Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
22/09/2023, 03:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://fonts.googleapis.com/css2?family=Sora&display=swap
Resource
win10v2004-20230915-en
General
-
Target
https://fonts.googleapis.com/css2?family=Sora&display=swap
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133398270941712020" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4792 chrome.exe 4792 chrome.exe 1732 chrome.exe 1732 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe Token: SeShutdownPrivilege 4792 chrome.exe Token: SeCreatePagefilePrivilege 4792 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe 4792 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4792 wrote to memory of 1716 4792 chrome.exe 60 PID 4792 wrote to memory of 1716 4792 chrome.exe 60 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 4428 4792 chrome.exe 86 PID 4792 wrote to memory of 1264 4792 chrome.exe 88 PID 4792 wrote to memory of 1264 4792 chrome.exe 88 PID 4792 wrote to memory of 4812 4792 chrome.exe 87 PID 4792 wrote to memory of 4812 4792 chrome.exe 87 PID 4792 wrote to memory of 4812 4792 chrome.exe 87 PID 4792 wrote to memory of 4812 4792 chrome.exe 87 PID 4792 wrote to memory of 4812 4792 chrome.exe 87 PID 4792 wrote to memory of 4812 4792 chrome.exe 87 PID 4792 wrote to memory of 4812 4792 chrome.exe 87 PID 4792 wrote to memory of 4812 4792 chrome.exe 87 PID 4792 wrote to memory of 4812 4792 chrome.exe 87 PID 4792 wrote to memory of 4812 4792 chrome.exe 87 PID 4792 wrote to memory of 4812 4792 chrome.exe 87 PID 4792 wrote to memory of 4812 4792 chrome.exe 87 PID 4792 wrote to memory of 4812 4792 chrome.exe 87 PID 4792 wrote to memory of 4812 4792 chrome.exe 87 PID 4792 wrote to memory of 4812 4792 chrome.exe 87 PID 4792 wrote to memory of 4812 4792 chrome.exe 87 PID 4792 wrote to memory of 4812 4792 chrome.exe 87 PID 4792 wrote to memory of 4812 4792 chrome.exe 87 PID 4792 wrote to memory of 4812 4792 chrome.exe 87 PID 4792 wrote to memory of 4812 4792 chrome.exe 87 PID 4792 wrote to memory of 4812 4792 chrome.exe 87 PID 4792 wrote to memory of 4812 4792 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://fonts.googleapis.com/css2?family=Sora&display=swap1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb77299758,0x7ffb77299768,0x7ffb772997782⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=1884,i,15509098146440912010,1448360313132101171,131072 /prefetch:22⤵PID:4428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1300 --field-trial-handle=1884,i,15509098146440912010,1448360313132101171,131072 /prefetch:82⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1884,i,15509098146440912010,1448360313132101171,131072 /prefetch:82⤵PID:1264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3120 --field-trial-handle=1884,i,15509098146440912010,1448360313132101171,131072 /prefetch:12⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3096 --field-trial-handle=1884,i,15509098146440912010,1448360313132101171,131072 /prefetch:12⤵PID:3636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4544 --field-trial-handle=1884,i,15509098146440912010,1448360313132101171,131072 /prefetch:12⤵PID:4580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 --field-trial-handle=1884,i,15509098146440912010,1448360313132101171,131072 /prefetch:82⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 --field-trial-handle=1884,i,15509098146440912010,1448360313132101171,131072 /prefetch:82⤵PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2664 --field-trial-handle=1884,i,15509098146440912010,1448360313132101171,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1732
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5db8d48e9ff50f888a9900ca74128ed31
SHA1a5c158f9f9e87539c42bab2c4ce5cdb5383d57a3
SHA256830a70dddd0ab4f19ee173b6ab1a14a6bb1908856556dea020b1ff0f8613909c
SHA512f5a1c3f359c3bc96e3218551e330d31f21993a87845194a546e9491184ab722fdead981bd240c72d9650362d0b6609e0b24f9112a921216c66e6cfc4d44c1277
-
Filesize
371B
MD570f40dc6cf827127c27ad8c8b481b4cf
SHA1850007aae18529e7c9664d1972c917d4e9589630
SHA256fabf937d699d8edaf61dd13311def099b7166cb05aed3f351155ea61f05318fd
SHA5120cc14db28517219af8f278defe81d37c818d623e02ce9edefd572bfef6d15806a218b1eb4d574db48e5252479d020b375b8e8005cd7464877d88fcd2178e06a4
-
Filesize
6KB
MD53f12cf5e756214c6f4611a911a7c4edf
SHA17244366423789c8b0c6c972a2130038cb6ba4376
SHA2563a0e27a6ef9e91badabf3a3f1a291a0f410eed4bb57baa144687a37c16bbb472
SHA512ac424f0a36433143d9be8c4159af821d7f63a7d10c61862c541f01917b37e4e8713031df6ec0077cc717149675560bceb267761e083827f3ec03e0618b2d3c60
-
Filesize
5KB
MD5bc1b3adc5230218fec6fe03cc194464f
SHA1d604c9653ca8e1355a4762f795736ccb5175aa8e
SHA25641d3d420e2dc966b70cb475550259b975afc3370f5a2f61bfe4ee332ea843189
SHA51289ea667ac8f7db67db38cf80be52d40b736bd8eed6015534986cca2ba242584ab9c3821901bdf87181aaa55a52f19e48c0fadf9372053bef60d16c8ea47d4d8e
-
Filesize
5KB
MD52420b45c30980866ec08764282ba3c73
SHA1829c859fa57907cdb95c231b640cc304c735fc71
SHA256891fc7c0e9f00a7d4ac4bbbb69c3081a11196229b7b2e80c25c70ddef80e7b57
SHA512c50eb05710b3a069718df94730da1fde07c87440bae3ab31e112a9b89adbc807bef7bdc5ba47192e7fc7a642adadeb92c9aef92212a733a906400e35008222c2
-
Filesize
102KB
MD571e703ba4369eac6c5f036ec3772a4e0
SHA1fb2ebfde894bae6d96a46c3f5b1cf367ae00579e
SHA2565a86de408d16b5d87d7254fe90e7d855ec23df7054b2bfb39fa67c1358b6b744
SHA51280a9a409645ee9d942fafa03ffba745e363a6586e4a250989d653155b45d7c32ab20f614ef0527893ea4e692793766dd3c5d02a30dc6ff3870b88379bf5a9ffd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd