Resubmissions
27-08-2023 17:50
230827-werk1seb21 127-08-2023 03:17
230827-dtekwsfb75 122-08-2023 17:50
230822-we39taeb97 122-08-2023 05:56
230822-gm8ryaac65 121-08-2023 22:35
230821-2h4bwagg42 121-08-2023 06:10
230821-gxjwkabc75 121-08-2023 04:56
230821-fkp2daba47 121-08-2023 04:02
230821-el9azaaf93 1Analysis
-
max time kernel
2220s -
max time network
2171s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2023 04:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://send.cm/z1dg0c7dkj8g
Resource
win10v2004-20230703-en
General
-
Target
https://send.cm/z1dg0c7dkj8g
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133370641904578792" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 8 chrome.exe 8 chrome.exe 4452 chrome.exe 4452 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 8 chrome.exe 8 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 8 wrote to memory of 832 8 chrome.exe 82 PID 8 wrote to memory of 832 8 chrome.exe 82 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 2224 8 chrome.exe 84 PID 8 wrote to memory of 3900 8 chrome.exe 85 PID 8 wrote to memory of 3900 8 chrome.exe 85 PID 8 wrote to memory of 4632 8 chrome.exe 86 PID 8 wrote to memory of 4632 8 chrome.exe 86 PID 8 wrote to memory of 4632 8 chrome.exe 86 PID 8 wrote to memory of 4632 8 chrome.exe 86 PID 8 wrote to memory of 4632 8 chrome.exe 86 PID 8 wrote to memory of 4632 8 chrome.exe 86 PID 8 wrote to memory of 4632 8 chrome.exe 86 PID 8 wrote to memory of 4632 8 chrome.exe 86 PID 8 wrote to memory of 4632 8 chrome.exe 86 PID 8 wrote to memory of 4632 8 chrome.exe 86 PID 8 wrote to memory of 4632 8 chrome.exe 86 PID 8 wrote to memory of 4632 8 chrome.exe 86 PID 8 wrote to memory of 4632 8 chrome.exe 86 PID 8 wrote to memory of 4632 8 chrome.exe 86 PID 8 wrote to memory of 4632 8 chrome.exe 86 PID 8 wrote to memory of 4632 8 chrome.exe 86 PID 8 wrote to memory of 4632 8 chrome.exe 86 PID 8 wrote to memory of 4632 8 chrome.exe 86 PID 8 wrote to memory of 4632 8 chrome.exe 86 PID 8 wrote to memory of 4632 8 chrome.exe 86 PID 8 wrote to memory of 4632 8 chrome.exe 86 PID 8 wrote to memory of 4632 8 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://send.cm/z1dg0c7dkj8g1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x9c,0x108,0x7ffb06b09758,0x7ffb06b09768,0x7ffb06b097782⤵PID:832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1884,i,2503373563820968893,1292324687325184937,131072 /prefetch:22⤵PID:2224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1884,i,2503373563820968893,1292324687325184937,131072 /prefetch:82⤵PID:3900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1884,i,2503373563820968893,1292324687325184937,131072 /prefetch:82⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1884,i,2503373563820968893,1292324687325184937,131072 /prefetch:12⤵PID:3688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1884,i,2503373563820968893,1292324687325184937,131072 /prefetch:12⤵PID:1816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 --field-trial-handle=1884,i,2503373563820968893,1292324687325184937,131072 /prefetch:82⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 --field-trial-handle=1884,i,2503373563820968893,1292324687325184937,131072 /prefetch:82⤵PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 --field-trial-handle=1884,i,2503373563820968893,1292324687325184937,131072 /prefetch:82⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4944 --field-trial-handle=1884,i,2503373563820968893,1292324687325184937,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 --field-trial-handle=1884,i,2503373563820968893,1292324687325184937,131072 /prefetch:82⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:376
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD59754ace29541aef88af62c1fcd70f55f
SHA10d39c204209fc72c42bcfd2ba4cb56e641d081c5
SHA2568150cddf2d1a02fabd4f94005fa2dd5276c265cbcc1d447054be7a9e9c9185b1
SHA51203aa8d22c7d0d28fb951b36ff0fe8b1ce1e92ff4237192f476a534061903fc7b603412122f015d896f88c339ba6e97e98b169fc088dcd5232d9ccd8b734bebce
-
Filesize
1KB
MD55ae106954aa7fb914db5ba363989e260
SHA1afca45dc460a24a7579c0eb0f427fdb344e69aef
SHA25698132d00c860b933bcd6eb02f4e4d78740177e36450585ebafda2b77900e7c3d
SHA5127bf019f651a17cd7c8a2944a8eab6db2a84c41d2a697eb745294a2622504ba739c144b931adbba0893a25f70cefbdb064b943d78a11969bb6c7983380c64e4fb
-
Filesize
706B
MD509faa91620fad65feab7687632d5add5
SHA14a3cb1b9b6de64c60116451d6e33ff533c152989
SHA256603611146f00ad24e52b55157aa235de25bd2b172a5b7d98b2f5cf6358c5f0df
SHA512907629fd817f9a1ec50a015151976dc15824cd0b05db216d421297c4d5a3bb414c6bf8460e18d8d593b48db20579d31c8972bfa52c92c0a8b1e22ae4bf37f413
-
Filesize
6KB
MD5dd70f84e449061bba65644860bf4c990
SHA1b52169e98b66f8b09e087a4344255a2182273740
SHA25673a213982e8e5164c73ee53f6bbf8f45c484f0e5ee9120f14dfafab5516a7f59
SHA512a473b8adee09f9dbf7ad75956aa793d2688a9aba61c45216cd3856efbea9d4fd4f3fd1e68ab35a1cf1bfb2309e16bbb99703af8b7a9cfd6892a37addfb3db5a5
-
Filesize
6KB
MD506058638402c66e165ca89be4e5be5bf
SHA1607ca536b39d864d2732a2668d82f3423fb6ddf1
SHA25600aaeb49492ec76bac0bf98338487cb5719aa7a0f0cf797375360e50374401f4
SHA5121d7940b87c421dc23d27354421c3cd8a04080ddfa0241b8bdbe349244db42a9b697d39e5251d8844e0a3f40d363e97b68221c92cd3d106a421a25e7167f46929
-
Filesize
6KB
MD5f898ddb62fdfdd4aade86c3d8eafc591
SHA11ff651e253ed347d3d93911d45b6d3dd4e457186
SHA256ea9467bec826cab6285f2bff1d9a786b34ad501943e81779b7611bd284ab5fcb
SHA512bec1b7b83a19b1dea6a53b3438603c2951c2630d2db1582c5c4a45bdbb693eeb95720fece5319eb191524a6a8abd4930c9aa41ee22818b40c7c68c4bcac31a0c
-
Filesize
6KB
MD52004c49767cb25a0e66f9c09d5ec79bb
SHA17cfb6ccda9197970f86c24b20d12241da2126366
SHA2561addfbd82745e51ab5183644372070945851f5660c07089084188ba3decdacc1
SHA512d2edfd53cf14f1e35dc539e14fec1b73638e813b7832c0a188c3c1bcd51ae2826306ce519eeda0c9a3127fc61e56e040db8916427d57171fd671193d38b94f45
-
Filesize
87KB
MD5a8c1e6ada288cb5dcfe3ff2daaede72a
SHA17095c9de9c31d9711bc868baf49a9660b358eea3
SHA2565217f0019b577736deb22ab937b8252e3bdf14c45ed07b1b7357d9e3e8b7874c
SHA5127523642fe636732c3485d48d469157f18d400ab694e16a4bbb3033df8c14d282f74e540c0df4e2dce48ee2ba374f1f632812634f819ca621b4f50abf8a5f163e
-
Filesize
110KB
MD5cc1be7d3a83aa9f5d032735a443f6658
SHA183d7eb7af4fc2b0ba294dd6a646b97c7a035fe15
SHA256edc7901f7595fa7977bf9a6e98f9eecef4ec54c08e894f8f8da8c50d0e7bb917
SHA512f19683d8d3498f7fe2d2b9415a4d48c0de5aad2547473e8a58399865d2b36d1b9fa103580efd8b7cc9bc0f2b1ca030451c1083ae9b66f6f35b44c5c2813903ef
-
Filesize
104KB
MD5f94f4922d0b136c7c037f97024458330
SHA12a0d25759e63db42538b487dedfb51fdfe117daa
SHA256fa6cb5f0eb4ed9bace76bad07d53aa66d016951bb06e42d73315859270b1f256
SHA5124f95024adf9d428edb19b3f65e02bfcba5c36bb5eed20c7fdf1291a3177316d79efb1a228832cbec2bd274c2c18350c62fec9415b1290784f2595f9b7d5585c1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd