Analysis
-
max time kernel
302s -
max time network
299s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2023, 18:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://groups.google.com/d/optout
Resource
win10v2004-20230915-en
General
-
Target
https://groups.google.com/d/optout
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133404875658683513" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1045988481-1457812719-2617974652-1000\{E2DBB7FE-95C0-433B-B316-9BD1F22A4796} chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1212 chrome.exe 1212 chrome.exe 4240 chrome.exe 4240 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1212 wrote to memory of 352 1212 chrome.exe 30 PID 1212 wrote to memory of 352 1212 chrome.exe 30 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 4332 1212 chrome.exe 85 PID 1212 wrote to memory of 1020 1212 chrome.exe 86 PID 1212 wrote to memory of 1020 1212 chrome.exe 86 PID 1212 wrote to memory of 2160 1212 chrome.exe 87 PID 1212 wrote to memory of 2160 1212 chrome.exe 87 PID 1212 wrote to memory of 2160 1212 chrome.exe 87 PID 1212 wrote to memory of 2160 1212 chrome.exe 87 PID 1212 wrote to memory of 2160 1212 chrome.exe 87 PID 1212 wrote to memory of 2160 1212 chrome.exe 87 PID 1212 wrote to memory of 2160 1212 chrome.exe 87 PID 1212 wrote to memory of 2160 1212 chrome.exe 87 PID 1212 wrote to memory of 2160 1212 chrome.exe 87 PID 1212 wrote to memory of 2160 1212 chrome.exe 87 PID 1212 wrote to memory of 2160 1212 chrome.exe 87 PID 1212 wrote to memory of 2160 1212 chrome.exe 87 PID 1212 wrote to memory of 2160 1212 chrome.exe 87 PID 1212 wrote to memory of 2160 1212 chrome.exe 87 PID 1212 wrote to memory of 2160 1212 chrome.exe 87 PID 1212 wrote to memory of 2160 1212 chrome.exe 87 PID 1212 wrote to memory of 2160 1212 chrome.exe 87 PID 1212 wrote to memory of 2160 1212 chrome.exe 87 PID 1212 wrote to memory of 2160 1212 chrome.exe 87 PID 1212 wrote to memory of 2160 1212 chrome.exe 87 PID 1212 wrote to memory of 2160 1212 chrome.exe 87 PID 1212 wrote to memory of 2160 1212 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://groups.google.com/d/optout1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe78fc9758,0x7ffe78fc9768,0x7ffe78fc97782⤵PID:352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1864,i,15493643237066997867,3470268871409540093,131072 /prefetch:22⤵PID:4332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1864,i,15493643237066997867,3470268871409540093,131072 /prefetch:82⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1864,i,15493643237066997867,3470268871409540093,131072 /prefetch:82⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2908 --field-trial-handle=1864,i,15493643237066997867,3470268871409540093,131072 /prefetch:12⤵PID:4504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2816 --field-trial-handle=1864,i,15493643237066997867,3470268871409540093,131072 /prefetch:12⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4620 --field-trial-handle=1864,i,15493643237066997867,3470268871409540093,131072 /prefetch:12⤵PID:3904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4908 --field-trial-handle=1864,i,15493643237066997867,3470268871409540093,131072 /prefetch:12⤵PID:3196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3164 --field-trial-handle=1864,i,15493643237066997867,3470268871409540093,131072 /prefetch:82⤵
- Modifies registry class
PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4920 --field-trial-handle=1864,i,15493643237066997867,3470268871409540093,131072 /prefetch:82⤵PID:928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 --field-trial-handle=1864,i,15493643237066997867,3470268871409540093,131072 /prefetch:82⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4044 --field-trial-handle=1864,i,15493643237066997867,3470268871409540093,131072 /prefetch:82⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2512 --field-trial-handle=1864,i,15493643237066997867,3470268871409540093,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4240
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4196
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3376
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:1568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD55d36d01394d85615eb870bd0683c729b
SHA1487f1a10702c9b357f9233e74029b0bc735f8f53
SHA2568da85defdbbece4760e9369cd3229c93964b4faa87673e500834d9da3588e422
SHA5124a819acc8cc765dca86c2266537158d9731f7ef0eaecc8108be0d2d328d0f6c8b23aa26a52c56bff57825a6639a220e4472f03eb6657ffe73845b3c2d3d46154
-
Filesize
2KB
MD532d198944c11c75415a6b8d9df3b4930
SHA1537fcfb61083b868f120601e980663d39214ac31
SHA256061462ef6035c4470bf29b3e90237210bb69348cb2920cd7d5d2330bc5f9e813
SHA5121edb3dc55fe7156fee37ec673549b2ef33dceb6ece6d9579f76a2727d095f1e67e086b2aa9ede0eba460d1c20c970fa47044252ce245d25e5a17f2fe85dba9be
-
Filesize
2KB
MD55e1b108d3801807f58d6b6def6965d0b
SHA1ef0d80755b1a378bf6a0d98bfc9412d75456354a
SHA2562129d5d654d506b87ea65a0cc5a7a68d2c6e1e28956ee0b16724ce2f2c04b542
SHA5125157451b771415f78a9c9ca668804cfbab20e911e904699d6ba2ef9e91cec6522a79c6ef4fa5b591d24ecf6399be3156608132066a4d59e90dd457ab9a75eca4
-
Filesize
371B
MD5d9a5f387d893db2256166ad4a31966f8
SHA108bc74df5f7b6b3a893f97dfb0c5e78626e913ff
SHA256778b562d7f830eb6b404709781405ef7f29438a0f68891dfdca5784403be8b4e
SHA512068098a9b8dfe406b4309159bf5405cb30f1c61a9dd17fe6f213cd1c9faa373a533705c211b8d6eab5b3f369820f4e51134dcb71d1f9ae4927417da9653c8074
-
Filesize
371B
MD5843ce22a6713185ee67401758cca4fe1
SHA190f4d8ebdb68c49c9eca6a4b5136e8b2d8da58a0
SHA25683900e37e4eccad3f0f540ecd11ff252833673a2febeabd3ecfac77ddea4aa95
SHA5126598ad739c7ad01986cef528b1973be42eea3cff9b183280dfd3656fec073607609d709ad5530cb1e58cab751ef5165f119dbf98187b11bde542c5260682be0c
-
Filesize
6KB
MD5eeded419c2a23f1064a2bd0e80ea5426
SHA1b85588703f1cdd2bb4713cd0fa8bf35aa5b7d327
SHA256beed001bfc3920e25545afd6971562bcaef349be5659413c3f31120f27c9de88
SHA51255581b18fcbbeb5c06969e11380565652286dd7da8ac69c8d6ca19c865002d5436ebea1239892ad054550b8276f60ef3076c4cfd5c3c5117949d41ab2155c553
-
Filesize
101KB
MD5b5ac8d81042dc8c2b035508f19e4c046
SHA1fd816fefe09d0ab3ab9a68300b26030a154b8bb3
SHA25633fecf55a633fea8c1919af26f027c17ef9a2e736c8e9a99322ced952a517ce1
SHA512b9c3c882364deace161bd38088b355ec4d1e6015c9905e06c25bfe380d1c227f0da7a1d0487d18305a35e351cab69bb7f53b2911ef2977089b16cd25b97199aa
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd