Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05-07-2023 16:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://google.com/#d2xlZUrBldm9sZW5f0aGVhbHRoLmNvbQ==
Resource
win10v2004-20230703-en
General
-
Target
https://google.com/#d2xlZUrBldm9sZW5f0aGVhbHRoLmNvbQ==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5060 chrome.exe 5060 chrome.exe 2992 chrome.exe 2992 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5060 wrote to memory of 1200 5060 chrome.exe 80 PID 5060 wrote to memory of 1200 5060 chrome.exe 80 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 3832 5060 chrome.exe 84 PID 5060 wrote to memory of 2980 5060 chrome.exe 82 PID 5060 wrote to memory of 2980 5060 chrome.exe 82 PID 5060 wrote to memory of 1248 5060 chrome.exe 83 PID 5060 wrote to memory of 1248 5060 chrome.exe 83 PID 5060 wrote to memory of 1248 5060 chrome.exe 83 PID 5060 wrote to memory of 1248 5060 chrome.exe 83 PID 5060 wrote to memory of 1248 5060 chrome.exe 83 PID 5060 wrote to memory of 1248 5060 chrome.exe 83 PID 5060 wrote to memory of 1248 5060 chrome.exe 83 PID 5060 wrote to memory of 1248 5060 chrome.exe 83 PID 5060 wrote to memory of 1248 5060 chrome.exe 83 PID 5060 wrote to memory of 1248 5060 chrome.exe 83 PID 5060 wrote to memory of 1248 5060 chrome.exe 83 PID 5060 wrote to memory of 1248 5060 chrome.exe 83 PID 5060 wrote to memory of 1248 5060 chrome.exe 83 PID 5060 wrote to memory of 1248 5060 chrome.exe 83 PID 5060 wrote to memory of 1248 5060 chrome.exe 83 PID 5060 wrote to memory of 1248 5060 chrome.exe 83 PID 5060 wrote to memory of 1248 5060 chrome.exe 83 PID 5060 wrote to memory of 1248 5060 chrome.exe 83 PID 5060 wrote to memory of 1248 5060 chrome.exe 83 PID 5060 wrote to memory of 1248 5060 chrome.exe 83 PID 5060 wrote to memory of 1248 5060 chrome.exe 83 PID 5060 wrote to memory of 1248 5060 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://google.com/#d2xlZUrBldm9sZW5f0aGVhbHRoLmNvbQ==1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff913769758,0x7ff913769768,0x7ff9137697782⤵PID:1200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1916,i,17903773171419943661,15151812001978784038,131072 /prefetch:82⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1916,i,17903773171419943661,15151812001978784038,131072 /prefetch:82⤵PID:1248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1916,i,17903773171419943661,15151812001978784038,131072 /prefetch:22⤵PID:3832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3036 --field-trial-handle=1916,i,17903773171419943661,15151812001978784038,131072 /prefetch:12⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3028 --field-trial-handle=1916,i,17903773171419943661,15151812001978784038,131072 /prefetch:12⤵PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4532 --field-trial-handle=1916,i,17903773171419943661,15151812001978784038,131072 /prefetch:12⤵PID:1076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 --field-trial-handle=1916,i,17903773171419943661,15151812001978784038,131072 /prefetch:82⤵PID:4244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5008 --field-trial-handle=1916,i,17903773171419943661,15151812001978784038,131072 /prefetch:82⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 --field-trial-handle=1916,i,17903773171419943661,15151812001978784038,131072 /prefetch:82⤵PID:2256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2672 --field-trial-handle=1916,i,17903773171419943661,15151812001978784038,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2992
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4424
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD5e1c7cdb6c63152e7ac3d6c3290721b07
SHA1553bb59d77ee2d9cbb006d9dad33a9fb09ca7083
SHA256957299f0ba79a42559c33073eea27dda60176791faddbba4a77a5ff83645d929
SHA512f3b73ce5cd0782878c6f0cebe410b5ba7f93c2c7e5d1db0d86a9f4df6e0d68fa23cbb85aef27b96e23b6bf3f4f894f70489a009a45cb26b8472b607939125b47
-
Filesize
2KB
MD56eadfa0094032372a91def1fd25161f8
SHA141681a77fd1697ae02309ba4c3800ccc12871cbd
SHA2567fb71ac1a579f0a7dabd4f5d1230ce56cbbbd375a0f6ac146595345073a3af4a
SHA51280af83c67ad6872dad714029381fe0ac1892c3608dfc2beff6dfbb0e65711b7113b18e41d4bc3cb2ce66b2cd93a3a205c3eaa6e759c841e8ac60687954606ef0
-
Filesize
539B
MD535f51f38828b89727e7918de784f8cc5
SHA14bc7cf7ba51f371c51babc403995b6fb2b85fa1c
SHA2568ea1d71a3530aa99d3236e2225886c5b8a6f7b2788ccb93d342544a28387bfcb
SHA51238fa3c2705d999744036aaaf9a3b4476b6fbe6305993f8be2c22e2794b6d79b019807a016c1a5a091bf0df9a3343081fcf79729e51827caab62994ce6261be83
-
Filesize
6KB
MD53e01721fb6c0c8c3105b208e939f7b00
SHA1447db7bd03f1b77273d71204c369accc1a411d25
SHA2562a80aad63de3bbf9316e4bc6db519647051b38303f510015153aad331adbe7ef
SHA512f5620563436f69b9272527f8a84abcc102c39acca1ec63275189f33c2504b13987b7e2619ffb78e74998c76f55adfbae02439ff4c69c1582f735b16b6a5e2e82
-
Filesize
171KB
MD5a49319150bcda281280a237be7116fac
SHA1ecc443651601f709d73d324f6e00881cf5377805
SHA25670c0885e2e111e92f9e65f617657d0cc65b512a4fde5383cba2ff5a8506342a6
SHA512f2113c825b346367a4ca0d011aee36a4ca614022c74e5d00468c35c36f0c04edd3bfbaf0456477d39a45b57c6a098fa7d22cba49591dd1247fc1a82cf07e9f41
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd