Analysis
-
max time kernel
25s -
max time network
27s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2023, 13:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://t.co/Pm9lPK7jHD
Resource
win10v2004-20230621-en
General
-
Target
https://t.co/Pm9lPK7jHD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133328663725972177" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3524 chrome.exe 3524 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe Token: SeShutdownPrivilege 3524 chrome.exe Token: SeCreatePagefilePrivilege 3524 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe 3524 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3524 wrote to memory of 1512 3524 chrome.exe 86 PID 3524 wrote to memory of 1512 3524 chrome.exe 86 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 4336 3524 chrome.exe 87 PID 3524 wrote to memory of 2144 3524 chrome.exe 88 PID 3524 wrote to memory of 2144 3524 chrome.exe 88 PID 3524 wrote to memory of 1756 3524 chrome.exe 89 PID 3524 wrote to memory of 1756 3524 chrome.exe 89 PID 3524 wrote to memory of 1756 3524 chrome.exe 89 PID 3524 wrote to memory of 1756 3524 chrome.exe 89 PID 3524 wrote to memory of 1756 3524 chrome.exe 89 PID 3524 wrote to memory of 1756 3524 chrome.exe 89 PID 3524 wrote to memory of 1756 3524 chrome.exe 89 PID 3524 wrote to memory of 1756 3524 chrome.exe 89 PID 3524 wrote to memory of 1756 3524 chrome.exe 89 PID 3524 wrote to memory of 1756 3524 chrome.exe 89 PID 3524 wrote to memory of 1756 3524 chrome.exe 89 PID 3524 wrote to memory of 1756 3524 chrome.exe 89 PID 3524 wrote to memory of 1756 3524 chrome.exe 89 PID 3524 wrote to memory of 1756 3524 chrome.exe 89 PID 3524 wrote to memory of 1756 3524 chrome.exe 89 PID 3524 wrote to memory of 1756 3524 chrome.exe 89 PID 3524 wrote to memory of 1756 3524 chrome.exe 89 PID 3524 wrote to memory of 1756 3524 chrome.exe 89 PID 3524 wrote to memory of 1756 3524 chrome.exe 89 PID 3524 wrote to memory of 1756 3524 chrome.exe 89 PID 3524 wrote to memory of 1756 3524 chrome.exe 89 PID 3524 wrote to memory of 1756 3524 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://t.co/Pm9lPK7jHD1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffc6a539758,0x7ffc6a539768,0x7ffc6a5397782⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1816,i,3054322753875687053,5843738497145442656,131072 /prefetch:22⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1816,i,3054322753875687053,5843738497145442656,131072 /prefetch:82⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1816,i,3054322753875687053,5843738497145442656,131072 /prefetch:82⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3220 --field-trial-handle=1816,i,3054322753875687053,5843738497145442656,131072 /prefetch:12⤵PID:3692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3224 --field-trial-handle=1816,i,3054322753875687053,5843738497145442656,131072 /prefetch:12⤵PID:3392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4532 --field-trial-handle=1816,i,3054322753875687053,5843738497145442656,131072 /prefetch:12⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3484 --field-trial-handle=1816,i,3054322753875687053,5843738497145442656,131072 /prefetch:12⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4772 --field-trial-handle=1816,i,3054322753875687053,5843738497145442656,131072 /prefetch:12⤵PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 --field-trial-handle=1816,i,3054322753875687053,5843738497145442656,131072 /prefetch:82⤵PID:380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5392 --field-trial-handle=1816,i,3054322753875687053,5843738497145442656,131072 /prefetch:82⤵PID:1672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 --field-trial-handle=1816,i,3054322753875687053,5843738497145442656,131072 /prefetch:82⤵PID:448
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1528
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD50dfa42a9998fe7733745a906fd39cfa9
SHA1ed96301b95c52f7ac656fd5632adad35895f24ba
SHA256f8b9112ddede14d36d03cf4b697d83e2dd3e112a95b566531866778cd669a93c
SHA512ed7aac051084efbec3302448df67f89babd3e0fd7da31493e7caa10e047fbcf2f9190aeec6300ab702c9fe065ecc0f8e5ae7804aa0898cfb9d317ff59a3f178f
-
Filesize
6KB
MD504a0f5353c9c306fc5029392118a77ad
SHA1d6056fff08aa56bc93f9faa74347615279745d9e
SHA256a762b787c375d5ba69572482469329019955d423e0bf9964970f0269841645c3
SHA512a9899de3dab7c2fd08673e207c43547696ec9a0792335828904d7b9043ef16befcbf5f644e932d422ad25f013c2e87c47406ad8bc676cb8463c37a14109af4f5
-
Filesize
15KB
MD5982fbebb74714b36f638d9f3b600c513
SHA1bf02de457a99d450796715bfe397289a144703ba
SHA2567cd1e4e9141ed1c7f90b4e5f9cdd797aba1cd4a4b3e0bf7682bad7f53d9ec2ef
SHA5121c47c01e699c3ead9fbfead4094438aa2ba2e34f23e37d762c4d33188caab288721af627ef8af4e4a4253f6abbe625ac2a568e055425cda1d94e15a09cedb00f
-
Filesize
15KB
MD50f9cffa4c7d38aa2d65198730fc7f671
SHA120c073a03040a1a5a45d89a2059f8157f41d314f
SHA2569a6c24c23fb0e0a1ab03fd10344a53f6b508356ad3184d5aaa196f0863ee4026
SHA512fb65c41fdb04631765cc97039ac4a702da2fbbcf9f3259146a04b91b3d5ce70664f79cbb30d012449b03fae0ed9372854295f1640daadb0ca09dc025fcbd491f
-
Filesize
172KB
MD5e8326ec7a8d51e9308aaf35519cd206e
SHA183095bd1988a6165b96930585871ab28cf855070
SHA2561d6b92a4099d08b71448271afe4819c4f11d1f656293ab8e1cb8436784e80ae7
SHA512008be7b4cbb42c882a1d3d33cc2a08867eea005eff58afb48e811708bfec27582c00cbda82a72a3e85932134292cce6a83c5db281bf4da660566f66fa5a29024
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd