Resubmissions
27-08-2023 17:50
230827-werk1seb21 127-08-2023 03:17
230827-dtekwsfb75 122-08-2023 17:50
230822-we39taeb97 122-08-2023 05:56
230822-gm8ryaac65 121-08-2023 22:35
230821-2h4bwagg42 121-08-2023 06:10
230821-gxjwkabc75 121-08-2023 04:56
230821-fkp2daba47 121-08-2023 04:02
230821-el9azaaf93 1Analysis
-
max time kernel
71s -
max time network
73s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2023 17:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://send.cm/z1dg0c7dkj8g
Resource
win10v2004-20230703-en
General
-
Target
https://send.cm/z1dg0c7dkj8g
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133372002784013054" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2272 chrome.exe 2272 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2272 chrome.exe 2272 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe Token: SeShutdownPrivilege 2272 chrome.exe Token: SeCreatePagefilePrivilege 2272 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe 2272 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2272 wrote to memory of 4412 2272 chrome.exe 83 PID 2272 wrote to memory of 4412 2272 chrome.exe 83 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 2276 2272 chrome.exe 85 PID 2272 wrote to memory of 4232 2272 chrome.exe 86 PID 2272 wrote to memory of 4232 2272 chrome.exe 86 PID 2272 wrote to memory of 4272 2272 chrome.exe 87 PID 2272 wrote to memory of 4272 2272 chrome.exe 87 PID 2272 wrote to memory of 4272 2272 chrome.exe 87 PID 2272 wrote to memory of 4272 2272 chrome.exe 87 PID 2272 wrote to memory of 4272 2272 chrome.exe 87 PID 2272 wrote to memory of 4272 2272 chrome.exe 87 PID 2272 wrote to memory of 4272 2272 chrome.exe 87 PID 2272 wrote to memory of 4272 2272 chrome.exe 87 PID 2272 wrote to memory of 4272 2272 chrome.exe 87 PID 2272 wrote to memory of 4272 2272 chrome.exe 87 PID 2272 wrote to memory of 4272 2272 chrome.exe 87 PID 2272 wrote to memory of 4272 2272 chrome.exe 87 PID 2272 wrote to memory of 4272 2272 chrome.exe 87 PID 2272 wrote to memory of 4272 2272 chrome.exe 87 PID 2272 wrote to memory of 4272 2272 chrome.exe 87 PID 2272 wrote to memory of 4272 2272 chrome.exe 87 PID 2272 wrote to memory of 4272 2272 chrome.exe 87 PID 2272 wrote to memory of 4272 2272 chrome.exe 87 PID 2272 wrote to memory of 4272 2272 chrome.exe 87 PID 2272 wrote to memory of 4272 2272 chrome.exe 87 PID 2272 wrote to memory of 4272 2272 chrome.exe 87 PID 2272 wrote to memory of 4272 2272 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://send.cm/z1dg0c7dkj8g1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0a269758,0x7fff0a269768,0x7fff0a2697782⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1896,i,8535996514715438035,136271631813376790,131072 /prefetch:22⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1896,i,8535996514715438035,136271631813376790,131072 /prefetch:82⤵PID:4232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1896,i,8535996514715438035,136271631813376790,131072 /prefetch:82⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3168 --field-trial-handle=1896,i,8535996514715438035,136271631813376790,131072 /prefetch:12⤵PID:3876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3164 --field-trial-handle=1896,i,8535996514715438035,136271631813376790,131072 /prefetch:12⤵PID:1104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 --field-trial-handle=1896,i,8535996514715438035,136271631813376790,131072 /prefetch:82⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 --field-trial-handle=1896,i,8535996514715438035,136271631813376790,131072 /prefetch:82⤵PID:1160
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4996
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD5cf021f1c604474cce94e4ce45db8291b
SHA14ff12850f1721ee28f30b4d4f22083cde05d0ecd
SHA256527479be7a5ee0f57580d1be1f54d6ac2afc4c658d6833b88dd7e45235644a58
SHA512c2aa67028246993e87770c34ef22b338013b3e8f22164b34545cc7bfd70c28e647d17e5b8696bcb6a7f8fe7772eb102ac71718cce54729f9771e2af85dc84b91
-
Filesize
6KB
MD54e44f6170275cc1a279ad138b7f3625f
SHA19045a03a325bd0b260625855a896eed948b24c12
SHA2566edfbdc0c4d991eb5cfec74f721c0aaaf428932c60150ff76260774f441f838a
SHA512a65950b91ee5fdc7b9d2fa7fce54a575e8273df5420abe29eb7cf32a60d6c350d88d5a190f5857cdfcf91373da3f3a823a8f4549ed7c4d5da1bda0e31a235990
-
Filesize
5KB
MD5bee2a00440d79a299281b857ddb1881f
SHA12c768c3ff2cc4e3bb3fb2aa339bd38e174d00ad7
SHA256a05974374aa30d84d0e4afedef783b9b403b9dc353579732bdcfcb63915f4b73
SHA512cc7858d2091a52cf623e4ff0599ad3d85a0972b8e8308f8ff4aa5652b7c61c88e56dd641083ca9dbcc18691730d8e069d80fbd9b95b469e3697d75d1b31daffc
-
Filesize
87KB
MD5213b31576abd9b32d05dfb822180c343
SHA193dcf8cf495b2994fbca140c70599cdbfd99e0b8
SHA256a19a075b6f0e7dbe531cdf7ee13b686c21dd1351978edb5f15b3d4ccc8b9e6b6
SHA512e281778ae25c623427da62f2cd7e85a42c0604866ffdfaa58cd119dce43f2cf30cd0f27d6e7b4a72d6461473dc4d584139ad929389765721999203cb5496f8ce
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd