Analysis
-
max time kernel
51s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05-07-2023 16:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://w9zizy3u.page.link/qL6j
Resource
win10v2004-20230703-en
General
-
Target
https://w9zizy3u.page.link/qL6j
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133330487192557434" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 756 chrome.exe 756 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 756 chrome.exe 756 chrome.exe 756 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe Token: SeShutdownPrivilege 756 chrome.exe Token: SeCreatePagefilePrivilege 756 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe 756 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 756 wrote to memory of 1952 756 chrome.exe 46 PID 756 wrote to memory of 1952 756 chrome.exe 46 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 5000 756 chrome.exe 88 PID 756 wrote to memory of 3660 756 chrome.exe 89 PID 756 wrote to memory of 3660 756 chrome.exe 89 PID 756 wrote to memory of 516 756 chrome.exe 90 PID 756 wrote to memory of 516 756 chrome.exe 90 PID 756 wrote to memory of 516 756 chrome.exe 90 PID 756 wrote to memory of 516 756 chrome.exe 90 PID 756 wrote to memory of 516 756 chrome.exe 90 PID 756 wrote to memory of 516 756 chrome.exe 90 PID 756 wrote to memory of 516 756 chrome.exe 90 PID 756 wrote to memory of 516 756 chrome.exe 90 PID 756 wrote to memory of 516 756 chrome.exe 90 PID 756 wrote to memory of 516 756 chrome.exe 90 PID 756 wrote to memory of 516 756 chrome.exe 90 PID 756 wrote to memory of 516 756 chrome.exe 90 PID 756 wrote to memory of 516 756 chrome.exe 90 PID 756 wrote to memory of 516 756 chrome.exe 90 PID 756 wrote to memory of 516 756 chrome.exe 90 PID 756 wrote to memory of 516 756 chrome.exe 90 PID 756 wrote to memory of 516 756 chrome.exe 90 PID 756 wrote to memory of 516 756 chrome.exe 90 PID 756 wrote to memory of 516 756 chrome.exe 90 PID 756 wrote to memory of 516 756 chrome.exe 90 PID 756 wrote to memory of 516 756 chrome.exe 90 PID 756 wrote to memory of 516 756 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://w9zizy3u.page.link/qL6j1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf25c9758,0x7ffaf25c9768,0x7ffaf25c97782⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1612,i,10651383810034385113,16164749779873906588,131072 /prefetch:22⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1612,i,10651383810034385113,16164749779873906588,131072 /prefetch:82⤵PID:3660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1612,i,10651383810034385113,16164749779873906588,131072 /prefetch:82⤵PID:516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2928 --field-trial-handle=1612,i,10651383810034385113,16164749779873906588,131072 /prefetch:12⤵PID:3708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2920 --field-trial-handle=1612,i,10651383810034385113,16164749779873906588,131072 /prefetch:12⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3704 --field-trial-handle=1612,i,10651383810034385113,16164749779873906588,131072 /prefetch:12⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4848 --field-trial-handle=1612,i,10651383810034385113,16164749779873906588,131072 /prefetch:82⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4936 --field-trial-handle=1612,i,10651383810034385113,16164749779873906588,131072 /prefetch:82⤵PID:1620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 --field-trial-handle=1612,i,10651383810034385113,16164749779873906588,131072 /prefetch:82⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4020
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\6aec7de3-e7e7-4cfe-a81c-37edb1b6ca21.tmp
Filesize539B
MD59d321e48fafeeb7de222f22fc245f550
SHA196199a853ff73e123e16cf3fd0c836ec63c9f41e
SHA256fdfc3af637d4054ddbcb9f32f778f04ee822a1b9d60c36046102804d8cf6947e
SHA512224f47735fad3bad00ca50e14aabf97ee87ca0646213d03c02e0822bc551cffb7ab36260857da5eb566ededcfd513e8e630191bc2a03aab7409d1925737920b1
-
Filesize
6KB
MD50c5026be97639ff1151fa5d2df93aff0
SHA128b209909d01dbd0f46470ee4d33519f2090620c
SHA2565d9de5ce15481c09f418dc711d904ef4ea6e049122d1fadb8203c2b81c0298db
SHA512dd118f384276a5a4be362c904688c9d87f2a356ce88f422e63860b1c4f1fc12f77fa9eed4958e71e8fd614841519b918a1090b58c107e645b3a572405e6ef4c4
-
Filesize
15KB
MD5bfbcce4f4ebd8156b6af72f6bd112c5f
SHA1b2a09b985045e2e54b305a838b560b220c84a584
SHA2567f5cd3705301ea78c166e96c8c315803b0ef4020b0118c157eee175d3d50712a
SHA512ce1693987d75a792dc56f769da80ed187b9f07fdc6a57eb4e70a8341519ad0dd6981c7635c2fc5cfc832e73311720c53adfb5b1ca8f8cc8002f42a8bb0832655
-
Filesize
171KB
MD561741b4ee3db1896418be0fdd6096077
SHA11ad0016d0107ca753cf62097752d298a4ee5ff36
SHA256666925f67e1c507e957080c136dd01bcdcbefd29c1b1246aafd0748f49674612
SHA5124d2b0b50937c83807715c2331d29019067ef4f242cfe803476d4243fe80636e1734961eae3cf5c6e054ad11ecbb809a8932acb68fdc881979ca9a198e795d514
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd