Analysis
-
max time kernel
48s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2023, 11:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mik1xkeiafv.typeform.com/to/YjvKheaF
Resource
win10v2004-20230915-en
General
-
Target
https://mik1xkeiafv.typeform.com/to/YjvKheaF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133395094862521029" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 236 chrome.exe 236 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 236 chrome.exe 236 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 236 wrote to memory of 1320 236 chrome.exe 85 PID 236 wrote to memory of 1320 236 chrome.exe 85 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 4344 236 chrome.exe 92 PID 236 wrote to memory of 656 236 chrome.exe 88 PID 236 wrote to memory of 656 236 chrome.exe 88 PID 236 wrote to memory of 476 236 chrome.exe 89 PID 236 wrote to memory of 476 236 chrome.exe 89 PID 236 wrote to memory of 476 236 chrome.exe 89 PID 236 wrote to memory of 476 236 chrome.exe 89 PID 236 wrote to memory of 476 236 chrome.exe 89 PID 236 wrote to memory of 476 236 chrome.exe 89 PID 236 wrote to memory of 476 236 chrome.exe 89 PID 236 wrote to memory of 476 236 chrome.exe 89 PID 236 wrote to memory of 476 236 chrome.exe 89 PID 236 wrote to memory of 476 236 chrome.exe 89 PID 236 wrote to memory of 476 236 chrome.exe 89 PID 236 wrote to memory of 476 236 chrome.exe 89 PID 236 wrote to memory of 476 236 chrome.exe 89 PID 236 wrote to memory of 476 236 chrome.exe 89 PID 236 wrote to memory of 476 236 chrome.exe 89 PID 236 wrote to memory of 476 236 chrome.exe 89 PID 236 wrote to memory of 476 236 chrome.exe 89 PID 236 wrote to memory of 476 236 chrome.exe 89 PID 236 wrote to memory of 476 236 chrome.exe 89 PID 236 wrote to memory of 476 236 chrome.exe 89 PID 236 wrote to memory of 476 236 chrome.exe 89 PID 236 wrote to memory of 476 236 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mik1xkeiafv.typeform.com/to/YjvKheaF1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff084b9758,0x7fff084b9768,0x7fff084b97782⤵PID:1320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1916 --field-trial-handle=1968,i,3206087740590316604,5393762951145772276,131072 /prefetch:82⤵PID:656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1776 --field-trial-handle=1968,i,3206087740590316604,5393762951145772276,131072 /prefetch:82⤵PID:476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=1968,i,3206087740590316604,5393762951145772276,131072 /prefetch:12⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2992 --field-trial-handle=1968,i,3206087740590316604,5393762951145772276,131072 /prefetch:12⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1968,i,3206087740590316604,5393762951145772276,131072 /prefetch:22⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 --field-trial-handle=1968,i,3206087740590316604,5393762951145772276,131072 /prefetch:82⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 --field-trial-handle=1968,i,3206087740590316604,5393762951145772276,131072 /prefetch:82⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
648B
MD5bf420fb0cc27e3f28c5a8f9b43e8db60
SHA1ccbdf4037f0d493f6f99b164b431989fb35ddf68
SHA25689cd000e0a4d6b420c92399d837cf66ae7cb34ee033869374862db028fe23652
SHA5122771ae87c1532382c2411c535f10f839d95fc0d5829a7a3bb67bd3bedc6115ddacee0229d25a285da1bc1be5bd16cc2c06655bca236a5945f8305167092691fb
-
Filesize
1KB
MD52aaffe92c3234ae2aa203b7d684c60f7
SHA1158042575fcd345944ade4dec8da64e8ea7e6ae4
SHA256f8aa4711ed30f8c87bd865eaffe662f17dc274b94141e6d0e0e9360ef9be6483
SHA51215fde5327a3517d8fe629a914157e50edb8f94a13b8a8ce0a41b6581e93e95220abf39e8d39513c695c3587ac28b65059399ec43357b614a66079a88591baff5
-
Filesize
1KB
MD56414f357fb4fc971bf244757ea665423
SHA1eab0e061195bd3c66576f851b6f1b508d52a85fd
SHA25643bcb28a7102baaba064a0cca2e6f268f0ba5aa2e17429d8a1b0b44a28fb6640
SHA51213bd1296846386eff7673b02ba74034b911fef0e671a21ed3cf7676fb4b7266ab8815266a5f17773546806d43ec42306709bfb980aac32da5be78532f9befcd8
-
Filesize
6KB
MD593cd0ba0dd0d8e9258b840da8283cc26
SHA1ca54981c468eda3c89ed58dd87074af85a17012a
SHA2564f9bcf5f2af3560a0a5ed278042a88b95bebfce69fddf2ac695e777c2e4b0f2c
SHA512d57be075676b5032d942f61ee2cf2c3b16eb04ea79bc692ae35b4726013c6e65afd587fe544f4fd85112c8ddb6cb3e4e85d2cfc2ad00947823d17fcd1607d75d
-
Filesize
102KB
MD56a6b574202187977da9d0c4110621df9
SHA16e74bf7e37b699955af88183b6dea1de18c67592
SHA256b397c85732f74c15e141e0096fb74351ddb723a2a75eb8221333b5634e295ea4
SHA5124f126a5db32b077444d5d470595c591863760e2696577730e0147b747ad26bee269677a17ed7fb092c9c06797b0d38774a3f15b4c20f6f744a856674953c7462
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd