Analysis
-
max time kernel
302s -
max time network
281s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
23-08-2023 13:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ue66lxwl0su7w8n-1320008508.cos.ap-singapore.myqcloud.com/ue66lxwl0su7w8n.html
Resource
win10-20230703-en
General
-
Target
https://ue66lxwl0su7w8n-1320008508.cos.ap-singapore.myqcloud.com/ue66lxwl0su7w8n.html
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133372720445986904" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 3396 chrome.exe 3396 chrome.exe 4872 chrome.exe 4872 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 3396 chrome.exe 3396 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe Token: SeShutdownPrivilege 3396 chrome.exe Token: SeCreatePagefilePrivilege 3396 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe 3396 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3396 wrote to memory of 4164 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 4164 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5116 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5076 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 5076 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 1236 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 1236 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 1236 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 1236 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 1236 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 1236 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 1236 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 1236 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 1236 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 1236 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 1236 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 1236 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 1236 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 1236 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 1236 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 1236 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 1236 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 1236 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 1236 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 1236 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 1236 3396 chrome.exe chrome.exe PID 3396 wrote to memory of 1236 3396 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ue66lxwl0su7w8n-1320008508.cos.ap-singapore.myqcloud.com/ue66lxwl0su7w8n.html1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffadd769758,0x7ffadd769768,0x7ffadd7697782⤵PID:4164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1516 --field-trial-handle=1736,i,18254937618488472593,16723133770498819059,131072 /prefetch:22⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2076 --field-trial-handle=1736,i,18254937618488472593,16723133770498819059,131072 /prefetch:82⤵PID:1236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2004 --field-trial-handle=1736,i,18254937618488472593,16723133770498819059,131072 /prefetch:82⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=1736,i,18254937618488472593,16723133770498819059,131072 /prefetch:12⤵PID:3084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2876 --field-trial-handle=1736,i,18254937618488472593,16723133770498819059,131072 /prefetch:12⤵PID:1420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 --field-trial-handle=1736,i,18254937618488472593,16723133770498819059,131072 /prefetch:82⤵PID:164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 --field-trial-handle=1736,i,18254937618488472593,16723133770498819059,131072 /prefetch:82⤵PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4492 --field-trial-handle=1736,i,18254937618488472593,16723133770498819059,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4872
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:376
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD58786df5726e7de089240eabda202e98a
SHA1010d5a96a1ded286f298b85299ca57db0d92b4e9
SHA2567a1d7057a5d6a2caf9e8c2e208ee24e1787dffc8d4077868a053b0170b2b8774
SHA5127aa803fdbfa0f42b0ce258d34da3def6d9a34b5aedd29051022d7d553f111fa654ea4214565472e4d9b08b566a8289e0ed4da8f89a7a82f6207db5ae8ac4d35a
-
Filesize
1KB
MD5b55b90940072209f9280424f60dd6940
SHA15cdd470501398ee02a6611c31bac48e2985733df
SHA2565d1578d9e4f4f3804e44779c3bb024ba2f1f8b571b2f255c0d193491b7888d71
SHA51244ab20da60a6d678c6cad3e05889d05715b17ac0ee4bfe75019e2b911a7db1c7352dc918da7989b086215ad995e9e1ac7c38f6f369acd12596366c1f6b2b15a7
-
Filesize
874B
MD50d5e2d5d736448d020f22e2ff75013ae
SHA1fcece2ab25552994958fa273cc08ee04e85499c1
SHA2564d15d2aa00dfe1a77e0e520c50bf7de944dbe7ee87c96d236782d369cef6ac9f
SHA5124be23bc838a98290263a1c3b6a13c87eaca25fcf65ec7de847cfc56364bdaa2a05eb1253cf5ab6ec28bfa139a20e08cb76563e433b85db15c0d41ace88beadfe
-
Filesize
6KB
MD5588bf874c5c74a8b66a2eb9d6ad8381b
SHA17d9a70b2b71ecde5994ffe9a9a6b1262f3311beb
SHA256c8f6066f6b8d115eb5e52805647cf4a1f390329d7091c1ad3dad7fcb305f0090
SHA5125c72305ed1287b8c5a4d32df584b0e9f11eeb1d65add503524cee810ba9ac2245c7e8b8d010e13ee335e28cf765229108c86c364408ff231d80e54fb640c409d
-
Filesize
6KB
MD529bde13e1979bcbfaecc2077699fc1de
SHA1086a2f2d3b3338c99c6ae07360508847232beb15
SHA2568d91127e960b1da68d87e4067d3d3921e6aa7d1eda974b839aa8c08042e75296
SHA5120cbdcc1e264d1de753fa94f70c430aacf9b5d41eaedb958cd9f5ebd8049161b1ede07ed077ae4883e7d29358b6449d8ec31955ba179c75d51b8a7f2b415e826e
-
Filesize
6KB
MD59a007327639321f0be8a5bd26fbefd84
SHA1dc6340e193a689995a9e5edc4e652aaebc1c9d65
SHA25679b292d7d55075c563e52c979a66e2fb832a8da92dc113db00349046df4d481c
SHA512c0054173e3a084ca70b745f89cb6ae686103d141fea43746a624bdbcb5f6ba910275a6c625a99b39c1d03462b7df75c93c5586fb33d8c6e38b445e4c7729628d
-
Filesize
87KB
MD5b169aebdf9dee2b5525c472dc7421c15
SHA1f98465cc7bd23f59139020fde8348fab7cab0975
SHA25642db887e60867d4b113610f12223b3238e3ef9e34ade0ec391fbf7993ed2562b
SHA512ce9ec0efffd08132dc7d4d5bf5a87f203d7cf50512a51e8ee5911b8253387a26fe26240cfc45179a3943befb5a9dc1df25776c480f11147c1576cdb195444681
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e