Analysis
-
max time kernel
611s -
max time network
511s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2023, 17:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://msedgedriver.azureedge.net/114.0.1823.82/edgedriver_win64.zip
Resource
win10v2004-20230703-en
General
-
Target
http://msedgedriver.azureedge.net/114.0.1823.82/edgedriver_win64.zip
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133342622908449132" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4044 chrome.exe 4044 chrome.exe 2272 chrome.exe 2272 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4044 chrome.exe 4044 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4044 wrote to memory of 1920 4044 chrome.exe 85 PID 4044 wrote to memory of 1920 4044 chrome.exe 85 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 5040 4044 chrome.exe 87 PID 4044 wrote to memory of 1900 4044 chrome.exe 88 PID 4044 wrote to memory of 1900 4044 chrome.exe 88 PID 4044 wrote to memory of 4980 4044 chrome.exe 89 PID 4044 wrote to memory of 4980 4044 chrome.exe 89 PID 4044 wrote to memory of 4980 4044 chrome.exe 89 PID 4044 wrote to memory of 4980 4044 chrome.exe 89 PID 4044 wrote to memory of 4980 4044 chrome.exe 89 PID 4044 wrote to memory of 4980 4044 chrome.exe 89 PID 4044 wrote to memory of 4980 4044 chrome.exe 89 PID 4044 wrote to memory of 4980 4044 chrome.exe 89 PID 4044 wrote to memory of 4980 4044 chrome.exe 89 PID 4044 wrote to memory of 4980 4044 chrome.exe 89 PID 4044 wrote to memory of 4980 4044 chrome.exe 89 PID 4044 wrote to memory of 4980 4044 chrome.exe 89 PID 4044 wrote to memory of 4980 4044 chrome.exe 89 PID 4044 wrote to memory of 4980 4044 chrome.exe 89 PID 4044 wrote to memory of 4980 4044 chrome.exe 89 PID 4044 wrote to memory of 4980 4044 chrome.exe 89 PID 4044 wrote to memory of 4980 4044 chrome.exe 89 PID 4044 wrote to memory of 4980 4044 chrome.exe 89 PID 4044 wrote to memory of 4980 4044 chrome.exe 89 PID 4044 wrote to memory of 4980 4044 chrome.exe 89 PID 4044 wrote to memory of 4980 4044 chrome.exe 89 PID 4044 wrote to memory of 4980 4044 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://msedgedriver.azureedge.net/114.0.1823.82/edgedriver_win64.zip1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc9a049758,0x7ffc9a049768,0x7ffc9a0497782⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1856,i,5303633637557653743,10922570490079040709,131072 /prefetch:22⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1856,i,5303633637557653743,10922570490079040709,131072 /prefetch:82⤵PID:1900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1856,i,5303633637557653743,10922570490079040709,131072 /prefetch:82⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2940 --field-trial-handle=1856,i,5303633637557653743,10922570490079040709,131072 /prefetch:12⤵PID:4220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2932 --field-trial-handle=1856,i,5303633637557653743,10922570490079040709,131072 /prefetch:12⤵PID:3556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=1856,i,5303633637557653743,10922570490079040709,131072 /prefetch:82⤵PID:1956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 --field-trial-handle=1856,i,5303633637557653743,10922570490079040709,131072 /prefetch:82⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4840 --field-trial-handle=1856,i,5303633637557653743,10922570490079040709,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4308
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5abac0bd4daafcbb4e64f829126e890f4
SHA19811beea048d5ea731512e72f1d378769ec58fbb
SHA256a62ae68342bb282410ffeddb4d6757a98438e69babaad8babd16eaf7a4739388
SHA51299fdfd31c8522874a0b304cf3c0830e8c75d1fc5af0763a78925e9b04b4c3077a5379602e8512286e785e6b81d715005a1bd0a0a41d03596546222e83bfc0e9c
-
Filesize
1KB
MD54d1183cdf49b577aecf841f5778651e1
SHA1a21b8d0b560bb37df4e5534120cf53c55370cc37
SHA25636c3016fb82185851efcada0c10506c2b2ff4cd73feda4185248d074dbf58887
SHA5126c161fa303fe44ecd4188ed112d14add04eaf473dc5f06376ec3c6c1473421a386a628c04bf5cdb9abc2cc39d3c299acf1e7fa037581c8a7716e1dbb9cdf9a30
-
Filesize
6KB
MD50bceea9666e228aa40439a47262c3321
SHA11058769c1ef1347d8f0fbbdc65029d95aefd8fd6
SHA25601c86147e246a4868d5bf26bf81af9237e09346dcb2ad9a71be776127c8e11ba
SHA512757359a9b1f8b6d4e6d303adad99a4368050a4c5ada3b58a6bac04354e5d5902622f594a308406e936078321a3cdc655d2f968ea8bb0fc6a3934d87b193c0923
-
Filesize
87KB
MD5b62ec87eac884d5cbef5f55291916977
SHA1a3c755e7ccde7238f78a436cf1e0705e7b49fdcd
SHA2569c7da1a043b1f8da981a48faafb748b74a7c985fa9ee405cfceca9be0ae5f286
SHA51269a61dfed184cc044f0e430af56f1e7a121d05384f7c66c02553ea8951e5382b1d330053121405983cf76e4f58336f610987f3e94728de5ad22f9ae2ed841cc3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd