Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
20/09/2023, 08:59
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://tinyurl.com/32e5fbca#[email protected]
Resource
win10-20230915-en
General
-
Target
https://tinyurl.com/32e5fbca#[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133396739928191314" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 404 chrome.exe 404 chrome.exe 916 chrome.exe 916 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe 404 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 404 wrote to memory of 416 404 chrome.exe 70 PID 404 wrote to memory of 416 404 chrome.exe 70 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 656 404 chrome.exe 73 PID 404 wrote to memory of 864 404 chrome.exe 72 PID 404 wrote to memory of 864 404 chrome.exe 72 PID 404 wrote to memory of 1824 404 chrome.exe 74 PID 404 wrote to memory of 1824 404 chrome.exe 74 PID 404 wrote to memory of 1824 404 chrome.exe 74 PID 404 wrote to memory of 1824 404 chrome.exe 74 PID 404 wrote to memory of 1824 404 chrome.exe 74 PID 404 wrote to memory of 1824 404 chrome.exe 74 PID 404 wrote to memory of 1824 404 chrome.exe 74 PID 404 wrote to memory of 1824 404 chrome.exe 74 PID 404 wrote to memory of 1824 404 chrome.exe 74 PID 404 wrote to memory of 1824 404 chrome.exe 74 PID 404 wrote to memory of 1824 404 chrome.exe 74 PID 404 wrote to memory of 1824 404 chrome.exe 74 PID 404 wrote to memory of 1824 404 chrome.exe 74 PID 404 wrote to memory of 1824 404 chrome.exe 74 PID 404 wrote to memory of 1824 404 chrome.exe 74 PID 404 wrote to memory of 1824 404 chrome.exe 74 PID 404 wrote to memory of 1824 404 chrome.exe 74 PID 404 wrote to memory of 1824 404 chrome.exe 74 PID 404 wrote to memory of 1824 404 chrome.exe 74 PID 404 wrote to memory of 1824 404 chrome.exe 74 PID 404 wrote to memory of 1824 404 chrome.exe 74 PID 404 wrote to memory of 1824 404 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://tinyurl.com/32e5fbca#[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffe8b079758,0x7ffe8b079768,0x7ffe8b0797782⤵PID:416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1928 --field-trial-handle=1768,i,16787955512809773371,852548016706644968,131072 /prefetch:82⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1568 --field-trial-handle=1768,i,16787955512809773371,852548016706644968,131072 /prefetch:22⤵PID:656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2056 --field-trial-handle=1768,i,16787955512809773371,852548016706644968,131072 /prefetch:82⤵PID:1824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2956 --field-trial-handle=1768,i,16787955512809773371,852548016706644968,131072 /prefetch:12⤵PID:504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2948 --field-trial-handle=1768,i,16787955512809773371,852548016706644968,131072 /prefetch:12⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3724 --field-trial-handle=1768,i,16787955512809773371,852548016706644968,131072 /prefetch:12⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3612 --field-trial-handle=1768,i,16787955512809773371,852548016706644968,131072 /prefetch:82⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4668 --field-trial-handle=1768,i,16787955512809773371,852548016706644968,131072 /prefetch:82⤵PID:356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5060 --field-trial-handle=1768,i,16787955512809773371,852548016706644968,131072 /prefetch:12⤵PID:1780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5028 --field-trial-handle=1768,i,16787955512809773371,852548016706644968,131072 /prefetch:12⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4604 --field-trial-handle=1768,i,16787955512809773371,852548016706644968,131072 /prefetch:82⤵PID:380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3220 --field-trial-handle=1768,i,16787955512809773371,852548016706644968,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:916
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5236860c054211a013a34ccd8cd8761bf
SHA113d3f0d2876b8cf537a339c7a61a4762cb56b6a8
SHA25623f00eaf96ddafc6ebc93c890fcc756e085e09ce9567047e5b9d4509d5a94be4
SHA51222d2c48c8da213d09c13ce7fcc94107377059e9fb5a0caca425594661136595699f2be5678e7f0c8d5cd0b29db9d74c8e984ea5d4316ea332a430391efa65336
-
Filesize
8KB
MD523b160c10b6667fcd56f454ce92945f8
SHA1d8bc93078310a6c72f38d5542b57cb528e324889
SHA256eb8205ca2debaaf676d14ffd5e1fd8a7079620bcf993ad99287a058fe1e0033d
SHA512104b1a7e0068e447e83870ea5491e4bc3b719f334be7125c8df45d241a978cddd47d5c66fe7801df54590510b8db9d8b212498fce9af32e08aeea6af9b77f0f1
-
Filesize
8KB
MD53e2320006fcdc379a4aed9f249503cfe
SHA17d186eb8dfc659a624889a72fc4098cf5a0742e5
SHA2568a0747af8320febecc6b3d04e658d77b4a82c78dc7d018184c80a7686e931d65
SHA51200e2223f8849313fe6d7599530417146ef0027272b277764bcb2ee9e549d792c21747ea140eb17713cf3dbf8d2676d1665ef9432e66efe58624b03c05f4bec99
-
Filesize
9KB
MD593cfdc344349f9cd5ad0e156bd790e72
SHA135b073f8277ed0168cde007dbfdda03ee98cb411
SHA25624670f825194b2a970b5fe8000a744eb87827982f5f40bbc22cec7c0cfdcdac6
SHA5127e86ebf96c1eff646d9343de77aef0ddf39c6e0eb7b96f2bb8f2a1c01a03fe9f065494e0898e55024d3230c9d258e473a902269e25b798e5cab5a208269f1186
-
Filesize
102KB
MD50ee922828a09d685018b231649617990
SHA1bc0fd0cf911ece08b8a2fca05691d4881b0e5a5b
SHA2562b5bed7b5593a5700bea6daaad9f96f5c274538d22dbb70e4f60abee19428e80
SHA5128aeaa661deaebc0d9c8865b83b25950338e3152701e4ae870d772ed95e00f2b7d0f5146d42bed9d6a22ac1a8392ebf6b719959700f5d33ad10fe37012b12ab4e
-
Filesize
99KB
MD5d50dfa148d90778376e5728c933ec7a6
SHA15b5fde0cc531b4d24e43326b256e90765870e6a1
SHA2560b94f061a03fcbfff56a4a62bffc4e137fd03e12d3708bbab124b3cc9c8aadee
SHA512a48921b4643f05f8c3ba6d2fd86237154bdfb0944aeac807f70bb3a9e7d0ac392e8a5a55202bdc53e023f5023680b6c55d4ab2dbe7ed0c0536d77a3b243b84c7
-
Filesize
97KB
MD597b28fc74ee82d2d249d6ddf5eb46199
SHA1f482872a9c9892d96f92072cee7973abb325c1d8
SHA256709365c58c4bbe4062da9b6fe979fe69a57a662aa6e91c5f7b2f2c694c4ca0b4
SHA5121bd9495a2962585d655163f89011e2d07d9856255f9cf2f2c4e78bc5934a0fa952e311ff4b3c90d66d2898fc03414ac035d9253467f9432aae5b1f9e8a218028
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd