Analysis
-
max time kernel
46s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2023, 12:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://shorturl.at/bdAFS
Resource
win10v2004-20230703-en
General
-
Target
https://shorturl.at/bdAFS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2244 chrome.exe 2244 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe Token: SeShutdownPrivilege 2244 chrome.exe Token: SeCreatePagefilePrivilege 2244 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe 2244 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2244 wrote to memory of 4628 2244 chrome.exe 78 PID 2244 wrote to memory of 4628 2244 chrome.exe 78 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 4480 2244 chrome.exe 80 PID 2244 wrote to memory of 3308 2244 chrome.exe 81 PID 2244 wrote to memory of 3308 2244 chrome.exe 81 PID 2244 wrote to memory of 548 2244 chrome.exe 82 PID 2244 wrote to memory of 548 2244 chrome.exe 82 PID 2244 wrote to memory of 548 2244 chrome.exe 82 PID 2244 wrote to memory of 548 2244 chrome.exe 82 PID 2244 wrote to memory of 548 2244 chrome.exe 82 PID 2244 wrote to memory of 548 2244 chrome.exe 82 PID 2244 wrote to memory of 548 2244 chrome.exe 82 PID 2244 wrote to memory of 548 2244 chrome.exe 82 PID 2244 wrote to memory of 548 2244 chrome.exe 82 PID 2244 wrote to memory of 548 2244 chrome.exe 82 PID 2244 wrote to memory of 548 2244 chrome.exe 82 PID 2244 wrote to memory of 548 2244 chrome.exe 82 PID 2244 wrote to memory of 548 2244 chrome.exe 82 PID 2244 wrote to memory of 548 2244 chrome.exe 82 PID 2244 wrote to memory of 548 2244 chrome.exe 82 PID 2244 wrote to memory of 548 2244 chrome.exe 82 PID 2244 wrote to memory of 548 2244 chrome.exe 82 PID 2244 wrote to memory of 548 2244 chrome.exe 82 PID 2244 wrote to memory of 548 2244 chrome.exe 82 PID 2244 wrote to memory of 548 2244 chrome.exe 82 PID 2244 wrote to memory of 548 2244 chrome.exe 82 PID 2244 wrote to memory of 548 2244 chrome.exe 82
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://shorturl.at/bdAFS1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff37ac9758,0x7fff37ac9768,0x7fff37ac97782⤵PID:4628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=1868,i,5769054840806724451,7101838104107442965,131072 /prefetch:22⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1868,i,5769054840806724451,7101838104107442965,131072 /prefetch:82⤵PID:3308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1868,i,5769054840806724451,7101838104107442965,131072 /prefetch:82⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2864 --field-trial-handle=1868,i,5769054840806724451,7101838104107442965,131072 /prefetch:12⤵PID:2104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2888 --field-trial-handle=1868,i,5769054840806724451,7101838104107442965,131072 /prefetch:12⤵PID:816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4592 --field-trial-handle=1868,i,5769054840806724451,7101838104107442965,131072 /prefetch:12⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4480 --field-trial-handle=1868,i,5769054840806724451,7101838104107442965,131072 /prefetch:12⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2880 --field-trial-handle=1868,i,5769054840806724451,7101838104107442965,131072 /prefetch:82⤵PID:1328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5108 --field-trial-handle=1868,i,5769054840806724451,7101838104107442965,131072 /prefetch:82⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 --field-trial-handle=1868,i,5769054840806724451,7101838104107442965,131072 /prefetch:82⤵PID:4320
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3180
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD54ca31860b6eb4f0c1c6a12702c5cbab0
SHA10cf71f254145ac3f06d53719a1576d564e746ac9
SHA25660f8ae0f87c0022b50eea7bfa5813909a55a5928c066307b0eb847fabfadb9e7
SHA512c7a6482cd00bd058e1c084f5b5bdc3b072f8bab73be2282a379deef9dd22cac7826d45b17e012412ab193450cf286fcdc1e86a8d3a9ee7241fdd70fb8e184668
-
Filesize
6KB
MD520333c2c7396daaf746a10ffb882e542
SHA1c4ceb80970ee43c661dd7f8cd1e639e025e15d18
SHA256fc6b7d5a58c1abc400f920748072c0e24c4ea5444666ae6c7cbcda0b795f9917
SHA5123991b7f26cf00592896cb66c238dbd9da5e7aebd681cef44d3f58b5573d7eeb12a71bae14d18841dc1dae66352ef58b458595723005d23259be8e87fafff72cb
-
Filesize
171KB
MD59df1d5efa172a2329a29cd57664c278e
SHA1059773e310b08691f12524d88a9a1eb6bd686484
SHA2564a15460bd9196a70d3795c057ce65984c5af3517926e6e68fec2a236c0cf184b
SHA512a1266816749f25dfee777d99d753841d8ce45de87fadbb9160376c2f10a10c910a4aca9e4a99aa158d9ab0f01e923cdb75565e290c923e9438b850909f174b27
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd