Analysis
-
max time kernel
300s -
max time network
266s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2023, 21:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://files.catbox.moe/5qxu4l.jpg
Resource
win10v2004-20230703-en
General
-
Target
https://files.catbox.moe/5qxu4l.jpg
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133354858953320719" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4824 chrome.exe 4824 chrome.exe 1512 chrome.exe 1512 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4824 chrome.exe 4824 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4824 wrote to memory of 1280 4824 chrome.exe 80 PID 4824 wrote to memory of 1280 4824 chrome.exe 80 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 1540 4824 chrome.exe 82 PID 4824 wrote to memory of 2364 4824 chrome.exe 83 PID 4824 wrote to memory of 2364 4824 chrome.exe 83 PID 4824 wrote to memory of 224 4824 chrome.exe 84 PID 4824 wrote to memory of 224 4824 chrome.exe 84 PID 4824 wrote to memory of 224 4824 chrome.exe 84 PID 4824 wrote to memory of 224 4824 chrome.exe 84 PID 4824 wrote to memory of 224 4824 chrome.exe 84 PID 4824 wrote to memory of 224 4824 chrome.exe 84 PID 4824 wrote to memory of 224 4824 chrome.exe 84 PID 4824 wrote to memory of 224 4824 chrome.exe 84 PID 4824 wrote to memory of 224 4824 chrome.exe 84 PID 4824 wrote to memory of 224 4824 chrome.exe 84 PID 4824 wrote to memory of 224 4824 chrome.exe 84 PID 4824 wrote to memory of 224 4824 chrome.exe 84 PID 4824 wrote to memory of 224 4824 chrome.exe 84 PID 4824 wrote to memory of 224 4824 chrome.exe 84 PID 4824 wrote to memory of 224 4824 chrome.exe 84 PID 4824 wrote to memory of 224 4824 chrome.exe 84 PID 4824 wrote to memory of 224 4824 chrome.exe 84 PID 4824 wrote to memory of 224 4824 chrome.exe 84 PID 4824 wrote to memory of 224 4824 chrome.exe 84 PID 4824 wrote to memory of 224 4824 chrome.exe 84 PID 4824 wrote to memory of 224 4824 chrome.exe 84 PID 4824 wrote to memory of 224 4824 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://files.catbox.moe/5qxu4l.jpg1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa14f09758,0x7ffa14f09768,0x7ffa14f097782⤵PID:1280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1896,i,1649574202600683304,5424334061025840712,131072 /prefetch:22⤵PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1896,i,1649574202600683304,5424334061025840712,131072 /prefetch:82⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1896,i,1649574202600683304,5424334061025840712,131072 /prefetch:82⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3032 --field-trial-handle=1896,i,1649574202600683304,5424334061025840712,131072 /prefetch:12⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1896,i,1649574202600683304,5424334061025840712,131072 /prefetch:12⤵PID:3384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 --field-trial-handle=1896,i,1649574202600683304,5424334061025840712,131072 /prefetch:82⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 --field-trial-handle=1896,i,1649574202600683304,5424334061025840712,131072 /prefetch:82⤵PID:2564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4572 --field-trial-handle=1896,i,1649574202600683304,5424334061025840712,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1512
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5068
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD51655f693fd8817ebc8972c099ac53d63
SHA178b80acd38c24b48db1682ccc5e37149cb692bb4
SHA25660a14859b1539130c6c59013d5a0479e7031183406610f2843e58e736c4264f5
SHA512caabbc2fe8a209b0817ccb278caaca85ab582f8f5253c0e84b5140d776a1bb32a4541734c2781cce86a9422b1d5c9041557137142669b58c519f980cc9a3f4e8
-
Filesize
979B
MD5bf8be08d4e2ce5794439ecf8aee8283e
SHA1fe4c5894edd8786f97982375fd82edf9558844dc
SHA256d19300c1d29249643c7f2fbbe41cbb737728d36f9561e8118f0ee179766fdd3b
SHA512a55f96c8a9305f44555ba9ec7c927efd79645040822ed558492217876a1c895a25ad19bbbebc74d6cc6cf5bd7fa9fd5fb9c397d60634175bdfe3ba1c6090a2af
-
Filesize
704B
MD5bb7d3b4e103265370e63cdd8ad31ab05
SHA114ab1ff28dfd629ef5d17e7a1ec243bb27666e9f
SHA256fc30c6e0ca4f9149ec90a9d096f816c4ffa47e051fc066446f7cfea7315cf32e
SHA5127a2c6210a66fc0a62faf21082d0bb4d0cb3cd74216486c82d3b0c0100c804d0668ebf4f7465dc7561d3a3246db03f5886d6b1bca6b4dcd3f2d800c3b03ee1be7
-
Filesize
705B
MD5fe6ab5434d9cf940f4657eede4f0c7df
SHA110e6f4ee7d6ae374378fbb0ab5b8bb5337411ca6
SHA2565e27d6588d639e5ed5859ead7f8e467f33ee8604d4b3803e5d8e467195447080
SHA5126d383c32ae5c66eb6a12bb8da0c5e89025aa18bd72b083eb49ba990bf389043b8488393343e054d9f951264e288fb532e3f6d2b2d29c3fb56145246708cbca1f
-
Filesize
6KB
MD5cb5ccbc7203e17e27e037c8653e7123c
SHA160e8ec538ebca9df52f013c776cbeff89c1ec7af
SHA25635b731997ba30f836cb1cde039ecd04f879d84584a4ab52810c2a90d65741c16
SHA512430b44bcc0ddbd6461e167fed18a8e2e170c3652196f1e3044efae1442e6b8c74b919e5daeee5ad423fb829d44158dc724e9a67aa10394c168e6cb2728128dd0
-
Filesize
6KB
MD5891342cf61a2e70df671e0cab9a353c5
SHA15a650dc1a723d26e3fb086042f720c6e03f477fa
SHA2563dfa1ad4e1009d02a5c151636b1fac92c7ac0f2e60884e2dcf0405de72fee811
SHA512f10f96a570cbca94a66c5117885186bb951cbd129c906797c57be3a130b461cc6d3e3c3945f30f4fa1b6a3d8df59bef71bac274f19e5792ed1f39c1d4e861c6f
-
Filesize
6KB
MD5e06bebcb97179a48854206f2e2f98310
SHA1e3efb2e080396af1b8c82a1ec97f4a1aab62351e
SHA25691dff95542a6c196de840a3f8b9616a2787405b4db1fb4f096e7cd125e579fd2
SHA512496f5777c2cfc7a040a4e4f1423dd5244137fc1404e9e95311e21dd5ff7df2e7b218c24fa59a8e702bd60b723ca4d6e620ebe2eb7edf478e03fe0d6604ea11e8
-
Filesize
6KB
MD5c75a41bf3c917dff45ddd7b6289d39b4
SHA134a908e4d61a420af22cc4d2ed9fc25642c18ab1
SHA256c12b65f5656635b9f6ac3ad8fd1825f214bdaca77ae989bbde9bade7fedec5a3
SHA512d07b350110db03897c9d68495800407049a9ce2a3b503f372dfe58ad2ce17c21ce3cd191e43f2d180deb102b18222273f2b5b034d248428566ed2a579e406768
-
Filesize
87KB
MD566ba3851f0f42b98bf47a690748a5085
SHA1fdf68fa667de66c7b4fe67031689c28ac4d8d01b
SHA256f2af6aa409ac7d3008e3d54588ff0e647cebebb0a4c10a03ffcd1dd0ff28c3dd
SHA512128368a11ad6708ba9e18b26162c902edbfacfae14feab91235da10807bfbd56d25ac0a1b9fd05e1e96c5ca79730a843011a3b23fa4d6c467ee88590db5e904e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd