Analysis
-
max time kernel
68s -
max time network
69s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-es -
resource tags
arch:x64arch:x86image:win10v2004-20230703-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
07-08-2023 17:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://forms.gle/Kzm819M5kppcJC9q6
Resource
win10v2004-20230703-es
General
-
Target
https://forms.gle/Kzm819M5kppcJC9q6
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133359043983396662" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1498570331-2313266200-788959944-1000\{12F0ED09-9DCF-4AB5-84A2-A2638553451E} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3880 chrome.exe 3880 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3880 wrote to memory of 3716 3880 chrome.exe 81 PID 3880 wrote to memory of 3716 3880 chrome.exe 81 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 1052 3880 chrome.exe 83 PID 3880 wrote to memory of 2208 3880 chrome.exe 84 PID 3880 wrote to memory of 2208 3880 chrome.exe 84 PID 3880 wrote to memory of 4812 3880 chrome.exe 85 PID 3880 wrote to memory of 4812 3880 chrome.exe 85 PID 3880 wrote to memory of 4812 3880 chrome.exe 85 PID 3880 wrote to memory of 4812 3880 chrome.exe 85 PID 3880 wrote to memory of 4812 3880 chrome.exe 85 PID 3880 wrote to memory of 4812 3880 chrome.exe 85 PID 3880 wrote to memory of 4812 3880 chrome.exe 85 PID 3880 wrote to memory of 4812 3880 chrome.exe 85 PID 3880 wrote to memory of 4812 3880 chrome.exe 85 PID 3880 wrote to memory of 4812 3880 chrome.exe 85 PID 3880 wrote to memory of 4812 3880 chrome.exe 85 PID 3880 wrote to memory of 4812 3880 chrome.exe 85 PID 3880 wrote to memory of 4812 3880 chrome.exe 85 PID 3880 wrote to memory of 4812 3880 chrome.exe 85 PID 3880 wrote to memory of 4812 3880 chrome.exe 85 PID 3880 wrote to memory of 4812 3880 chrome.exe 85 PID 3880 wrote to memory of 4812 3880 chrome.exe 85 PID 3880 wrote to memory of 4812 3880 chrome.exe 85 PID 3880 wrote to memory of 4812 3880 chrome.exe 85 PID 3880 wrote to memory of 4812 3880 chrome.exe 85 PID 3880 wrote to memory of 4812 3880 chrome.exe 85 PID 3880 wrote to memory of 4812 3880 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://forms.gle/Kzm819M5kppcJC9q61⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff81e139758,0x7ff81e139768,0x7ff81e1397782⤵PID:3716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1948,i,2839512427183560307,13438479259058967225,131072 /prefetch:22⤵PID:1052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1948,i,2839512427183560307,13438479259058967225,131072 /prefetch:82⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1948,i,2839512427183560307,13438479259058967225,131072 /prefetch:82⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3160 --field-trial-handle=1948,i,2839512427183560307,13438479259058967225,131072 /prefetch:12⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3180 --field-trial-handle=1948,i,2839512427183560307,13438479259058967225,131072 /prefetch:12⤵PID:564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4576 --field-trial-handle=1948,i,2839512427183560307,13438479259058967225,131072 /prefetch:12⤵PID:3196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4740 --field-trial-handle=1948,i,2839512427183560307,13438479259058967225,131072 /prefetch:12⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=1948,i,2839512427183560307,13438479259058967225,131072 /prefetch:82⤵
- Modifies registry class
PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4852 --field-trial-handle=1948,i,2839512427183560307,13438479259058967225,131072 /prefetch:82⤵PID:3576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 --field-trial-handle=1948,i,2839512427183560307,13438479259058967225,131072 /prefetch:82⤵PID:2352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3844 --field-trial-handle=1948,i,2839512427183560307,13438479259058967225,131072 /prefetch:82⤵PID:1944
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4500
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD5a50d224209e590d9962e8e3364f1d25e
SHA18bf1f5df0398869ec72430525f5d6493391f99e8
SHA25687d0ce843308705357e7d9740e31b8ce1915a917f6f9d65a7ec4b5eee433921c
SHA512694c6b6c747340aeb2935de3976306073a32f1bf4710a21b6f838274bedf6f501eac693afacd92a6c236e76fa23d13023b97973bcf1f35de40284806b7c65d2b
-
Filesize
371B
MD57327699f0cffedba691adc424029f5db
SHA170c7f85d0963d842e5bd9032b52c70b620337364
SHA256a6d00024ab20b7aa71f3a7258405c06fc7d7ae5fad04833fa7e967eb6783d93b
SHA512c71095fd43fbac782b33c873bf416ccb4f29e010a1915070e7ca53fedf8f799bddc660138b3a9c3370dde319fb1fe5ab5b49206224f2c6f5e968053fb0bc9fcb
-
Filesize
6KB
MD5fda4c5c585f441166d36d0de0526ff06
SHA1142b9c36c5517306f19a819d3314d17e4f3c2f0a
SHA2567387d4b6ac7a5448848709af51646c461518a1c7552e909be299ae6dfa37a9e2
SHA512336c42efac64e45f18b8feeb56126b0c6c610f88b0754b08c955304e041d9b0ef7aace517bf80a8fcb1e211e2dcc2ea9f58ba5c2aa1964c2cd88beb45cee68e1
-
Filesize
6KB
MD5120d96fc2f52017a7e86dce9c438e4f7
SHA12f785f822ca997b2353cb894f8d955d83a09498d
SHA2563de3aeb63c902d0f20f6ca8a5cb0cf7d980c7c2f852746b58fbaff4001ded8c4
SHA5125e4e0c543373d15d34f8f5d4b92fe4cf4e2cb4117835c00930266ee23485e6450c5bd3045737f9e43614ff8345e07e88e3b797a32e952ae248a3fa55e35bd85e
-
Filesize
171KB
MD5ecf2f4f54134207a572a577b7d082548
SHA187411c78352e8a6a1d3f2095c9c088a534865ebb
SHA25667ac52736a0889dea87419e3ca479d089e2393930d4f68332e81b2ed58c40121
SHA5127e7fc51df0064cd1a7d409925c5c065d12acf0debc6bb27ab5f66ed81f27e32ff848c08364b847bb5a36afbae56771e2db6a27167a40ef36a1469dc8999518f3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd