Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 12:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://link.gmgb4.net/FliZ2VMjzRlmPTvK-bQvLO-EG4Po7onikJhuAD88K9cTMyA8JflOJA4t5fw_ZHRBY96xUF-Cu-DoTUq1JX_YVr5oVUtwcwuZqMCMx30gezvn2lcVsdVNfxQMlxsThiyZEiqbqteL15O48BpkZSSk2qh5SJMMwgCE-trUu9534R4ajgmVI1
Resource
win10v2004-20230703-en
General
-
Target
https://link.gmgb4.net/FliZ2VMjzRlmPTvK-bQvLO-EG4Po7onikJhuAD88K9cTMyA8JflOJA4t5fw_ZHRBY96xUF-Cu-DoTUq1JX_YVr5oVUtwcwuZqMCMx30gezvn2lcVsdVNfxQMlxsThiyZEiqbqteL15O48BpkZSSk2qh5SJMMwgCE-trUu9534R4ajgmVI1
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133376998941981566" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 724 chrome.exe 724 chrome.exe 1340 chrome.exe 1340 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 724 chrome.exe 724 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe Token: SeShutdownPrivilege 724 chrome.exe Token: SeCreatePagefilePrivilege 724 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe 724 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 724 wrote to memory of 2448 724 chrome.exe 83 PID 724 wrote to memory of 2448 724 chrome.exe 83 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3684 724 chrome.exe 85 PID 724 wrote to memory of 3476 724 chrome.exe 86 PID 724 wrote to memory of 3476 724 chrome.exe 86 PID 724 wrote to memory of 1160 724 chrome.exe 87 PID 724 wrote to memory of 1160 724 chrome.exe 87 PID 724 wrote to memory of 1160 724 chrome.exe 87 PID 724 wrote to memory of 1160 724 chrome.exe 87 PID 724 wrote to memory of 1160 724 chrome.exe 87 PID 724 wrote to memory of 1160 724 chrome.exe 87 PID 724 wrote to memory of 1160 724 chrome.exe 87 PID 724 wrote to memory of 1160 724 chrome.exe 87 PID 724 wrote to memory of 1160 724 chrome.exe 87 PID 724 wrote to memory of 1160 724 chrome.exe 87 PID 724 wrote to memory of 1160 724 chrome.exe 87 PID 724 wrote to memory of 1160 724 chrome.exe 87 PID 724 wrote to memory of 1160 724 chrome.exe 87 PID 724 wrote to memory of 1160 724 chrome.exe 87 PID 724 wrote to memory of 1160 724 chrome.exe 87 PID 724 wrote to memory of 1160 724 chrome.exe 87 PID 724 wrote to memory of 1160 724 chrome.exe 87 PID 724 wrote to memory of 1160 724 chrome.exe 87 PID 724 wrote to memory of 1160 724 chrome.exe 87 PID 724 wrote to memory of 1160 724 chrome.exe 87 PID 724 wrote to memory of 1160 724 chrome.exe 87 PID 724 wrote to memory of 1160 724 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://link.gmgb4.net/FliZ2VMjzRlmPTvK-bQvLO-EG4Po7onikJhuAD88K9cTMyA8JflOJA4t5fw_ZHRBY96xUF-Cu-DoTUq1JX_YVr5oVUtwcwuZqMCMx30gezvn2lcVsdVNfxQMlxsThiyZEiqbqteL15O48BpkZSSk2qh5SJMMwgCE-trUu9534R4ajgmVI11⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff8d5ad9758,0x7ff8d5ad9768,0x7ff8d5ad97782⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=364 --field-trial-handle=1860,i,3837806182954727362,563101480952409914,131072 /prefetch:22⤵PID:3684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1860,i,3837806182954727362,563101480952409914,131072 /prefetch:82⤵PID:3476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1860,i,3837806182954727362,563101480952409914,131072 /prefetch:82⤵PID:1160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2912 --field-trial-handle=1860,i,3837806182954727362,563101480952409914,131072 /prefetch:12⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1860,i,3837806182954727362,563101480952409914,131072 /prefetch:12⤵PID:3700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4792 --field-trial-handle=1860,i,3837806182954727362,563101480952409914,131072 /prefetch:82⤵PID:4752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4764 --field-trial-handle=1860,i,3837806182954727362,563101480952409914,131072 /prefetch:82⤵PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 --field-trial-handle=1860,i,3837806182954727362,563101480952409914,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1340
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:836
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824B
MD5db144eb00fa80d83ec3a653d41e18221
SHA16ebadf8aecf0a3a8ccc4b422c2a975757f9008e6
SHA25616e21b7ca90a5448081a140753ebee5acd9690557b652a9567eb36a15e51f9d7
SHA512b1f18b5fea62eb2e214a55270940c0834b4ba96d8284bf531bdbdb804d8e6804ad6f27eaa29f004d7aed73feda4802c01d7927184a904d5726bdd556f8139b8d
-
Filesize
6KB
MD51c092045335fb38847f599c93c1fcbce
SHA1eabed36e7bc43ece9f5e03d9c37348a782f17104
SHA2568b6f3d6d5c37bde2da4b02633af074007c05e4c87bc61f7bcddfd075534fa7b9
SHA512f358f46a7d14554c30be2f53eee7a2bc5a4e57c98ef76e80ec25ada2f18899522394c603ea246c437656767b3e01d8f6f7380df2e69bd00784bb7e7c061ede09
-
Filesize
87KB
MD59ce8e3b6b0dcf273d1a9a3acd352fae6
SHA175097003d5ccaa455de2d9fa4dfe028326ac3a80
SHA256d61b00961d3023343fdc1dd3192ae98132fbde72edccd0322662b4892c4ef19a
SHA5120542cd316b54bf6d5de992772c1cb1874268f0294b4b7ae27f30eadfcf677005e772424c0118db764145b9ab581a8835ed899c73a26394d4ace82de55cc7cc4a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd