Analysis
-
max time kernel
1800s -
max time network
1690s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
01/10/2023, 16:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://google.com
Resource
win10-20230915-en
Behavioral task
behavioral2
Sample
http://google.com
Resource
win10v2004-20230915-en
General
-
Target
http://google.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133406516776824934" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4648 chrome.exe 4648 chrome.exe 2184 chrome.exe 2184 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe Token: SeShutdownPrivilege 4648 chrome.exe Token: SeCreatePagefilePrivilege 4648 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe 4648 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4648 wrote to memory of 1788 4648 chrome.exe 70 PID 4648 wrote to memory of 1788 4648 chrome.exe 70 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 984 4648 chrome.exe 73 PID 4648 wrote to memory of 3232 4648 chrome.exe 72 PID 4648 wrote to memory of 3232 4648 chrome.exe 72 PID 4648 wrote to memory of 4656 4648 chrome.exe 74 PID 4648 wrote to memory of 4656 4648 chrome.exe 74 PID 4648 wrote to memory of 4656 4648 chrome.exe 74 PID 4648 wrote to memory of 4656 4648 chrome.exe 74 PID 4648 wrote to memory of 4656 4648 chrome.exe 74 PID 4648 wrote to memory of 4656 4648 chrome.exe 74 PID 4648 wrote to memory of 4656 4648 chrome.exe 74 PID 4648 wrote to memory of 4656 4648 chrome.exe 74 PID 4648 wrote to memory of 4656 4648 chrome.exe 74 PID 4648 wrote to memory of 4656 4648 chrome.exe 74 PID 4648 wrote to memory of 4656 4648 chrome.exe 74 PID 4648 wrote to memory of 4656 4648 chrome.exe 74 PID 4648 wrote to memory of 4656 4648 chrome.exe 74 PID 4648 wrote to memory of 4656 4648 chrome.exe 74 PID 4648 wrote to memory of 4656 4648 chrome.exe 74 PID 4648 wrote to memory of 4656 4648 chrome.exe 74 PID 4648 wrote to memory of 4656 4648 chrome.exe 74 PID 4648 wrote to memory of 4656 4648 chrome.exe 74 PID 4648 wrote to memory of 4656 4648 chrome.exe 74 PID 4648 wrote to memory of 4656 4648 chrome.exe 74 PID 4648 wrote to memory of 4656 4648 chrome.exe 74 PID 4648 wrote to memory of 4656 4648 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://google.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff8df699758,0x7ff8df699768,0x7ff8df6997782⤵PID:1788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2008 --field-trial-handle=1752,i,14633793608841843922,17947697816480747927,131072 /prefetch:82⤵PID:3232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1536 --field-trial-handle=1752,i,14633793608841843922,17947697816480747927,131072 /prefetch:22⤵PID:984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2100 --field-trial-handle=1752,i,14633793608841843922,17947697816480747927,131072 /prefetch:82⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2656 --field-trial-handle=1752,i,14633793608841843922,17947697816480747927,131072 /prefetch:12⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2648 --field-trial-handle=1752,i,14633793608841843922,17947697816480747927,131072 /prefetch:12⤵PID:4660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4340 --field-trial-handle=1752,i,14633793608841843922,17947697816480747927,131072 /prefetch:12⤵PID:4392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4608 --field-trial-handle=1752,i,14633793608841843922,17947697816480747927,131072 /prefetch:82⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4680 --field-trial-handle=1752,i,14633793608841843922,17947697816480747927,131072 /prefetch:82⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1496 --field-trial-handle=1752,i,14633793608841843922,17947697816480747927,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2184
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384B
MD5174cd8e5d51e09b9eca9be80e9084fde
SHA187f564a9d82a18870d6a448ef12419aa61008dc0
SHA2566a643f740c9362886afebd6bc3a7bdaa035dd49066ad8d3f2fea2e50ab5b5cb5
SHA512d7b7cefbd9425172ba8bcbbd82bb2495750442337f717ea4fd73ce3aae65f368935b17437a8e3ebc1cf1c32b7a47920ef36e43fdb7ab6b2b41c4b9a525776711
-
Filesize
2KB
MD5fe2a2966c75f17c5d012c781384f9f59
SHA1e3db4a3380a75c6ce8371afe9f7956122898b5c0
SHA256f280561525936f2a76d64ef6c988a288d17b29cf2aa1026cd18f02afc4f72382
SHA5120612da2ed3e39837bb11a329f32ff7ac5e058193cafd5f2f928db8f24820c3e10ab1f54a94c8e4ded0ecbe0163c51fd38bdb1f96e5bf13207174228c191adf00
-
Filesize
2KB
MD51afca25084952ff316c3565c90762815
SHA1d404b8c44c382f47a10f46d441917f3e58e7435c
SHA2560cffd3c182db75a709ab81197a28da3a59ae039445927df384e520eb45b0e992
SHA512694b85557ad14c5d1046e1faf01493444501c601616c53042320301f00c67fad5295c06f209403d18635459c79ff66c6bba15a815df81529098ff65f93f42513
-
Filesize
2KB
MD546bd5cea0e88a5dbbc28d78a5fb43ce5
SHA1aee3abe95d4e4c98d404059ced18f41550d12f18
SHA2565d3409f113274d4e66c2e003add504e6a26471dbd1aaecd2988ca3b59c87642d
SHA5123987d817cceb3cbbff151499311627e4044679299247b14fb7fa2789a8c9ded0b6d284ae9ee7fcdceb1139f4122db3320a67dbd950c203f25bca2b4f7bc9c7aa
-
Filesize
539B
MD5090f212e165277def4d445b93b20146b
SHA100664f6168aa84c33ad6ff525f4ea415dc081ce9
SHA2569f2e009c69905005fd3d4912c599409879ae329b26ce12cc6e5babb89ab1a1d3
SHA5127d7cca8a63c40ee9b265d0dbb37ff31d6f0020fd18043df9bb9e6546e68b300205ca1e90d444a44ce55aab2d88ee89873f4432b8ac9ae011552e9e45254bf08b
-
Filesize
6KB
MD5950b90e46e8a4d0ae03005100f62786c
SHA18c81c18a17e9e83e31a774e4147d8f0c60b51697
SHA25645cd3b2c5bce18516928994804c9cca3637bbbd4c40ede75e2fa7b09c0129700
SHA512b65a1b0c83ea299308fd3c8c0ca97d5bc8a0773ca05284244f3ca36d5cd18d9c3491d9fdbdc376d2ae27348d863472ba4fef8c0d30d0cd9c11cc774ca951eda0
-
Filesize
6KB
MD527d3b7a87c568340134597c03d0a8294
SHA13d7e4823a8be563d6e34516d817d88853ab28d7b
SHA256a36fcb54f2025ce3f077a06cc93e6e32f50d6ae843b205c1cc6a094176a0e50f
SHA5126a24721d7d9593731bd4169b8bda4d5f307f8aa41a7c493885be559f4f5feaaf3f41d1e1199c6ed8c5e72e97329a2967c2343bf408fa4d6601f3be79f642240f
-
Filesize
6KB
MD55a951d88b1633b0e878995691e80cbb2
SHA1d95f895ac9f9ebca56d5d9292291aeef371d2ea1
SHA2561e98e2aea801e4907053dd0478e0e62fa04d7d592d183c8288b6ff766892bd14
SHA512ba4faec0dc13ca4c3938d8f55e64a65a44073934e3957a23fd3ea7d196506d24b483085c5a9322d5ae06228a6d9cf83dfd3d4fc1657f59e5e223c6f0969e566a
-
Filesize
101KB
MD512fa1f48ea29845213bc99df860574fa
SHA1528f36b7dec2e7f15516c604ef0ffd54758c535d
SHA25626c2ed99c103ebfe808220881c7770f308ce071f6ec9292381d893e104306198
SHA512c0870188b6ab3572e55f52880a5a73b464c55c5946a27265a7e890104f3639564d68d537b2bc3708090f2deb2770e0468c58c0114939126630f574bee4df9068
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd