d9dc4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd