Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2023 07:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://gcs-eu-00002.content-storage-upload.googleapis.com
Resource
win10v2004-20230915-en
General
-
Target
http://gcs-eu-00002.content-storage-upload.googleapis.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133394962589017234" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2500 chrome.exe 2500 chrome.exe 436 chrome.exe 436 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2500 chrome.exe 2500 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2280 2500 chrome.exe 38 PID 2500 wrote to memory of 2280 2500 chrome.exe 38 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4480 2500 chrome.exe 89 PID 2500 wrote to memory of 4228 2500 chrome.exe 92 PID 2500 wrote to memory of 4228 2500 chrome.exe 92 PID 2500 wrote to memory of 2256 2500 chrome.exe 90 PID 2500 wrote to memory of 2256 2500 chrome.exe 90 PID 2500 wrote to memory of 2256 2500 chrome.exe 90 PID 2500 wrote to memory of 2256 2500 chrome.exe 90 PID 2500 wrote to memory of 2256 2500 chrome.exe 90 PID 2500 wrote to memory of 2256 2500 chrome.exe 90 PID 2500 wrote to memory of 2256 2500 chrome.exe 90 PID 2500 wrote to memory of 2256 2500 chrome.exe 90 PID 2500 wrote to memory of 2256 2500 chrome.exe 90 PID 2500 wrote to memory of 2256 2500 chrome.exe 90 PID 2500 wrote to memory of 2256 2500 chrome.exe 90 PID 2500 wrote to memory of 2256 2500 chrome.exe 90 PID 2500 wrote to memory of 2256 2500 chrome.exe 90 PID 2500 wrote to memory of 2256 2500 chrome.exe 90 PID 2500 wrote to memory of 2256 2500 chrome.exe 90 PID 2500 wrote to memory of 2256 2500 chrome.exe 90 PID 2500 wrote to memory of 2256 2500 chrome.exe 90 PID 2500 wrote to memory of 2256 2500 chrome.exe 90 PID 2500 wrote to memory of 2256 2500 chrome.exe 90 PID 2500 wrote to memory of 2256 2500 chrome.exe 90 PID 2500 wrote to memory of 2256 2500 chrome.exe 90 PID 2500 wrote to memory of 2256 2500 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://gcs-eu-00002.content-storage-upload.googleapis.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8c259758,0x7ffa8c259768,0x7ffa8c2597782⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=2068,i,10240722166947795291,7503207606635191704,131072 /prefetch:22⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=2068,i,10240722166947795291,7503207606635191704,131072 /prefetch:82⤵PID:2256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2728 --field-trial-handle=2068,i,10240722166947795291,7503207606635191704,131072 /prefetch:12⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1952 --field-trial-handle=2068,i,10240722166947795291,7503207606635191704,131072 /prefetch:82⤵PID:4228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2736 --field-trial-handle=2068,i,10240722166947795291,7503207606635191704,131072 /prefetch:12⤵PID:1604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4776 --field-trial-handle=2068,i,10240722166947795291,7503207606635191704,131072 /prefetch:82⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 --field-trial-handle=2068,i,10240722166947795291,7503207606635191704,131072 /prefetch:82⤵PID:384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2576 --field-trial-handle=2068,i,10240722166947795291,7503207606635191704,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:436
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f09bd3f25b20230860584d96ba4501c2
SHA1c630392f1f6525a8502b1617b7671b42d0d9872a
SHA25645f02140c9295fe6718ee675b4d6539f5984520f2c32909483fbc98104eb28ae
SHA512127de3adcd60f7a793384c61cc1b88931357b6b40a74aec70253afa5c7b99430a377a5f8bd56ed895d6fe8102682ced08a0211f3a5486c655e18c4f4a981818e
-
Filesize
6KB
MD597763a3e3626eae00e501c116b2df89b
SHA1092db521258ba76a2ce909904ede837a2007cd52
SHA256a631f3a184ea81615b7d7b6edb8a22c5583ac0493d8bdeb17c237c18fdbeb677
SHA512c7d5a3352210b1a5042a48357acc43bff3f7e0b26ef54990f3d4b4893b256f93e87cfe8fe36598bb0be80762a8ec7d9152d54bd3c4d2a4cea0358a54eeebe38f
-
Filesize
6KB
MD582d08e4d5f56a107b0fb210cc644421d
SHA1cdb0e71cdb4af675aba9b0df26668e0ae68e2018
SHA2569aea3bab0b9d4bfb2011559e59c0325a5524169e900dab94c8056d9addf3c17d
SHA512945af46432bcdb61de7cc00095ea10df81ae735a07308817d05c60634dc32c966278ad3e9266146369f3e59441a036aba442995b283b4c0b7461b022ad6b7b7a
-
Filesize
102KB
MD5a5193d03c3a756ce391d051699ac730e
SHA19f5ba549466a5d8ffcf70ae10b881fa3dfcf1dfc
SHA25630f69a567f672c978177f27fe835b5aeebbe5962bbcf1d8af31c314a9aeff3bb
SHA5127d97f55d8fd0fbbcbc0fc1c5973a371117eb3e7f367712acd80140d53a0e38871c4fa0eb88dc7729dd2e2f6f2a38d98a70684496274dce949324f4e0f93afbe2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd