Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2023 04:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://morelinks.site/lk7cc
Resource
win10v2004-20230831-en
General
-
Target
https://morelinks.site/lk7cc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 4624 chrome.exe 4624 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe Token: SeShutdownPrivilege 2940 chrome.exe Token: SeCreatePagefilePrivilege 2940 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe 2940 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2940 wrote to memory of 856 2940 chrome.exe 29 PID 2940 wrote to memory of 856 2940 chrome.exe 29 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 2260 2940 chrome.exe 85 PID 2940 wrote to memory of 1224 2940 chrome.exe 86 PID 2940 wrote to memory of 1224 2940 chrome.exe 86 PID 2940 wrote to memory of 4216 2940 chrome.exe 87 PID 2940 wrote to memory of 4216 2940 chrome.exe 87 PID 2940 wrote to memory of 4216 2940 chrome.exe 87 PID 2940 wrote to memory of 4216 2940 chrome.exe 87 PID 2940 wrote to memory of 4216 2940 chrome.exe 87 PID 2940 wrote to memory of 4216 2940 chrome.exe 87 PID 2940 wrote to memory of 4216 2940 chrome.exe 87 PID 2940 wrote to memory of 4216 2940 chrome.exe 87 PID 2940 wrote to memory of 4216 2940 chrome.exe 87 PID 2940 wrote to memory of 4216 2940 chrome.exe 87 PID 2940 wrote to memory of 4216 2940 chrome.exe 87 PID 2940 wrote to memory of 4216 2940 chrome.exe 87 PID 2940 wrote to memory of 4216 2940 chrome.exe 87 PID 2940 wrote to memory of 4216 2940 chrome.exe 87 PID 2940 wrote to memory of 4216 2940 chrome.exe 87 PID 2940 wrote to memory of 4216 2940 chrome.exe 87 PID 2940 wrote to memory of 4216 2940 chrome.exe 87 PID 2940 wrote to memory of 4216 2940 chrome.exe 87 PID 2940 wrote to memory of 4216 2940 chrome.exe 87 PID 2940 wrote to memory of 4216 2940 chrome.exe 87 PID 2940 wrote to memory of 4216 2940 chrome.exe 87 PID 2940 wrote to memory of 4216 2940 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://morelinks.site/lk7cc1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe626c9758,0x7ffe626c9768,0x7ffe626c97782⤵PID:856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1884,i,15391231319977193800,3093922416993632358,131072 /prefetch:22⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 --field-trial-handle=1884,i,15391231319977193800,3093922416993632358,131072 /prefetch:82⤵PID:1224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1884,i,15391231319977193800,3093922416993632358,131072 /prefetch:82⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1884,i,15391231319977193800,3093922416993632358,131072 /prefetch:12⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1884,i,15391231319977193800,3093922416993632358,131072 /prefetch:12⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4684 --field-trial-handle=1884,i,15391231319977193800,3093922416993632358,131072 /prefetch:12⤵PID:1160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 --field-trial-handle=1884,i,15391231319977193800,3093922416993632358,131072 /prefetch:82⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 --field-trial-handle=1884,i,15391231319977193800,3093922416993632358,131072 /prefetch:82⤵PID:4200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 --field-trial-handle=1884,i,15391231319977193800,3093922416993632358,131072 /prefetch:82⤵PID:3752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3728 --field-trial-handle=1884,i,15391231319977193800,3093922416993632358,131072 /prefetch:82⤵PID:1944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4724 --field-trial-handle=1884,i,15391231319977193800,3093922416993632358,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4624
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD519f9a619615c61956fedc1c69b5fc663
SHA11f0e99e9fce0b9123268528006fee489cdba3c6a
SHA256137b84daba08786be0a05213674badbcaee0e7cb87f3ca643f773a489b59fcf5
SHA512b5d0f1443126b29d62ba4f674f77b46df9e288dc90d08a22a7445bba6a5bf4f25dbcfbd7663693af92e289a5cc8af901241ba5a89ca471f5004859a7163221ab
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\2d326753-82a2-4ea6-aaae-6d401f3757ec.tmp
Filesize1KB
MD5167df31f4fe1fa0ee4f1e06c0c8c737d
SHA1b3a16fda5b036022875523b9326bbeab9447e524
SHA2562ec4ee49538638810c4cafd0dafb4d22c4d4f3f137b79816b07d78f5eba61c0b
SHA51228af0d23d0ef0417aae284f81d8b108c12ec030308d94ea4fad3aaaa47ed02f60f48561a78d0a4ec724adf10a2c88c95b040973751c0f44d4de475f5d5d2ba9c
-
Filesize
3KB
MD517be6fd6925fd1c9bcb04ada4f648d79
SHA1f98620a2a1ed522d66329f70da7c51817320c238
SHA25672d3636f752a988202c7799be0047e0e0a26de9fdcec101ea6991b9922f318ef
SHA512e5aa2ade0d464d9d7bb6bf2150289bc80e850bf357f367b456d601176552e80d6785d19a7144740e37d9bac894931594b40a31f16f587ab2a7b3d7f274cbadfb
-
Filesize
3KB
MD5e7c41cca4877dea76f1ce6d7cff0bb38
SHA1a11291a23c0f409846c88599f1425dceca06a154
SHA2564064ea8eb3b8d9b51f412c92d25c0b3c8200704718d9a42af57bca408a796a69
SHA5126ec67eacb78366a4026b4a669cd57d102f1eb2000363400fa99cf7616375ee3b9ecd7258ee5f99ab14a8381cad178e165ecd8d6f4ca46cfbda44c79afa76e84e
-
Filesize
6KB
MD558e06be1eca1a9ad28de7e6b0a59fa85
SHA1c7f0171eb40b7d64f43561714bfdf499522836ff
SHA256bc5ed58e13d0c3cd878706354d73fa575dbe874e34bf58769de2567cb1a9df81
SHA512591e162c7b4b53f55718532d80f863a21b3e31f81a4970d6d90e80ef46c64fb6fdb065bec514771c476cba72450ba9a74011d1bdb469fe756d01f6e92426b52e
-
Filesize
100KB
MD5149aa3dfacbddaddbde0c7cf744e9bbb
SHA165fd518d1ddb9ddd32462d256093a083a5e1fb2e
SHA256911f23c88472b89c7f5178f01c7ba9367949b3468c4aa05a38663702e0062b6c
SHA512745dbb669f2e52d2216a0d8a792e59ae69a00ff70aa1b432bb1aa29a2a2f9030cd2f77f55d768541b698c9c5e45c722fda51fb80553cb7992008665f68dcd4a5
-
Filesize
119KB
MD528eeb0ea0aa2edfbf26e6d065fc23f96
SHA1b42d9aef180ec68d3c83f34046f9eb6cbdeca661
SHA2565ca2acb3592b19cc3bb3376b243b0b6d57bfcba4254598ddf573ae96c1119f62
SHA512b07bee11347b1847f288d2133bf51829c492d100b87afdc198108c1a9d05c79ce1af688f4f9b27458843d299f1fc1cec7c6989c009e81c5d6a0135977c4d76b3
-
Filesize
99KB
MD5767c17215c031df07746c459af127b73
SHA18b749af5db47f39b7e3b6931905b1dc051ac3c3c
SHA256ed6107ba3fafa692663cf1990cc62fd26b2ce325f851834e04e4bbbf7aeb63c0
SHA5121165858005f72120aae1f9413abe6c91092b0dfb02a23fed1701f7b6dcdb623b151986cb71aac48f7463c364cff8b56fcdd55356a5ae9124b5fb3e5841192422
-
Filesize
99KB
MD5f1be1cbc7a4a5ccba7170c46a5369377
SHA12d3015e96d6f410777af126d7a0106d8d19177fb
SHA25689cab4b951d67747ef8fba025ed4188cf165885048f986bc5d1eb7e7eb71d236
SHA51287f76cd4849453f821f9f0616f22072203cd7dc26f6bd24d646aca2de416ac84a1156380a9cadf8d153d189e429c9433d0a9df7063c71a85f4c54a7e3e6b10a3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd