Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
02/08/2023, 07:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://video.twimg.com
Resource
win10-20230703-en
General
-
Target
http://video.twimg.com
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133354365977602623" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3672 chrome.exe 3672 chrome.exe 4600 chrome.exe 4600 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3672 wrote to memory of 3660 3672 chrome.exe 70 PID 3672 wrote to memory of 3660 3672 chrome.exe 70 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2060 3672 chrome.exe 76 PID 3672 wrote to memory of 2092 3672 chrome.exe 72 PID 3672 wrote to memory of 2092 3672 chrome.exe 72 PID 3672 wrote to memory of 3840 3672 chrome.exe 73 PID 3672 wrote to memory of 3840 3672 chrome.exe 73 PID 3672 wrote to memory of 3840 3672 chrome.exe 73 PID 3672 wrote to memory of 3840 3672 chrome.exe 73 PID 3672 wrote to memory of 3840 3672 chrome.exe 73 PID 3672 wrote to memory of 3840 3672 chrome.exe 73 PID 3672 wrote to memory of 3840 3672 chrome.exe 73 PID 3672 wrote to memory of 3840 3672 chrome.exe 73 PID 3672 wrote to memory of 3840 3672 chrome.exe 73 PID 3672 wrote to memory of 3840 3672 chrome.exe 73 PID 3672 wrote to memory of 3840 3672 chrome.exe 73 PID 3672 wrote to memory of 3840 3672 chrome.exe 73 PID 3672 wrote to memory of 3840 3672 chrome.exe 73 PID 3672 wrote to memory of 3840 3672 chrome.exe 73 PID 3672 wrote to memory of 3840 3672 chrome.exe 73 PID 3672 wrote to memory of 3840 3672 chrome.exe 73 PID 3672 wrote to memory of 3840 3672 chrome.exe 73 PID 3672 wrote to memory of 3840 3672 chrome.exe 73 PID 3672 wrote to memory of 3840 3672 chrome.exe 73 PID 3672 wrote to memory of 3840 3672 chrome.exe 73 PID 3672 wrote to memory of 3840 3672 chrome.exe 73 PID 3672 wrote to memory of 3840 3672 chrome.exe 73
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://video.twimg.com1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb46c09758,0x7ffb46c09768,0x7ffb46c097782⤵PID:3660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1924 --field-trial-handle=1348,i,2859718184795440523,2882239907897356002,131072 /prefetch:82⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1628 --field-trial-handle=1348,i,2859718184795440523,2882239907897356002,131072 /prefetch:82⤵PID:3840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2688 --field-trial-handle=1348,i,2859718184795440523,2882239907897356002,131072 /prefetch:12⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2668 --field-trial-handle=1348,i,2859718184795440523,2882239907897356002,131072 /prefetch:12⤵PID:828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=232 --field-trial-handle=1348,i,2859718184795440523,2882239907897356002,131072 /prefetch:22⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3556 --field-trial-handle=1348,i,2859718184795440523,2882239907897356002,131072 /prefetch:12⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3584 --field-trial-handle=1348,i,2859718184795440523,2882239907897356002,131072 /prefetch:82⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4272 --field-trial-handle=1348,i,2859718184795440523,2882239907897356002,131072 /prefetch:82⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3604 --field-trial-handle=1348,i,2859718184795440523,2882239907897356002,131072 /prefetch:12⤵PID:4540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4064 --field-trial-handle=1348,i,2859718184795440523,2882239907897356002,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4568
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5b7f0d13fdb34bc76dba69c11859c81d1
SHA116d28e675f53f78bf57407c8e3ba4b1b1cff0fe0
SHA25671e604a62758d8df599ee8832d9149e016908acd39abb3f047ccd24b5a221899
SHA51228c12e370c9c9148aad39f564af7b5fe22ada23e610bb6631f30f2b2734c30a9c463dd765d62caeb40366ce265292fb1d6e4dd0dd1e3a02496cb0c0b3f02f2e6
-
Filesize
5KB
MD59bd604a3425a83522c112aced489efb6
SHA1d69b2ff1242ac3c3c23474a12c6cc11c14575f60
SHA256e0173cbe5c74f1c2cc5c0eb23db947b25ac5297244c13b03f396b7e5bd74cb47
SHA5129f7763884083bd99d1db2c69fd637c955f4e6064e2d5173f3cb5cad451d8ad324aa02579a97c22b243c427bfc3eb34189eb44d0aa6db9cceb282e9c4db6f9ff2
-
Filesize
5KB
MD521efb79220f2e78fffeb28aae8196c82
SHA1a925d3f0d562b5c32c534d914647e50d3c86a2ee
SHA2563798c7d8d00689ca2f6d232bb82b59e3bc4395e4f082c007fe0ddcfc2c419aa2
SHA5121ee4f5322e903eba39dd0c8fbb1f0fdf9a1012cdf1c1f20481ca0b8fa04b0ba9a31ff87ce6a4b334d587f2a76c2b4fd5606ec021e6e4fc80427e79582e9ca1d4
-
Filesize
87KB
MD576f15eb0f13376548d105654a1eba673
SHA1bb2ed90b8a6247b26b5f601d090efeecf1aeec63
SHA2561ed1fdd1f6f3dc732bfa37c9802681fbc33c993f2370d00de5ff1e756346ff17
SHA51250100ee218159e9ebcddabea0a211512747bef765458d9c2f0f5ee64cd5c3b48a95888d17a7db6ba8a5a5fda3f2da1781ab900d8e10ea095f43017451de345b6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd