Analysis
-
max time kernel
30s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
03-09-2023 21:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.google.com
Resource
win10v2004-20230831-en
General
-
Target
https://www.google.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133382492426775663" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3960 chrome.exe 3960 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe -
Suspicious use of AdjustPrivilegeToken 56 IoCs
description pid Process Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3960 wrote to memory of 5092 3960 chrome.exe 51 PID 3960 wrote to memory of 5092 3960 chrome.exe 51 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 1544 3960 chrome.exe 86 PID 3960 wrote to memory of 628 3960 chrome.exe 87 PID 3960 wrote to memory of 628 3960 chrome.exe 87 PID 3960 wrote to memory of 2076 3960 chrome.exe 88 PID 3960 wrote to memory of 2076 3960 chrome.exe 88 PID 3960 wrote to memory of 2076 3960 chrome.exe 88 PID 3960 wrote to memory of 2076 3960 chrome.exe 88 PID 3960 wrote to memory of 2076 3960 chrome.exe 88 PID 3960 wrote to memory of 2076 3960 chrome.exe 88 PID 3960 wrote to memory of 2076 3960 chrome.exe 88 PID 3960 wrote to memory of 2076 3960 chrome.exe 88 PID 3960 wrote to memory of 2076 3960 chrome.exe 88 PID 3960 wrote to memory of 2076 3960 chrome.exe 88 PID 3960 wrote to memory of 2076 3960 chrome.exe 88 PID 3960 wrote to memory of 2076 3960 chrome.exe 88 PID 3960 wrote to memory of 2076 3960 chrome.exe 88 PID 3960 wrote to memory of 2076 3960 chrome.exe 88 PID 3960 wrote to memory of 2076 3960 chrome.exe 88 PID 3960 wrote to memory of 2076 3960 chrome.exe 88 PID 3960 wrote to memory of 2076 3960 chrome.exe 88 PID 3960 wrote to memory of 2076 3960 chrome.exe 88 PID 3960 wrote to memory of 2076 3960 chrome.exe 88 PID 3960 wrote to memory of 2076 3960 chrome.exe 88 PID 3960 wrote to memory of 2076 3960 chrome.exe 88 PID 3960 wrote to memory of 2076 3960 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.google.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff7f449758,0x7fff7f449768,0x7fff7f4497782⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1856,i,10718815541955482439,16811193986413735825,131072 /prefetch:22⤵PID:1544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1856,i,10718815541955482439,16811193986413735825,131072 /prefetch:82⤵PID:628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1856,i,10718815541955482439,16811193986413735825,131072 /prefetch:82⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3176 --field-trial-handle=1856,i,10718815541955482439,16811193986413735825,131072 /prefetch:12⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3224 --field-trial-handle=1856,i,10718815541955482439,16811193986413735825,131072 /prefetch:12⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4596 --field-trial-handle=1856,i,10718815541955482439,16811193986413735825,131072 /prefetch:12⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4020 --field-trial-handle=1856,i,10718815541955482439,16811193986413735825,131072 /prefetch:82⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 --field-trial-handle=1856,i,10718815541955482439,16811193986413735825,131072 /prefetch:82⤵PID:648
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD5593164fde89753d985165ef3213c2a2e
SHA1f3a143835b5297c4fe1b620934de549dc8a13df7
SHA256d269b209e7188e8622762536c1ad016e7b4e42be7ff43e7ed2a9740758ddd15c
SHA5121e1d40e1ab18c9c053edc33c446ec4f6b9b63a74363ec37f674af5bbb0476f850e3f5e9d8988e19ab94af4f7d77ed65075231930c05cddf6c77aeed0de09b0c8
-
Filesize
537B
MD5ec8e5acff562f9e89457b696ff4429c3
SHA1061336ed2a754fa3fa4748ec4894d0154e2c7f92
SHA2561307f454b7e75f16c1033a6bb266198268ee4bc4aa9bd9bc17b70f233b02d1cd
SHA5128fbaea60e58539e7e9e5a0f8ebff7657669823770c0a073cda19d5ed7364c6e53f97644fa30ad39479f9a985abcfe1bde35baaa9d2a8f593cb75057f93994c44
-
Filesize
6KB
MD58269ad00167bb4eb22685c2d582e44bc
SHA1916ec594da07a9ac6321da638569474dea2b9497
SHA256a155059b0c375c43e695c29a47e46b6c6ae68d52931b76b3678f7785f41aa980
SHA512d788e0ee123426d00989507c040817b17aae91e2723eb03aa53e3e46773d915ccba6c46d014cce2180dc789dde67cb566d70a9c5a2938eaae4bb2167af6f7ebd
-
Filesize
97KB
MD5b58c69614ea9f8c38919d29e3ee358cc
SHA1c1e086e6716d7cc27fc9cc12f7a7f023e11540e3
SHA256a6521ad3efe32b3abeb3c28d19525f0c0bd86d6212689913f398c7072a6f2f99
SHA5123f26bd65862274216de8bc43d09f4e93d6d08ac4171b2e356432719de77b9a4e35f4d07e70b9ad5043453e81cd80691a26634196246f21e198f9371e53feb28c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd