Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2023, 13:22
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://baidu.com/link?url=mhZ7KPd1br38UAjew3dyHlYCzrK6AF-HjFiExsQUx1BUf7qzNEd3ep1dtFVjdIZN#ZmhlZXJlbnNAaGVpam1hbnMubmw=
Resource
win10v2004-20230703-en
General
-
Target
https://baidu.com/link?url=mhZ7KPd1br38UAjew3dyHlYCzrK6AF-HjFiExsQUx1BUf7qzNEd3ep1dtFVjdIZN#ZmhlZXJlbnNAaGVpam1hbnMubmw=
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133372705645102981" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4396 chrome.exe 4396 chrome.exe 2868 chrome.exe 2868 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe Token: SeShutdownPrivilege 4396 chrome.exe Token: SeCreatePagefilePrivilege 4396 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe 4396 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4396 wrote to memory of 4484 4396 chrome.exe 83 PID 4396 wrote to memory of 4484 4396 chrome.exe 83 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 4068 4396 chrome.exe 85 PID 4396 wrote to memory of 3212 4396 chrome.exe 86 PID 4396 wrote to memory of 3212 4396 chrome.exe 86 PID 4396 wrote to memory of 2820 4396 chrome.exe 87 PID 4396 wrote to memory of 2820 4396 chrome.exe 87 PID 4396 wrote to memory of 2820 4396 chrome.exe 87 PID 4396 wrote to memory of 2820 4396 chrome.exe 87 PID 4396 wrote to memory of 2820 4396 chrome.exe 87 PID 4396 wrote to memory of 2820 4396 chrome.exe 87 PID 4396 wrote to memory of 2820 4396 chrome.exe 87 PID 4396 wrote to memory of 2820 4396 chrome.exe 87 PID 4396 wrote to memory of 2820 4396 chrome.exe 87 PID 4396 wrote to memory of 2820 4396 chrome.exe 87 PID 4396 wrote to memory of 2820 4396 chrome.exe 87 PID 4396 wrote to memory of 2820 4396 chrome.exe 87 PID 4396 wrote to memory of 2820 4396 chrome.exe 87 PID 4396 wrote to memory of 2820 4396 chrome.exe 87 PID 4396 wrote to memory of 2820 4396 chrome.exe 87 PID 4396 wrote to memory of 2820 4396 chrome.exe 87 PID 4396 wrote to memory of 2820 4396 chrome.exe 87 PID 4396 wrote to memory of 2820 4396 chrome.exe 87 PID 4396 wrote to memory of 2820 4396 chrome.exe 87 PID 4396 wrote to memory of 2820 4396 chrome.exe 87 PID 4396 wrote to memory of 2820 4396 chrome.exe 87 PID 4396 wrote to memory of 2820 4396 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://baidu.com/link?url=mhZ7KPd1br38UAjew3dyHlYCzrK6AF-HjFiExsQUx1BUf7qzNEd3ep1dtFVjdIZN#ZmhlZXJlbnNAaGVpam1hbnMubmw=1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7ffde3889758,0x7ffde3889768,0x7ffde38897782⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1860,i,4192835963821689153,10347636238882562623,131072 /prefetch:22⤵PID:4068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1860,i,4192835963821689153,10347636238882562623,131072 /prefetch:82⤵PID:3212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1860,i,4192835963821689153,10347636238882562623,131072 /prefetch:82⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3004 --field-trial-handle=1860,i,4192835963821689153,10347636238882562623,131072 /prefetch:12⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3036 --field-trial-handle=1860,i,4192835963821689153,10347636238882562623,131072 /prefetch:12⤵PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4868 --field-trial-handle=1860,i,4192835963821689153,10347636238882562623,131072 /prefetch:82⤵PID:2776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5196 --field-trial-handle=1860,i,4192835963821689153,10347636238882562623,131072 /prefetch:12⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5428 --field-trial-handle=1860,i,4192835963821689153,10347636238882562623,131072 /prefetch:12⤵PID:4140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 --field-trial-handle=1860,i,4192835963821689153,10347636238882562623,131072 /prefetch:82⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5388 --field-trial-handle=1860,i,4192835963821689153,10347636238882562623,131072 /prefetch:12⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5360 --field-trial-handle=1860,i,4192835963821689153,10347636238882562623,131072 /prefetch:12⤵PID:3512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 --field-trial-handle=1860,i,4192835963821689153,10347636238882562623,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2868
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2288
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD554958cbdad9b6aa30a165750dc9054ba
SHA1a5237f134c50c12a9835520b8d700a2d7831b090
SHA2569ab47d8e8e8bf19769ea3c40b26a8cbad0ba9ec7a1e92bc0efae8e7bfc3e523e
SHA5129daf05871c13cc194f9bc340a440f9e92fa27d58e046796e65c308a23114dbd3551437ab748406f71085853caf667e018e8f6d80745d9de809f1dd0677135f15
-
Filesize
2KB
MD55ae3f8219afa625dc003106290cc2f2e
SHA1ee3c7a938bc70b8ffe8b5f051affd1b60d787f9c
SHA256416520f01367533c374a5d1eae95b1f7f0b5f065f91026f544651af82344b460
SHA512e5d189fd5dbafb55a33cf14f7d73969f15fe818b1b29b00128f3289ef8297621156ba57ed199329cb7edb421346b642f91dec3b19e8e41979eb89bd8515754a1
-
Filesize
874B
MD55814f9e8d370e81ac2a04f9ff301fef8
SHA1b9a47762170025dbb07c6404452e2a1e0059471a
SHA25611ee3b730b400985b5c67e7c7e4af02b008720eadad24f1d532a150463bd99f6
SHA51219b57723e801185ef2018db4c28bd09120fec12cf8536c4d68c8c14d1b0a756cc4f419744acc35733554d0b9f7ac57927598070379a8abe3e80d735a55045a7d
-
Filesize
6KB
MD5cb7789c3a47c832023d8ec76e07a659b
SHA1c3a2aff93bd3a1b65da190738cc4d087c09cfcb4
SHA256b6292517cec3f8b317c2c6384becf7ce16eddb1d3d25ba867d9e8e159a43ab8b
SHA512d6eb25f1fbfdf5e482dced7be5e73900edcb1d0a8d45703b887c1a754fd2910b54f0fad14120a2a76c36084ad86248b8a96af7c85950762c74e899640aadcb48
-
Filesize
6KB
MD53b4a58cf5a1f5b3132a311734af55746
SHA181b795caf17e787cbf1fd835d72ad490da312678
SHA2566b2dbce6e8782f89033652b672c642114d695f2c4a3909da85340556bf6c0ea2
SHA5122b39cfb98d4bfa45a26e3c0098f458fc05da3328235ec22bcac2b1544bc91a9901881babc67a008096514d64cf8727015d5b7a1bfa6abab0ede955ef6ef30ea6
-
Filesize
87KB
MD555e2bf5dad98a5cc4c14b7e7c77be9d9
SHA12e530e9f1ccf0cca787665cbe19951e1bd4314c7
SHA25653550b15198347d1448570205456971e820831da50c112d6cf403b85b6d9ac7b
SHA5122465e6f39e519261caa88aff43679b6001af19782de4909e4a5aec35cd5d9f6ec7511c26960c16c36350ab8e7bb3e5f1903b02245aa0f169bd4231cd1d78e896
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd