Analysis
-
max time kernel
300s -
max time network
266s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2023, 22:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://quickfound.lol/1Fxanl
Resource
win10v2004-20230703-en
General
-
Target
http://quickfound.lol/1Fxanl
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133372172019167274" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3364 chrome.exe 3364 chrome.exe 4340 chrome.exe 4340 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3364 wrote to memory of 3812 3364 chrome.exe 80 PID 3364 wrote to memory of 3812 3364 chrome.exe 80 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 3156 3364 chrome.exe 82 PID 3364 wrote to memory of 4900 3364 chrome.exe 83 PID 3364 wrote to memory of 4900 3364 chrome.exe 83 PID 3364 wrote to memory of 3592 3364 chrome.exe 84 PID 3364 wrote to memory of 3592 3364 chrome.exe 84 PID 3364 wrote to memory of 3592 3364 chrome.exe 84 PID 3364 wrote to memory of 3592 3364 chrome.exe 84 PID 3364 wrote to memory of 3592 3364 chrome.exe 84 PID 3364 wrote to memory of 3592 3364 chrome.exe 84 PID 3364 wrote to memory of 3592 3364 chrome.exe 84 PID 3364 wrote to memory of 3592 3364 chrome.exe 84 PID 3364 wrote to memory of 3592 3364 chrome.exe 84 PID 3364 wrote to memory of 3592 3364 chrome.exe 84 PID 3364 wrote to memory of 3592 3364 chrome.exe 84 PID 3364 wrote to memory of 3592 3364 chrome.exe 84 PID 3364 wrote to memory of 3592 3364 chrome.exe 84 PID 3364 wrote to memory of 3592 3364 chrome.exe 84 PID 3364 wrote to memory of 3592 3364 chrome.exe 84 PID 3364 wrote to memory of 3592 3364 chrome.exe 84 PID 3364 wrote to memory of 3592 3364 chrome.exe 84 PID 3364 wrote to memory of 3592 3364 chrome.exe 84 PID 3364 wrote to memory of 3592 3364 chrome.exe 84 PID 3364 wrote to memory of 3592 3364 chrome.exe 84 PID 3364 wrote to memory of 3592 3364 chrome.exe 84 PID 3364 wrote to memory of 3592 3364 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://quickfound.lol/1Fxanl1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9044e9758,0x7ff9044e9768,0x7ff9044e97782⤵PID:3812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1904,i,4245358327008422617,78403826586398767,131072 /prefetch:22⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1904,i,4245358327008422617,78403826586398767,131072 /prefetch:82⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1904,i,4245358327008422617,78403826586398767,131072 /prefetch:82⤵PID:3592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3144 --field-trial-handle=1904,i,4245358327008422617,78403826586398767,131072 /prefetch:12⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3076 --field-trial-handle=1904,i,4245358327008422617,78403826586398767,131072 /prefetch:12⤵PID:3208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4860 --field-trial-handle=1904,i,4245358327008422617,78403826586398767,131072 /prefetch:12⤵PID:672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 --field-trial-handle=1904,i,4245358327008422617,78403826586398767,131072 /prefetch:82⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 --field-trial-handle=1904,i,4245358327008422617,78403826586398767,131072 /prefetch:82⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2660 --field-trial-handle=1904,i,4245358327008422617,78403826586398767,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4340
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4800
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD56474b44f843fba4c66860dbaa294b8d9
SHA13d229b7d4e41831420c43df51204a94584e62b3d
SHA256115a07b0e06d8e998aec5ec17f8a859eb573943306f6793b7bc70a7b0fdb4b64
SHA512111c5d13f86dbb405bbe29eb86d9a4cdba35047f681e313cee4455f0b84d7c1de5ba111d6478c02df3136ede735d49085d9a30af9c3716a88d1ab5eeed03e2f5
-
Filesize
861B
MD5ad15ca216ba99b586e82451f53c720f1
SHA12074c8220ed212e049dd866c0291f49bd6a2d1a0
SHA256361e9ca3cdc1e8898ca00eb27b6dcf20c4f30917a24f893f62e321d4ab197f6d
SHA512e005bbc762927459e058d60acae4b4f9906b5bf75c31635288da56356c9baff762df0765bc0580551cb835504f8f61356085efd41aeebe4a5ab71266ab3f6864
-
Filesize
539B
MD512c30f1033e5f9baa3d0ae10ed368ffd
SHA1829e9f0739b0b42e013a77929bfce6051cdc3d23
SHA2569746e1625ce44db3c9c188d370ef7ddabddb6ad09f34a2f7821e9f9682ea866a
SHA51289e0921408b27c2e91270f56aaf934cb7e0ba49a1bf4b3d2ffa9be2dacfd0ff65083430fd329c91659b8f0c1859a36b871f789c5f6299218480d89736cee2577
-
Filesize
6KB
MD5f5f538cfd93b2ee25238671aa54cdbf5
SHA101028ef406a4b872c7d34115e012ffa8ebab2119
SHA256bf1bc4ebfd347cee2eb35e33cc4e74bd20f6eff3802b2cbf50e253b2130be3c4
SHA51202e266531dfa1745e14e69d2d869460b23b389cb9b7ac5abf9f1fda21dae186002009c81098d344961032d5a4fdea0a54758d8bc433c7d18bbbe7d34ab33cf56
-
Filesize
6KB
MD5f904970302b2cf02981cc46a09679c46
SHA120aec16bdb1af299467340fa1d344bee8f36faf8
SHA256d26e3545407efa3fa43d081a0308ad670c909826ee5467aa5cbbdcb551ee5140
SHA51235bc5db964ccb77b7d45d51a34db8c7984fe0943d1cefd0a1b75832752c126a5590bcbf93ef610a7d0f0024de0228b1ea283e4756426cd1ae24c85495af9d36d
-
Filesize
6KB
MD5249f30badeb6a3b136aa31126d498cef
SHA147ad7e02cf390e46d25f76fb1d15894abb77f840
SHA256d1c29490bf0ad7e6a7731698d078ebab8ce4360eacc10bc127f11e7540637115
SHA51269ceabfa0a06ba15b5476c524094ad238c89f2fc22e740e4e351a02b148a1fe823d25ae24018581f313f2f769b9fa23912f04998ca4748344b632ed12178b58c
-
Filesize
87KB
MD5eb3b20a8cd501ec0593e9e3c97c4e692
SHA12fe42ddfe5998253ee7cf0afa115204dfda2e491
SHA256a979870da6b9974f2c038101b51c444257951e303c8b8aad24c2a85db7f081a1
SHA5128b8c5af375f565e3159ad01a2890b1eab4f023e1daf78ffc17f725ffc4bc7cf6074d98fd7f52af32c8ca29f6dd253df9a5988ce51c7d7d34a2634d9720fdb54d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd