Analysis
-
max time kernel
26s -
max time network
30s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2023 15:43
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://tinyurl.com/3wuas8um/[email protected]
Resource
win10v2004-20230703-en
General
-
Target
https://tinyurl.com/3wuas8um/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133338230068940278" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2840 chrome.exe 2840 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2840 wrote to memory of 1068 2840 chrome.exe 83 PID 2840 wrote to memory of 1068 2840 chrome.exe 83 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 4968 2840 chrome.exe 86 PID 2840 wrote to memory of 340 2840 chrome.exe 87 PID 2840 wrote to memory of 340 2840 chrome.exe 87 PID 2840 wrote to memory of 840 2840 chrome.exe 88 PID 2840 wrote to memory of 840 2840 chrome.exe 88 PID 2840 wrote to memory of 840 2840 chrome.exe 88 PID 2840 wrote to memory of 840 2840 chrome.exe 88 PID 2840 wrote to memory of 840 2840 chrome.exe 88 PID 2840 wrote to memory of 840 2840 chrome.exe 88 PID 2840 wrote to memory of 840 2840 chrome.exe 88 PID 2840 wrote to memory of 840 2840 chrome.exe 88 PID 2840 wrote to memory of 840 2840 chrome.exe 88 PID 2840 wrote to memory of 840 2840 chrome.exe 88 PID 2840 wrote to memory of 840 2840 chrome.exe 88 PID 2840 wrote to memory of 840 2840 chrome.exe 88 PID 2840 wrote to memory of 840 2840 chrome.exe 88 PID 2840 wrote to memory of 840 2840 chrome.exe 88 PID 2840 wrote to memory of 840 2840 chrome.exe 88 PID 2840 wrote to memory of 840 2840 chrome.exe 88 PID 2840 wrote to memory of 840 2840 chrome.exe 88 PID 2840 wrote to memory of 840 2840 chrome.exe 88 PID 2840 wrote to memory of 840 2840 chrome.exe 88 PID 2840 wrote to memory of 840 2840 chrome.exe 88 PID 2840 wrote to memory of 840 2840 chrome.exe 88 PID 2840 wrote to memory of 840 2840 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://tinyurl.com/3wuas8um/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffcd65a9758,0x7ffcd65a9768,0x7ffcd65a97782⤵PID:1068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1764,i,11741064797707729074,8001225259697994318,131072 /prefetch:22⤵PID:4968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1764,i,11741064797707729074,8001225259697994318,131072 /prefetch:82⤵PID:340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1764,i,11741064797707729074,8001225259697994318,131072 /prefetch:82⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3176 --field-trial-handle=1764,i,11741064797707729074,8001225259697994318,131072 /prefetch:12⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3208 --field-trial-handle=1764,i,11741064797707729074,8001225259697994318,131072 /prefetch:12⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=5012 --field-trial-handle=1764,i,11741064797707729074,8001225259697994318,131072 /prefetch:12⤵PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3792 --field-trial-handle=1764,i,11741064797707729074,8001225259697994318,131072 /prefetch:82⤵PID:692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5556 --field-trial-handle=1764,i,11741064797707729074,8001225259697994318,131072 /prefetch:12⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5524 --field-trial-handle=1764,i,11741064797707729074,8001225259697994318,131072 /prefetch:82⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4196
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
171KB
MD57a88e1edbba1ad7bd345eb14f1377a59
SHA1b299cf2eacc2d17d1f2fbda9391079b6f05fb022
SHA2563f6aa29738172f431b8e2af2e39cba0c2f91583d7bc23f988c7b7b35975bef2c
SHA51248870540a5e7aedf4513610e23dad5d37ff48dde92909345771f7235d4526893e65d11915b46191e62dbe6e9bed4626215703fc90932bdebed356568c1557f95
-
Filesize
539B
MD505ce563c8974ccee7130e39bbb695725
SHA1485ec91e13d0cadde85146e5f22a644dfb654410
SHA25676c66fd8d7bf4a5018850a5978a40bd4d24805ec6ad239ea22db2719a9f2346a
SHA512b2560057bfdcb2443a262c013230feaca3f31312c02d43a484b03ba18b34453ae020e6d5965a8c2af252e82549642d75c4b1537e3d9e1b807c2ff98cb9620c02
-
Filesize
5KB
MD57bd4555682885d29ceadf7a8b588e38e
SHA12437028679444f58fc405b6adbc83365678cc15c
SHA256d9d959b98db8fe3728e9475b4e11943e1bba5fba85c0d3172ad9c96d4580bc7a
SHA512f5ceb68e8f2146c994ad78721097c0c4d1b24a3758783d479c7959830b2c387e002d0b5dd2b930615a79305925dce1e2217d5032d357020e387b506581b96566
-
Filesize
87KB
MD516498aa15c4ca45a20eaf6c744f6d1f3
SHA1c144e2d0e19c040a99c4892b8bf6fae6cab313f0
SHA2569d1188dcb0da6215ba6e133a9d3c1437c1329f6f4656ca4ba9294b776035cdb3
SHA512205c686dac2fe27824c57b617e5786bf2cfd12898b86b9f205c14302948ec8c928e6eb00cdc1e8270094c6185d1d15e141d43cdc4a3b94ab9d5aaa618ec544fb
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd