Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
22/09/2023, 07:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ci3.googleusercontent.com/proxy/5PNvmZlnfGY1GS5lyBpRUO4iWm0KH_S2mlA4y9Jcm6Bn0wiVWtZk584rwVCk7Ji3Vq9XZD93RA1FsyninZT3bBd5Hf4YdeCVWGqtrzVvK2XHgw8QLp0DzP484f_HmBDUZVgHjSpFlamxm6Uu_JGLH9t7tPrr6XiMRstjM4dyr7b5ZqhjpryNnmCCjzpS8AH8KXJH7VB7KCCuTisjmd8cKg=s0-d-e1-ft#https://facebook.com/aymt/aa/?e=
Resource
win10v2004-20230915-en
General
-
Target
https://ci3.googleusercontent.com/proxy/5PNvmZlnfGY1GS5lyBpRUO4iWm0KH_S2mlA4y9Jcm6Bn0wiVWtZk584rwVCk7Ji3Vq9XZD93RA1FsyninZT3bBd5Hf4YdeCVWGqtrzVvK2XHgw8QLp0DzP484f_HmBDUZVgHjSpFlamxm6Uu_JGLH9t7tPrr6XiMRstjM4dyr7b5ZqhjpryNnmCCjzpS8AH8KXJH7VB7KCCuTisjmd8cKg=s0-d-e1-ft#https://facebook.com/aymt/aa/?e=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133398417053650129" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1396 chrome.exe 1396 chrome.exe 3800 chrome.exe 3800 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1396 chrome.exe 1396 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe Token: SeShutdownPrivilege 1396 chrome.exe Token: SeCreatePagefilePrivilege 1396 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1396 wrote to memory of 4816 1396 chrome.exe 26 PID 1396 wrote to memory of 4816 1396 chrome.exe 26 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 4248 1396 chrome.exe 86 PID 1396 wrote to memory of 1184 1396 chrome.exe 88 PID 1396 wrote to memory of 1184 1396 chrome.exe 88 PID 1396 wrote to memory of 4384 1396 chrome.exe 87 PID 1396 wrote to memory of 4384 1396 chrome.exe 87 PID 1396 wrote to memory of 4384 1396 chrome.exe 87 PID 1396 wrote to memory of 4384 1396 chrome.exe 87 PID 1396 wrote to memory of 4384 1396 chrome.exe 87 PID 1396 wrote to memory of 4384 1396 chrome.exe 87 PID 1396 wrote to memory of 4384 1396 chrome.exe 87 PID 1396 wrote to memory of 4384 1396 chrome.exe 87 PID 1396 wrote to memory of 4384 1396 chrome.exe 87 PID 1396 wrote to memory of 4384 1396 chrome.exe 87 PID 1396 wrote to memory of 4384 1396 chrome.exe 87 PID 1396 wrote to memory of 4384 1396 chrome.exe 87 PID 1396 wrote to memory of 4384 1396 chrome.exe 87 PID 1396 wrote to memory of 4384 1396 chrome.exe 87 PID 1396 wrote to memory of 4384 1396 chrome.exe 87 PID 1396 wrote to memory of 4384 1396 chrome.exe 87 PID 1396 wrote to memory of 4384 1396 chrome.exe 87 PID 1396 wrote to memory of 4384 1396 chrome.exe 87 PID 1396 wrote to memory of 4384 1396 chrome.exe 87 PID 1396 wrote to memory of 4384 1396 chrome.exe 87 PID 1396 wrote to memory of 4384 1396 chrome.exe 87 PID 1396 wrote to memory of 4384 1396 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ci3.googleusercontent.com/proxy/5PNvmZlnfGY1GS5lyBpRUO4iWm0KH_S2mlA4y9Jcm6Bn0wiVWtZk584rwVCk7Ji3Vq9XZD93RA1FsyninZT3bBd5Hf4YdeCVWGqtrzVvK2XHgw8QLp0DzP484f_HmBDUZVgHjSpFlamxm6Uu_JGLH9t7tPrr6XiMRstjM4dyr7b5ZqhjpryNnmCCjzpS8AH8KXJH7VB7KCCuTisjmd8cKg=s0-d-e1-ft#https://facebook.com/aymt/aa/?e=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ce6e9758,0x7ff8ce6e9768,0x7ff8ce6e97782⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1764,i,3907786305603128206,609070465900702084,131072 /prefetch:22⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1764,i,3907786305603128206,609070465900702084,131072 /prefetch:82⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1764,i,3907786305603128206,609070465900702084,131072 /prefetch:82⤵PID:1184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2868 --field-trial-handle=1764,i,3907786305603128206,609070465900702084,131072 /prefetch:12⤵PID:740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2860 --field-trial-handle=1764,i,3907786305603128206,609070465900702084,131072 /prefetch:12⤵PID:3184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 --field-trial-handle=1764,i,3907786305603128206,609070465900702084,131072 /prefetch:82⤵PID:3992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 --field-trial-handle=1764,i,3907786305603128206,609070465900702084,131072 /prefetch:82⤵PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3780 --field-trial-handle=1764,i,3907786305603128206,609070465900702084,131072 /prefetch:82⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=956 --field-trial-handle=1764,i,3907786305603128206,609070465900702084,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3800
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f4d8f5ddb7cf2db4b84faca961d7112b
SHA10aa191abb0b96fe27d92583faf48bba196a29d0f
SHA2566bc8e345fb5dec8e89243c248c0a21ceb2cc782e7924da394e9393eefdd8c344
SHA51265219d86b4d5119f5c82471fac76c7b664b0f271ebe29fa6b8617790ae87d2fbadefb4ea6005a31d4338fe17ee533de8c84071df0898db33fd8d9255b59d3577
-
Filesize
1KB
MD5fb834eb1fbf53d4fb3739cfb4e85eecb
SHA1bac2c3df70c8f688a68d3d7dc78ca8465016b9ba
SHA2569c71d94b82ef83b6dcfe83a4c8437105a22034a966a17bd444aa1934dbc10660
SHA512b5b66b67f00aa2cd7a88b25615c8ddb2cc531c4cb4b2ee4b14bf15fb17369ba3628ee5f48acd5d83abc88b918bf45c8f2c60c2eb389788d327a7fdcdf25ec509
-
Filesize
1KB
MD59487e9e5a8f548f1d90c364cf3ba8872
SHA167dcba9521c1abc4d912df07ac51ca489a0bd43e
SHA2561b3f0e61479e53e858683928c11c162c15ec9b98b2fbf8c8c063501ad607eac7
SHA5122bd5e9fd093f37655fafa1792602966c605d9b6bbc205a28af2bfa0c12e0ff7063e4686eadfcf5a6c9143d91a3688602d231d92ae77f8ecb8dbe70e65412d81a
-
Filesize
1KB
MD5d1c2a44682caed868f62195047b5a451
SHA14e9eee0192b60b00d083be0ab33c9297a1c5f337
SHA25674787ab6c52f37e1a2e08e37d7e6ed4b9bd0daf8f50945016a977c384e9aaf52
SHA51274d1fbb0ff69c12af49f268fb9624ac965445c355c4ac5b2fb67e732421e9bccb862c05397629baaa27cb9ddb1eb837600a48205dabca9d2f74fc49df13e4763
-
Filesize
6KB
MD5549f990bec24d376318260960c0f9a49
SHA13243abfd049da24e747ef76834e03410f2cb1279
SHA256f7b0b18fd350cfffe8bc4a9b3eea4979bcf881e01b1cf37338ebb10017cb3813
SHA51264cc02309218c6c9a8e35a66e463635be89a99db3a6b1f772e0b642f15011d49c3d8b73957ac872d8115f8fcd739bf83c238c31f2f285b4b6df84fd0818f88ff
-
Filesize
101KB
MD53ddd25974ef4e9ca06af62cee4fb92e0
SHA1031f77ad30d50a67c54e52c40bbbcb863d6bbf93
SHA256c7aacc66aab7ac96f556114595c319dfa5f6f22edb0daedf6dc93cc9b9fa988f
SHA51290fb40a3cef26b99ff18d2a6623aca469e43d38a717778c4b358f7f9c2b69e6fd9debb69cc6975f880e509470533f125ef48022d8f80dbe2a5e4f537077ae664
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd