Analysis
-
max time kernel
44s -
max time network
20s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
19-07-2023 13:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://stats.g.doubleclick.net/j/collect?t=dc&aip=1&_r=3&v=1&_v=j101&tid=UA-63843191-3&cid=238420043.1689716761&jid=1684882750&gjid=475424152&_gid=1033791492.1689716761&_u=aADAAEAAQAAAACAAI~&z=1166268283
Resource
win10-20230703-en
General
-
Target
http://stats.g.doubleclick.net/j/collect?t=dc&aip=1&_r=3&v=1&_v=j101&tid=UA-63843191-3&cid=238420043.1689716761&jid=1684882750&gjid=475424152&_gid=1033791492.1689716761&_u=aADAAEAAQAAAACAAI~&z=1166268283
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133342483754235365" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5036 chrome.exe 5036 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5036 chrome.exe 5036 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5036 wrote to memory of 4544 5036 chrome.exe 69 PID 5036 wrote to memory of 4544 5036 chrome.exe 69 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 3596 5036 chrome.exe 73 PID 5036 wrote to memory of 2720 5036 chrome.exe 72 PID 5036 wrote to memory of 2720 5036 chrome.exe 72 PID 5036 wrote to memory of 4208 5036 chrome.exe 71 PID 5036 wrote to memory of 4208 5036 chrome.exe 71 PID 5036 wrote to memory of 4208 5036 chrome.exe 71 PID 5036 wrote to memory of 4208 5036 chrome.exe 71 PID 5036 wrote to memory of 4208 5036 chrome.exe 71 PID 5036 wrote to memory of 4208 5036 chrome.exe 71 PID 5036 wrote to memory of 4208 5036 chrome.exe 71 PID 5036 wrote to memory of 4208 5036 chrome.exe 71 PID 5036 wrote to memory of 4208 5036 chrome.exe 71 PID 5036 wrote to memory of 4208 5036 chrome.exe 71 PID 5036 wrote to memory of 4208 5036 chrome.exe 71 PID 5036 wrote to memory of 4208 5036 chrome.exe 71 PID 5036 wrote to memory of 4208 5036 chrome.exe 71 PID 5036 wrote to memory of 4208 5036 chrome.exe 71 PID 5036 wrote to memory of 4208 5036 chrome.exe 71 PID 5036 wrote to memory of 4208 5036 chrome.exe 71 PID 5036 wrote to memory of 4208 5036 chrome.exe 71 PID 5036 wrote to memory of 4208 5036 chrome.exe 71 PID 5036 wrote to memory of 4208 5036 chrome.exe 71 PID 5036 wrote to memory of 4208 5036 chrome.exe 71 PID 5036 wrote to memory of 4208 5036 chrome.exe 71 PID 5036 wrote to memory of 4208 5036 chrome.exe 71
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://stats.g.doubleclick.net/j/collect?t=dc&aip=1&_r=3&v=1&_v=j101&tid=UA-63843191-3&cid=238420043.1689716761&jid=1684882750&gjid=475424152&_gid=1033791492.1689716761&_u=aADAAEAAQAAAACAAI~&z=11662682831⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffd1f389758,0x7ffd1f389768,0x7ffd1f3897782⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1964 --field-trial-handle=1852,i,6189721506834385014,8785525794425896842,131072 /prefetch:82⤵PID:4208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1776 --field-trial-handle=1852,i,6189721506834385014,8785525794425896842,131072 /prefetch:82⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1516 --field-trial-handle=1852,i,6189721506834385014,8785525794425896842,131072 /prefetch:22⤵PID:3596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2708 --field-trial-handle=1852,i,6189721506834385014,8785525794425896842,131072 /prefetch:12⤵PID:996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2688 --field-trial-handle=1852,i,6189721506834385014,8785525794425896842,131072 /prefetch:12⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4144 --field-trial-handle=1852,i,6189721506834385014,8785525794425896842,131072 /prefetch:82⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4244 --field-trial-handle=1852,i,6189721506834385014,8785525794425896842,131072 /prefetch:82⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3284
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD55bf7253e38192f4e9d6ca78e9ca6cd28
SHA104afc75acdf2503eb579de7aac3c71a215bf772d
SHA2563807316529c3b19e36faed14a90c8ffa7f2326f8a976ae68b15165616fee3356
SHA51261f10a2ef2756fc91e9080024437fffa7b497926236f081bb591cbdb207e1012789996826ba6a1ec29412688d15ddde50e51c8c1a8ddbc6e5e3c60ed8656084c
-
Filesize
5KB
MD572ea43198e64bf5ea3140e9618dbe2cb
SHA11f3c23d4bbeabe171a3548c23e340e9a49edaf34
SHA256711f1ac5c57e7a264fec562c1854161be7dab25e4923d50247e8cb783e4942d2
SHA512cf827f88e0c5fb472b3c71629c7c8de0d7c6caa0644224b6765e5f5fe2f17f9de1e4bbb34ee7d483231e13c7250d11b5bc71f5c2cdb2919a2b2cc3de00af36a5
-
Filesize
87KB
MD585650b0572011243920a24014ab8b699
SHA1438d0483697730a972dcf22ea50a6feebe3af570
SHA256503028ccbddb1dca8c97a2b44650fb97b36891d7bc1f0a82cacc6d4bdd267dc9
SHA5128794cddd6433df74c15a55ebef485e780c94c4df768563c08661120d6f828f8ca2a18e2162e356cd6499cb52be2dcff8687ab02da28ec3cfec13ff82a66df90e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd