Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2023 21:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.google.com/gen_204?atyp=i&ei=YVHeZIyOGfq30PEP-5yO2Ac&ct=slh&v=t1&im=M&pv=0.7196478137059867&me=172:1692291429230,e,B&zx=1692291429230&opi=89978449
Resource
win10v2004-20230703-en
General
-
Target
http://www.google.com/gen_204?atyp=i&ei=YVHeZIyOGfq30PEP-5yO2Ac&ct=slh&v=t1&im=M&pv=0.7196478137059867&me=172:1692291429230,e,B&zx=1692291429230&opi=89978449
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133367810470164259" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4068 chrome.exe 4068 chrome.exe 2452 chrome.exe 2452 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4068 chrome.exe 4068 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe Token: SeShutdownPrivilege 4068 chrome.exe Token: SeCreatePagefilePrivilege 4068 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe 4068 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4068 wrote to memory of 4708 4068 chrome.exe 83 PID 4068 wrote to memory of 4708 4068 chrome.exe 83 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 2188 4068 chrome.exe 85 PID 4068 wrote to memory of 4820 4068 chrome.exe 89 PID 4068 wrote to memory of 4820 4068 chrome.exe 89 PID 4068 wrote to memory of 4488 4068 chrome.exe 87 PID 4068 wrote to memory of 4488 4068 chrome.exe 87 PID 4068 wrote to memory of 4488 4068 chrome.exe 87 PID 4068 wrote to memory of 4488 4068 chrome.exe 87 PID 4068 wrote to memory of 4488 4068 chrome.exe 87 PID 4068 wrote to memory of 4488 4068 chrome.exe 87 PID 4068 wrote to memory of 4488 4068 chrome.exe 87 PID 4068 wrote to memory of 4488 4068 chrome.exe 87 PID 4068 wrote to memory of 4488 4068 chrome.exe 87 PID 4068 wrote to memory of 4488 4068 chrome.exe 87 PID 4068 wrote to memory of 4488 4068 chrome.exe 87 PID 4068 wrote to memory of 4488 4068 chrome.exe 87 PID 4068 wrote to memory of 4488 4068 chrome.exe 87 PID 4068 wrote to memory of 4488 4068 chrome.exe 87 PID 4068 wrote to memory of 4488 4068 chrome.exe 87 PID 4068 wrote to memory of 4488 4068 chrome.exe 87 PID 4068 wrote to memory of 4488 4068 chrome.exe 87 PID 4068 wrote to memory of 4488 4068 chrome.exe 87 PID 4068 wrote to memory of 4488 4068 chrome.exe 87 PID 4068 wrote to memory of 4488 4068 chrome.exe 87 PID 4068 wrote to memory of 4488 4068 chrome.exe 87 PID 4068 wrote to memory of 4488 4068 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.google.com/gen_204?atyp=i&ei=YVHeZIyOGfq30PEP-5yO2Ac&ct=slh&v=t1&im=M&pv=0.7196478137059867&me=172:1692291429230,e,B&zx=1692291429230&opi=899784491⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc8d859758,0x7ffc8d859768,0x7ffc8d8597782⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1780,i,12534994639653041933,192823398839431506,131072 /prefetch:22⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2844 --field-trial-handle=1780,i,12534994639653041933,192823398839431506,131072 /prefetch:12⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2100 --field-trial-handle=1780,i,12534994639653041933,192823398839431506,131072 /prefetch:82⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2852 --field-trial-handle=1780,i,12534994639653041933,192823398839431506,131072 /prefetch:12⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2000 --field-trial-handle=1780,i,12534994639653041933,192823398839431506,131072 /prefetch:82⤵PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4748 --field-trial-handle=1780,i,12534994639653041933,192823398839431506,131072 /prefetch:82⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1780,i,12534994639653041933,192823398839431506,131072 /prefetch:82⤵PID:1348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=920 --field-trial-handle=1780,i,12534994639653041933,192823398839431506,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2452
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1332
-
C:\Windows\system32\sethc.exesethc.exe 2311⤵PID:672
-
C:\Windows\system32\EaseOfAccessDialog.exe"C:\Windows\system32\EaseOfAccessDialog.exe" 2312⤵PID:4920
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824B
MD5e857811be007a9d77ea9bae033d9450b
SHA1c0ae8301f4a1ea49381fee12f62b4c3c4269075c
SHA2568c2680f110da0ed785fc7d7f1318194551a294921bf39414658ed9ab7bfbdd20
SHA5121ddb7a3306a1a9f40e2d8deb6d8796b6007c221fd208f885723d537aa4fc772592ce8cf17dfb6654f7aa14dc43c730812a44216420d08f88e7b7358e77ad671c
-
Filesize
6KB
MD5f5d97a6fe1be2ed4b3dff85ae87b5967
SHA1478f91a448d1211352eb884dd42aabf41c172065
SHA25672ddacacbcdd53f75faf2ab252dda1b5af6a5de20edd2ad07fe98dba4f8f135a
SHA5120e36b54ea745a4f51c7020f1cf1570db2d1d910a2098f445e94cb0b828dd77258d16610a2986dc09e86c4d831ef8cae4dbad7796cb2bcd0c74098f5f5d4e7f48
-
Filesize
6KB
MD5d7767f875954723f0f005195c1b7b502
SHA13ac03510ab15900a0183568a87832dd82e2d5f89
SHA25677ff5fd57e2b82d705ad000328d7ab5e0f9c9def2e7a0d2b34ef3c919eb62692
SHA512d539ea4b6ad8d44d9932f076b8beed02cca045d893882ba4f3a5228f84114e96d904c70f644368dbf159b3962f396e22b02c216e2ef0d5c0b8ff031254adad4b
-
Filesize
87KB
MD53df0760228694f246082f3339511e25f
SHA198d619816d826535b74da146dbb547639e148126
SHA25683ad33de1fa153d1b8d8c04dd743a7351cb7cc3e3bca9e2a8b3a089ccb710085
SHA512aaecb3a93be55f3a3a5b6d9502b4cb28c1b7031eac5d9deb518dafc39b642e2a9a2a85fac4130f939df33518c6339721fcb71e44d49ddeb1e4949f7cbef85e9a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd