Analysis
-
max time kernel
300s -
max time network
283s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2023, 15:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ssl.gstatic.com/ui/v1/icons/mail/images/cleardot.gif
Resource
win10v2004-20230703-en
General
-
Target
https://ssl.gstatic.com/ui/v1/icons/mail/images/cleardot.gif
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133336491375595409" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1296 chrome.exe 1296 chrome.exe 2468 chrome.exe 2468 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1296 chrome.exe 1296 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1296 wrote to memory of 4688 1296 chrome.exe 30 PID 1296 wrote to memory of 4688 1296 chrome.exe 30 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2016 1296 chrome.exe 87 PID 1296 wrote to memory of 2368 1296 chrome.exe 88 PID 1296 wrote to memory of 2368 1296 chrome.exe 88 PID 1296 wrote to memory of 3136 1296 chrome.exe 89 PID 1296 wrote to memory of 3136 1296 chrome.exe 89 PID 1296 wrote to memory of 3136 1296 chrome.exe 89 PID 1296 wrote to memory of 3136 1296 chrome.exe 89 PID 1296 wrote to memory of 3136 1296 chrome.exe 89 PID 1296 wrote to memory of 3136 1296 chrome.exe 89 PID 1296 wrote to memory of 3136 1296 chrome.exe 89 PID 1296 wrote to memory of 3136 1296 chrome.exe 89 PID 1296 wrote to memory of 3136 1296 chrome.exe 89 PID 1296 wrote to memory of 3136 1296 chrome.exe 89 PID 1296 wrote to memory of 3136 1296 chrome.exe 89 PID 1296 wrote to memory of 3136 1296 chrome.exe 89 PID 1296 wrote to memory of 3136 1296 chrome.exe 89 PID 1296 wrote to memory of 3136 1296 chrome.exe 89 PID 1296 wrote to memory of 3136 1296 chrome.exe 89 PID 1296 wrote to memory of 3136 1296 chrome.exe 89 PID 1296 wrote to memory of 3136 1296 chrome.exe 89 PID 1296 wrote to memory of 3136 1296 chrome.exe 89 PID 1296 wrote to memory of 3136 1296 chrome.exe 89 PID 1296 wrote to memory of 3136 1296 chrome.exe 89 PID 1296 wrote to memory of 3136 1296 chrome.exe 89 PID 1296 wrote to memory of 3136 1296 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://ssl.gstatic.com/ui/v1/icons/mail/images/cleardot.gif1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb2a879758,0x7ffb2a879768,0x7ffb2a8797782⤵PID:4688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1896,i,8864449591003568938,7235391073303509366,131072 /prefetch:22⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1896,i,8864449591003568938,7235391073303509366,131072 /prefetch:82⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1896,i,8864449591003568938,7235391073303509366,131072 /prefetch:82⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3028 --field-trial-handle=1896,i,8864449591003568938,7235391073303509366,131072 /prefetch:12⤵PID:1252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1896,i,8864449591003568938,7235391073303509366,131072 /prefetch:12⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4848 --field-trial-handle=1896,i,8864449591003568938,7235391073303509366,131072 /prefetch:82⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4896 --field-trial-handle=1896,i,8864449591003568938,7235391073303509366,131072 /prefetch:82⤵PID:2344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 --field-trial-handle=1896,i,8864449591003568938,7235391073303509366,131072 /prefetch:82⤵PID:1720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3892 --field-trial-handle=1896,i,8864449591003568938,7235391073303509366,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3840
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c78ad4e4031f7c040f96809ff3bbced8
SHA1a60a985ae97838e6bcdcaf4c29983bc97b7ffb5b
SHA25638ddb32d376a3c310672275c317ae611b0c4bde8c0c39c08b9db0257c133d51b
SHA512783211c925afdbe23f95d8d88da25c6eb3c5fce3419fb6108275758e15dab3dd42e4a878e73fae1bac50e1cd7eb1f34f4b5ebb261bf6dd04a641fbb291a6fd29
-
Filesize
1KB
MD51216b58c1ace41b3321861549073ef96
SHA131e66e931c5a71cd9fcd32231358ed978ce9e6e2
SHA2568219fc49eb3efa61779bcbfc81b0bdeee622e702800b5e483b0b7d747442b995
SHA512d6781cd3435ade5e6851a007756362f217b7362d5c03b2cb9c3621208c33991f580656b9ba65dcc3ef5b64785ba871dc84cb9819bf1b5b4566ec83563171f065
-
Filesize
6KB
MD55605f01577d22bca4f0870b436899c6e
SHA1737317ee15f6825bf14885f908c2279a89200609
SHA256e26a0781587d4c6190e09aa38e19ffe41689801671675029ef850cae4e1a98f8
SHA512297022e86950552a0f35e0a68dbcf581d84328922cf711e073ce630c04f8511a37802a3e0eb93dcc01219b083642ec05cd07dee08a18e1cc50f759260493a624
-
Filesize
15KB
MD57ca721e2d9a9d0e4437bab577d3c45db
SHA192ccfae7b8100b243a64c20ef988ff11ef4f6435
SHA256f25538f80072324faea50a1c0b536653b6cea99268a9d92f89cdfc8b29ddf2c9
SHA51261f8b25d741d3198f9e17d94e0238c676880d2eee9d9198d4c735af7f7dd40927116a37e5e6a5ad5bce510524edd077f50f57ec73d3b4d268b8e759ddf53da2f
-
Filesize
173KB
MD5f89f53fdadde75ac3afe96c96183aa1c
SHA1f727bfa45c5a93dfdf5115e2c5d3cf489492ff6a
SHA256b542451da770686ebf271bd6115bf7a881019f19208d477d0c6fabc20d58918b
SHA512f3fe3f257e3a5d7e890605ecc891a95cc4a913226511bebb7a8bb9efb3b181e401ebee586ac30b3de01dd1f4e324899b811010b6181a4b296cd4fe99c3f866ed
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd