Analysis
-
max time kernel
66s -
max time network
70s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
22/09/2023, 16:13
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cn.bing.com/ck/a?!&&p=7e9ab7a60ffab264JmltdHM9MTY5MzE4MDgwMCZpZ3VpZD0wY2QyNDY4Mi00Mzg3LTZmZjctMWM3MC01NWE5NDI1YzZlNTQmaW5zaWQ9NTAwMw&ptn=3&hsh=3&fclid=0cd24682-4387-6ff7-1c70-55a9425c6e54&u=a1aHR0cHM6Ly9teWlwcy5jYy8#&&yygpKSi20te3tDRMrcpNrjBKNE61qMw0Mykry9dLN84vysrO0ysq1c/LKU/[email protected]
Resource
win10v2004-20230915-en
General
-
Target
https://cn.bing.com/ck/a?!&&p=7e9ab7a60ffab264JmltdHM9MTY5MzE4MDgwMCZpZ3VpZD0wY2QyNDY4Mi00Mzg3LTZmZjctMWM3MC01NWE5NDI1YzZlNTQmaW5zaWQ9NTAwMw&ptn=3&hsh=3&fclid=0cd24682-4387-6ff7-1c70-55a9425c6e54&u=a1aHR0cHM6Ly9teWlwcy5jYy8#&&yygpKSi20te3tDRMrcpNrjBKNE61qMw0Mykry9dLN84vysrO0ysq1c/LKU/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133398728054113905" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4444 chrome.exe 4444 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe Token: SeShutdownPrivilege 4444 chrome.exe Token: SeCreatePagefilePrivilege 4444 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4444 wrote to memory of 1256 4444 chrome.exe 20 PID 4444 wrote to memory of 1256 4444 chrome.exe 20 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 4056 4444 chrome.exe 87 PID 4444 wrote to memory of 3472 4444 chrome.exe 88 PID 4444 wrote to memory of 3472 4444 chrome.exe 88 PID 4444 wrote to memory of 992 4444 chrome.exe 89 PID 4444 wrote to memory of 992 4444 chrome.exe 89 PID 4444 wrote to memory of 992 4444 chrome.exe 89 PID 4444 wrote to memory of 992 4444 chrome.exe 89 PID 4444 wrote to memory of 992 4444 chrome.exe 89 PID 4444 wrote to memory of 992 4444 chrome.exe 89 PID 4444 wrote to memory of 992 4444 chrome.exe 89 PID 4444 wrote to memory of 992 4444 chrome.exe 89 PID 4444 wrote to memory of 992 4444 chrome.exe 89 PID 4444 wrote to memory of 992 4444 chrome.exe 89 PID 4444 wrote to memory of 992 4444 chrome.exe 89 PID 4444 wrote to memory of 992 4444 chrome.exe 89 PID 4444 wrote to memory of 992 4444 chrome.exe 89 PID 4444 wrote to memory of 992 4444 chrome.exe 89 PID 4444 wrote to memory of 992 4444 chrome.exe 89 PID 4444 wrote to memory of 992 4444 chrome.exe 89 PID 4444 wrote to memory of 992 4444 chrome.exe 89 PID 4444 wrote to memory of 992 4444 chrome.exe 89 PID 4444 wrote to memory of 992 4444 chrome.exe 89 PID 4444 wrote to memory of 992 4444 chrome.exe 89 PID 4444 wrote to memory of 992 4444 chrome.exe 89 PID 4444 wrote to memory of 992 4444 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cn.bing.com/ck/a?!&&p=7e9ab7a60ffab264JmltdHM9MTY5MzE4MDgwMCZpZ3VpZD0wY2QyNDY4Mi00Mzg3LTZmZjctMWM3MC01NWE5NDI1YzZlNTQmaW5zaWQ9NTAwMw&ptn=3&hsh=3&fclid=0cd24682-4387-6ff7-1c70-55a9425c6e54&u=a1aHR0cHM6Ly9teWlwcy5jYy8#&&yygpKSi20te3tDRMrcpNrjBKNE61qMw0Mykry9dLN84vysrO0ysq1c/LKU/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb88529758,0x7ffb88529768,0x7ffb885297782⤵PID:1256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1872,i,12357451943425843551,4067347657190821913,131072 /prefetch:22⤵PID:4056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2012 --field-trial-handle=1872,i,12357451943425843551,4067347657190821913,131072 /prefetch:82⤵PID:3472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1872,i,12357451943425843551,4067347657190821913,131072 /prefetch:82⤵PID:992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2928 --field-trial-handle=1872,i,12357451943425843551,4067347657190821913,131072 /prefetch:12⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2920 --field-trial-handle=1872,i,12357451943425843551,4067347657190821913,131072 /prefetch:12⤵PID:1984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3704 --field-trial-handle=1872,i,12357451943425843551,4067347657190821913,131072 /prefetch:12⤵PID:4332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4616 --field-trial-handle=1872,i,12357451943425843551,4067347657190821913,131072 /prefetch:12⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4580 --field-trial-handle=1872,i,12357451943425843551,4067347657190821913,131072 /prefetch:12⤵PID:3808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3196 --field-trial-handle=1872,i,12357451943425843551,4067347657190821913,131072 /prefetch:12⤵PID:1800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 --field-trial-handle=1872,i,12357451943425843551,4067347657190821913,131072 /prefetch:82⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 --field-trial-handle=1872,i,12357451943425843551,4067347657190821913,131072 /prefetch:82⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD57816b239008ffc15cbca5e8d0e137861
SHA1fb6ebc6310a71f00f50fdf82a24ac04c5f247e69
SHA2563c557f92f52c2d298c0575b4a40ee598679de1c75b5599dbe0c18cad80e7aa5f
SHA51276e08475e2597b2758f6587610d327997b00f7a368f93d95bc74f81218a4344a80731410a8df3a2c41e662e375c27183ff11ecc6f18586fb62cd7647a84dcf73
-
Filesize
538B
MD5c2143c5751c32e2d6a37ee5045b43dc1
SHA18242e2f37b53ecc1adc77b23d79394c0568559cc
SHA256e061356c832244e107266baedb31aba3aa1973f4fdaf889354cc5b3ef7fe5dc8
SHA512f47037a2b8a60900ca89bb3eb25fb88cc59cbb4554a5e4112941fc4450df26d0c9c71695c426a261b04e19051b6e56e8cc123f51ca2fa9a1da3902957c666bd5
-
Filesize
6KB
MD5532319a5a1d091312578e0b4c5d3a04c
SHA1fa27ada76e9cbe2bfb37878d3911aeb2108e887c
SHA256a0fab5ff136efa89f9b7458bf349e314cdde9f8aebfc504dc5096780b492b5de
SHA51276050ba96c8aef2c90cbf24df3b023b012de19c72e2eab39a4cfa73d29a9dbd5849d45a4a0a842beec616f4607320eeafe6e80fd155ce387575b99190c45b680
-
Filesize
101KB
MD5b37200b62d20619b59136c486c0e549d
SHA19b4d141e17d2aa4c4b623f1835f2f70ec43e05ad
SHA256679407d48167d28b2ccf09aedd34a720b0a3e266ff6d7ce40f081dfa657fee84
SHA512190b8b8f7099825a1160ece4fe13c6a9b66ff6f1bc59aed745434b990dfe56106b3b8546d712628b5e92914a471a0f32ef0a360c427043467863b21c3bf9f56e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd