Analysis
-
max time kernel
299s -
max time network
273s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2023 16:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://1drv.ms/b/s!Av4LmOyR62qpb-D9Kh2V_PbsgPg
Resource
win10v2004-20230703-en
General
-
Target
https://1drv.ms/b/s!Av4LmOyR62qpb-D9Kh2V_PbsgPg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133333082172737105" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3764 chrome.exe 3764 chrome.exe 404 chrome.exe 404 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3764 wrote to memory of 4700 3764 chrome.exe 85 PID 3764 wrote to memory of 4700 3764 chrome.exe 85 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4992 3764 chrome.exe 88 PID 3764 wrote to memory of 4348 3764 chrome.exe 90 PID 3764 wrote to memory of 4348 3764 chrome.exe 90 PID 3764 wrote to memory of 3948 3764 chrome.exe 89 PID 3764 wrote to memory of 3948 3764 chrome.exe 89 PID 3764 wrote to memory of 3948 3764 chrome.exe 89 PID 3764 wrote to memory of 3948 3764 chrome.exe 89 PID 3764 wrote to memory of 3948 3764 chrome.exe 89 PID 3764 wrote to memory of 3948 3764 chrome.exe 89 PID 3764 wrote to memory of 3948 3764 chrome.exe 89 PID 3764 wrote to memory of 3948 3764 chrome.exe 89 PID 3764 wrote to memory of 3948 3764 chrome.exe 89 PID 3764 wrote to memory of 3948 3764 chrome.exe 89 PID 3764 wrote to memory of 3948 3764 chrome.exe 89 PID 3764 wrote to memory of 3948 3764 chrome.exe 89 PID 3764 wrote to memory of 3948 3764 chrome.exe 89 PID 3764 wrote to memory of 3948 3764 chrome.exe 89 PID 3764 wrote to memory of 3948 3764 chrome.exe 89 PID 3764 wrote to memory of 3948 3764 chrome.exe 89 PID 3764 wrote to memory of 3948 3764 chrome.exe 89 PID 3764 wrote to memory of 3948 3764 chrome.exe 89 PID 3764 wrote to memory of 3948 3764 chrome.exe 89 PID 3764 wrote to memory of 3948 3764 chrome.exe 89 PID 3764 wrote to memory of 3948 3764 chrome.exe 89 PID 3764 wrote to memory of 3948 3764 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://1drv.ms/b/s!Av4LmOyR62qpb-D9Kh2V_PbsgPg1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb49569758,0x7ffb49569768,0x7ffb495697782⤵PID:4700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=384 --field-trial-handle=1952,i,3073826998020625048,15890605894835568666,131072 /prefetch:22⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1952,i,3073826998020625048,15890605894835568666,131072 /prefetch:82⤵PID:3948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1952,i,3073826998020625048,15890605894835568666,131072 /prefetch:82⤵PID:4348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3028 --field-trial-handle=1952,i,3073826998020625048,15890605894835568666,131072 /prefetch:12⤵PID:1212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3016 --field-trial-handle=1952,i,3073826998020625048,15890605894835568666,131072 /prefetch:12⤵PID:1684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4544 --field-trial-handle=1952,i,3073826998020625048,15890605894835568666,131072 /prefetch:12⤵PID:2524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5092 --field-trial-handle=1952,i,3073826998020625048,15890605894835568666,131072 /prefetch:82⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 --field-trial-handle=1952,i,3073826998020625048,15890605894835568666,131072 /prefetch:82⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 --field-trial-handle=1952,i,3073826998020625048,15890605894835568666,131072 /prefetch:82⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4056 --field-trial-handle=1952,i,3073826998020625048,15890605894835568666,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:404
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4476
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD53a80d432df1bfb447f24fa3fab295968
SHA1d88f2d1626bcc0d4cad7b0b480689fbe44731c23
SHA256b50effb90cbb89ce9d409ce5009005b51cda4e2f18314e7d5a17ab9d164adba1
SHA51286065f79cb562b68be3359a9017fbabb76fea30b67fdad796ff978f8556127ff6eaaa7fffa862fda7aa05e4e2609fe7e8a3de343bc165a9ab402f05110eb086f
-
Filesize
2KB
MD57257ad903529c4f5e10a05a0a88ccd0b
SHA1ecd2f70f4377f998da8d74b76a73823361099a47
SHA25626591280b20cf176b994c71dbffa237fe70311033e8d5fe8c9890f8a7b571680
SHA512e9f35adb91b4264223855dacb73b28bf3e25f1b57afcc68d60cb539862be36e3548539a30d45b91b4139023e13251b5c20d1e0593eeec0e1f6b98b05813a5673
-
Filesize
1KB
MD57561f3763dd2151aa20739e701c91540
SHA12147cb09de480f11b41cb2aaad685ca81414a3c2
SHA256c0d15c6ae615799edfe9586ccaf08fbdfb2e639370f7bd298b1feb1681940630
SHA512a11d69fdef84b3ad31b279e620089e32c884e4290d28b944e5f5327da26e69d2335a991839e2b37099a3edb60aad925963ace6000c3d8b0937be74c4a287d377
-
Filesize
1KB
MD57b2337da4dff06ca4f8dc2f2efca71b1
SHA14ae24e8ccd461c95e2aeb2a25b52575adf8115af
SHA2568b658a0ff1cff7a9f4194dd7105116e874fc7b51968c49fb21f7bec89f75ef8a
SHA512502a9f8a0dd1998ecc5cd14f7a9a7250bfc48a5083ef09495dc8639d4477355845e421e67977bb117f720a308359341e278e9482205344cad8d6fb02d9fa0799
-
Filesize
6KB
MD5f5c5928511af0e69337442e9595b9eb0
SHA10d79dbd6ad724e06a047442c3a03417268410f75
SHA256a48c4796812005b69419e8da5a4d35578a149bd14eaadf37e726e9f14b28d88e
SHA5126efd44adb77a1bb8e8560ef0a2c757fba5c2bfd56c99ddc20171c2eb91669047808074902ee5ea24dd5ae5f6e04bca69543f1a45087f3998d8e5499288ae641a
-
Filesize
15KB
MD5d8b5b743483a723daa8aa483340cc296
SHA191d82328010cd9c1b2ef206805b32c2e3ced7c23
SHA25638ca3885685570fe79ca536199fa8c15e89657b28a2b9078687fe2704600f47f
SHA5127efadf77d7858e08161f7a0af3daffe55a58090c9791eaf39651dac7cf3b1cf4307ac5887ca5396ac07e70aa8dd63e307496950d4810614bef0548e2c26acad6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5cedb93d7b1607fe8fe295bc2c45645ec
SHA1516c35093abd3fdb186b8ec818c4b3e9a51c19e7
SHA25678756a77174156b8155b31f01ddcb1d1b40fe295b2edb3deda3012f8b982857a
SHA51211dd6c11222fe3f60e78136d6f41965098ca31b9449f7feb7b7ad9aa9a51fc1856d09b3d9c66c3dece6e8e98dba0a1d25968a4149c8880730a0b8ea1e082dc47
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57c91c.TMP
Filesize48B
MD503331691396ca702f1f992f0599c37e3
SHA18e90c1c887b065ae312132676b0b6ac4495337a7
SHA2568a09b07dfb1c84ab7244d5b0c18194232c08c285b0f2754678b7b873a32d05b5
SHA512f125dbfef74dcdaff7abaa7465ac1cf8e2054d2184d613617c6693014c108eed035afe24e3bea8b0139582199214956982c5f3ff529f422f06f278f98b7d115e
-
Filesize
172KB
MD5a913b03199971efe814ae61923cd090e
SHA1c9fe0f50b6b3e940b43aa09c332d3cc023af912a
SHA2566f1a8440a8feae51757e522834a39fa0002a11d1844f2dc526b4265dc07aef8c
SHA512f25478086e70ea9977ef5e7415dab35108a71dd2d7f28b3c9c4ddebc49ca2038b568093a419c0b1709d11b01198620f21b45402b766397f1ebd532c341fda7b4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd