Analysis
-
max time kernel
60s -
max time network
58s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2023 18:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://m.community.com/mvAimOJm37hpVCIjf
Resource
win10v2004-20230915-en
General
-
Target
https://m.community.com/mvAimOJm37hpVCIjf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133404840786697011" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4524 chrome.exe 4524 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4524 chrome.exe 4524 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: 33 3192 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3192 AUDIODG.EXE Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe Token: SeShutdownPrivilege 4524 chrome.exe Token: SeCreatePagefilePrivilege 4524 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe 4524 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4524 wrote to memory of 4136 4524 chrome.exe 19 PID 4524 wrote to memory of 4136 4524 chrome.exe 19 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 752 4524 chrome.exe 80 PID 4524 wrote to memory of 1864 4524 chrome.exe 79 PID 4524 wrote to memory of 1864 4524 chrome.exe 79 PID 4524 wrote to memory of 4236 4524 chrome.exe 78 PID 4524 wrote to memory of 4236 4524 chrome.exe 78 PID 4524 wrote to memory of 4236 4524 chrome.exe 78 PID 4524 wrote to memory of 4236 4524 chrome.exe 78 PID 4524 wrote to memory of 4236 4524 chrome.exe 78 PID 4524 wrote to memory of 4236 4524 chrome.exe 78 PID 4524 wrote to memory of 4236 4524 chrome.exe 78 PID 4524 wrote to memory of 4236 4524 chrome.exe 78 PID 4524 wrote to memory of 4236 4524 chrome.exe 78 PID 4524 wrote to memory of 4236 4524 chrome.exe 78 PID 4524 wrote to memory of 4236 4524 chrome.exe 78 PID 4524 wrote to memory of 4236 4524 chrome.exe 78 PID 4524 wrote to memory of 4236 4524 chrome.exe 78 PID 4524 wrote to memory of 4236 4524 chrome.exe 78 PID 4524 wrote to memory of 4236 4524 chrome.exe 78 PID 4524 wrote to memory of 4236 4524 chrome.exe 78 PID 4524 wrote to memory of 4236 4524 chrome.exe 78 PID 4524 wrote to memory of 4236 4524 chrome.exe 78 PID 4524 wrote to memory of 4236 4524 chrome.exe 78 PID 4524 wrote to memory of 4236 4524 chrome.exe 78 PID 4524 wrote to memory of 4236 4524 chrome.exe 78 PID 4524 wrote to memory of 4236 4524 chrome.exe 78
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://m.community.com/mvAimOJm37hpVCIjf1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff3d569758,0x7fff3d569768,0x7fff3d5697782⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1868,i,6047918146812563751,15948924808462041770,131072 /prefetch:82⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2020 --field-trial-handle=1868,i,6047918146812563751,15948924808462041770,131072 /prefetch:82⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1868,i,6047918146812563751,15948924808462041770,131072 /prefetch:22⤵PID:752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1868,i,6047918146812563751,15948924808462041770,131072 /prefetch:12⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2988 --field-trial-handle=1868,i,6047918146812563751,15948924808462041770,131072 /prefetch:12⤵PID:3000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4552 --field-trial-handle=1868,i,6047918146812563751,15948924808462041770,131072 /prefetch:82⤵PID:1576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 --field-trial-handle=1868,i,6047918146812563751,15948924808462041770,131072 /prefetch:82⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4612 --field-trial-handle=1868,i,6047918146812563751,15948924808462041770,131072 /prefetch:82⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5028
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2fc 0x47c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5bc6930fd28b31db744fec09e8ea1e98c
SHA10280857d90c8c6810323979ecda4966f8e00e325
SHA256e0de8598d95cd10fb4f6c18e32e1bfaa19a9271cf632d89858144bd72543c4fd
SHA5128f360fc65351257eb4366193c4d5b625d985df9830b34a21be233eb3a0de37acaa7f28f14e1bb99c6b217660658a2ea345eaef106799e4abe7bf7da53f59a963
-
Filesize
1KB
MD5d7e0a73f4579151ed594b52897a3a986
SHA14eee0aeedbec121539d7d4bc578481b4a27b74f8
SHA256b464925896352569b21695399dc65f9c6ec35f2879272aaab9c2c7d3820c8935
SHA512a7e1c581a08bd17979569728a3a17b4c60c354503adb4616940312cb175a5e244730770a1382088942497c7350deb50dacc1772c382dbc6606521d13dc6f3e4b
-
Filesize
5KB
MD5aefa28ab75253d6b5350ad003a0370af
SHA105853204dc3b9bc66cb077fa0eccfe3cba8ca706
SHA2568eb652d03d74d0a2c96a0e8d2e6578214772e0b65369383013bd32d72ec8d1d7
SHA512d598c9a5be0fafa8f6c4ed1d663257257c42fde8d96c0c16728f303fee8f6d0aef4ae2e825091f875bfe3edc3dcceaf67479734d47a1fbe36632b10dc9f9e474
-
Filesize
5KB
MD53891852d344ac2a63c71ebda891d4a60
SHA15f787ad81611e9328de64c169116bd3d277f786e
SHA2563333e71a296d24818266ff681ecb0812209b17b0d698c7f3101bb78497499e3b
SHA51266097f2d749209eee40546b8b27f9f63facf009c16ea011364d95c77fc3fab75a0d70aa536d93e537712c3e7ba1f4bf42cc4ee856962e1d072b160111264e9d9
-
Filesize
101KB
MD5c8ad643cf372069d41321364388a5ef0
SHA132d8245752064d1094fce42933adf9b0b4a896b1
SHA2565c6239051bc869632f8609c58deea8715aadec68b6ee9bd4a6f82df03495cb35
SHA5120d417754bf2c809be286e0fadea84d441748f8bdb71036297ddfa286849e6cd52799675969315ee9c40e6c9125f155479f51c03740b4c9bead5b91211f42bb6f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd