Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2023 18:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://youtube.com/cgvyzyyq
Resource
win10v2004-20230915-en
General
-
Target
https://youtube.com/cgvyzyyq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133397928438310487" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4688 chrome.exe 4688 chrome.exe 3780 chrome.exe 3780 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4688 wrote to memory of 1992 4688 chrome.exe 25 PID 4688 wrote to memory of 1992 4688 chrome.exe 25 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 4608 4688 chrome.exe 87 PID 4688 wrote to memory of 3984 4688 chrome.exe 88 PID 4688 wrote to memory of 3984 4688 chrome.exe 88 PID 4688 wrote to memory of 404 4688 chrome.exe 89 PID 4688 wrote to memory of 404 4688 chrome.exe 89 PID 4688 wrote to memory of 404 4688 chrome.exe 89 PID 4688 wrote to memory of 404 4688 chrome.exe 89 PID 4688 wrote to memory of 404 4688 chrome.exe 89 PID 4688 wrote to memory of 404 4688 chrome.exe 89 PID 4688 wrote to memory of 404 4688 chrome.exe 89 PID 4688 wrote to memory of 404 4688 chrome.exe 89 PID 4688 wrote to memory of 404 4688 chrome.exe 89 PID 4688 wrote to memory of 404 4688 chrome.exe 89 PID 4688 wrote to memory of 404 4688 chrome.exe 89 PID 4688 wrote to memory of 404 4688 chrome.exe 89 PID 4688 wrote to memory of 404 4688 chrome.exe 89 PID 4688 wrote to memory of 404 4688 chrome.exe 89 PID 4688 wrote to memory of 404 4688 chrome.exe 89 PID 4688 wrote to memory of 404 4688 chrome.exe 89 PID 4688 wrote to memory of 404 4688 chrome.exe 89 PID 4688 wrote to memory of 404 4688 chrome.exe 89 PID 4688 wrote to memory of 404 4688 chrome.exe 89 PID 4688 wrote to memory of 404 4688 chrome.exe 89 PID 4688 wrote to memory of 404 4688 chrome.exe 89 PID 4688 wrote to memory of 404 4688 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://youtube.com/cgvyzyyq1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa267d9758,0x7ffa267d9768,0x7ffa267d97782⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1860,i,11705486978209752752,16183217930142124633,131072 /prefetch:22⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1860,i,11705486978209752752,16183217930142124633,131072 /prefetch:82⤵PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1860,i,11705486978209752752,16183217930142124633,131072 /prefetch:82⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2948 --field-trial-handle=1860,i,11705486978209752752,16183217930142124633,131072 /prefetch:12⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2936 --field-trial-handle=1860,i,11705486978209752752,16183217930142124633,131072 /prefetch:12⤵PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4532 --field-trial-handle=1860,i,11705486978209752752,16183217930142124633,131072 /prefetch:12⤵PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 --field-trial-handle=1860,i,11705486978209752752,16183217930142124633,131072 /prefetch:82⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4896 --field-trial-handle=1860,i,11705486978209752752,16183217930142124633,131072 /prefetch:82⤵PID:3836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3544 --field-trial-handle=1860,i,11705486978209752752,16183217930142124633,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3780
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD518b975b34c7c73512d2b3ce3ac73f0f7
SHA1b10e80a04c1313671f53814778b933e63961ea0e
SHA256a61807b1930f0245c479492aba8bb427d542421067866f9dc58137b0419082a0
SHA512449cc2c04241de4ab423ea0a114401cb06456af40600f96c8961bb8d3a246849d8f3e99076c1a79643bad8c3775e29c28db9dd2112acc0c04ba09042098a187e
-
Filesize
706B
MD5cf75cbd20301b41e28d674fede8cd070
SHA10b7f9423211de11a9a828ffbc606ad3456ac1c8d
SHA256a7bbd3f5bc3f59bd36ca5d19601c41659140205a41cf0a8d47fd3188836763d2
SHA5125d698140b9fbe7dd0122422abcbc8655b2f3f0cc7a6816d459371e109c3b37c534a0e0d9962eec3b71bb020308955259acc13a276966cf87b5b39e818ecd7bd3
-
Filesize
6KB
MD5c67f2130ffe0b4bca71c87691935aebc
SHA114486a711694dbf900aa9723628e0e396c5c3c22
SHA256995ba9cf809c374b44c67200fd29252b4420bf190857ebdc73f31226f05fea3a
SHA5120424866eaa41b5fe803029276f213e1b947d47537f3a2d2685133a9b60ebc62b7278e45c15ae0abeccdd6b442e609398d5fc71f3dc9c45371f10b977730deb08
-
Filesize
102KB
MD5bc612ca9465151eaf8862eeab799c994
SHA16ce7d3c04a3ce08249c146228e0dd1ffe139e050
SHA256158d69cef63cbc367d505ba7e84a989d70c0e4f66386adbfd7fbe882050f5f1c
SHA51222b1629fd5805e523a57ae0aeef9e2f39d14deeccae1696eeedd20e7ea352f56f694df9b748b8747af29733379612c68342d74d45c6a4a52847248166904ccb5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd