Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2023, 07:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://exmail.qq.com/cgi-bin/viewfile?type=signature&picid=ZX2912-rDlpUvAtiHAZDSR6Khz2Haf&uin=704160405
Resource
win10v2004-20230703-en
General
-
Target
https://exmail.qq.com/cgi-bin/viewfile?type=signature&picid=ZX2912-rDlpUvAtiHAZDSR6Khz2Haf&uin=704160405
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133366438836695031" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3356 chrome.exe 3356 chrome.exe 2964 chrome.exe 2964 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3356 chrome.exe 3356 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe Token: SeShutdownPrivilege 3356 chrome.exe Token: SeCreatePagefilePrivilege 3356 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe 3356 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3356 wrote to memory of 3500 3356 chrome.exe 75 PID 3356 wrote to memory of 3500 3356 chrome.exe 75 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 464 3356 chrome.exe 83 PID 3356 wrote to memory of 4800 3356 chrome.exe 85 PID 3356 wrote to memory of 4800 3356 chrome.exe 85 PID 3356 wrote to memory of 3572 3356 chrome.exe 84 PID 3356 wrote to memory of 3572 3356 chrome.exe 84 PID 3356 wrote to memory of 3572 3356 chrome.exe 84 PID 3356 wrote to memory of 3572 3356 chrome.exe 84 PID 3356 wrote to memory of 3572 3356 chrome.exe 84 PID 3356 wrote to memory of 3572 3356 chrome.exe 84 PID 3356 wrote to memory of 3572 3356 chrome.exe 84 PID 3356 wrote to memory of 3572 3356 chrome.exe 84 PID 3356 wrote to memory of 3572 3356 chrome.exe 84 PID 3356 wrote to memory of 3572 3356 chrome.exe 84 PID 3356 wrote to memory of 3572 3356 chrome.exe 84 PID 3356 wrote to memory of 3572 3356 chrome.exe 84 PID 3356 wrote to memory of 3572 3356 chrome.exe 84 PID 3356 wrote to memory of 3572 3356 chrome.exe 84 PID 3356 wrote to memory of 3572 3356 chrome.exe 84 PID 3356 wrote to memory of 3572 3356 chrome.exe 84 PID 3356 wrote to memory of 3572 3356 chrome.exe 84 PID 3356 wrote to memory of 3572 3356 chrome.exe 84 PID 3356 wrote to memory of 3572 3356 chrome.exe 84 PID 3356 wrote to memory of 3572 3356 chrome.exe 84 PID 3356 wrote to memory of 3572 3356 chrome.exe 84 PID 3356 wrote to memory of 3572 3356 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://exmail.qq.com/cgi-bin/viewfile?type=signature&picid=ZX2912-rDlpUvAtiHAZDSR6Khz2Haf&uin=7041604051⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffacdb19758,0x7ffacdb19768,0x7ffacdb197782⤵PID:3500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1896,i,2612384933246122235,9579868607555847138,131072 /prefetch:22⤵PID:464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1896,i,2612384933246122235,9579868607555847138,131072 /prefetch:82⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1896,i,2612384933246122235,9579868607555847138,131072 /prefetch:82⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2948 --field-trial-handle=1896,i,2612384933246122235,9579868607555847138,131072 /prefetch:12⤵PID:3564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2940 --field-trial-handle=1896,i,2612384933246122235,9579868607555847138,131072 /prefetch:12⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 --field-trial-handle=1896,i,2612384933246122235,9579868607555847138,131072 /prefetch:82⤵PID:1800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4880 --field-trial-handle=1896,i,2612384933246122235,9579868607555847138,131072 /prefetch:82⤵PID:3108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3352 --field-trial-handle=1896,i,2612384933246122235,9579868607555847138,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2964
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3960
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
895B
MD506455aefa0bd01b7b1a6dac3968f7341
SHA1f93628a40c85c3dc21442d5c64858bb29ba52a5c
SHA256fce812755f46ce6feaf57e0af4f307bd965efac989f3a36365384d08c34ee980
SHA512964fd49f357f52a30253842237af66df8e58b79c7c27a19f9cdb59e4e754be41beda0d6580710272af2c9a978c01c0883a1ec945ab7c784ff985c07d6d1f9120
-
Filesize
6KB
MD5ad2f43260ae984e10983b16d160fb8d6
SHA1e2979f1ddc673f6ff6b4fde85a427dcf57630757
SHA256b04d7cd2a260474a20cbbc8c163821b53299b87e1c62d673d67eccee256aad41
SHA512c077a340bd6de507cded92de53acd4c17469e98e885ca12428b2b30230ece0df29ba442fd679187695fde951d9eb5f468081f26e347fb6bbef636c3d208fadd6
-
Filesize
87KB
MD556d9132ecdb541cc5b748fc6b1105b07
SHA12daddeddf1efc2ab2d15bdec77387d650f605e77
SHA256dab2bd14e3c4b9ff8f052192446b73b49bc8a4bb2f06f429af3f0d75f7e77e7f
SHA512b8c0fb8e5a5da910dd6f89725bee3c743924f32395c07354e4d38352890375f200984155db4dd2a4222c7b84ff3cb34d65c0418a25ea73d733fb8aec0c90bb9a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd