Analysis
-
max time kernel
1800s -
max time network
1691s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2023, 16:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://google.com
Resource
win10-20230915-en
Behavioral task
behavioral2
Sample
http://google.com
Resource
win10v2004-20230915-en
General
-
Target
http://google.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133406516796459238" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2944 chrome.exe 2944 chrome.exe 3684 chrome.exe 3684 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe Token: SeShutdownPrivilege 2944 chrome.exe Token: SeCreatePagefilePrivilege 2944 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe 2944 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2488 2944 chrome.exe 46 PID 2944 wrote to memory of 2488 2944 chrome.exe 46 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 3344 2944 chrome.exe 87 PID 2944 wrote to memory of 4020 2944 chrome.exe 89 PID 2944 wrote to memory of 4020 2944 chrome.exe 89 PID 2944 wrote to memory of 4940 2944 chrome.exe 88 PID 2944 wrote to memory of 4940 2944 chrome.exe 88 PID 2944 wrote to memory of 4940 2944 chrome.exe 88 PID 2944 wrote to memory of 4940 2944 chrome.exe 88 PID 2944 wrote to memory of 4940 2944 chrome.exe 88 PID 2944 wrote to memory of 4940 2944 chrome.exe 88 PID 2944 wrote to memory of 4940 2944 chrome.exe 88 PID 2944 wrote to memory of 4940 2944 chrome.exe 88 PID 2944 wrote to memory of 4940 2944 chrome.exe 88 PID 2944 wrote to memory of 4940 2944 chrome.exe 88 PID 2944 wrote to memory of 4940 2944 chrome.exe 88 PID 2944 wrote to memory of 4940 2944 chrome.exe 88 PID 2944 wrote to memory of 4940 2944 chrome.exe 88 PID 2944 wrote to memory of 4940 2944 chrome.exe 88 PID 2944 wrote to memory of 4940 2944 chrome.exe 88 PID 2944 wrote to memory of 4940 2944 chrome.exe 88 PID 2944 wrote to memory of 4940 2944 chrome.exe 88 PID 2944 wrote to memory of 4940 2944 chrome.exe 88 PID 2944 wrote to memory of 4940 2944 chrome.exe 88 PID 2944 wrote to memory of 4940 2944 chrome.exe 88 PID 2944 wrote to memory of 4940 2944 chrome.exe 88 PID 2944 wrote to memory of 4940 2944 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://google.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffffb0d9758,0x7ffffb0d9768,0x7ffffb0d97782⤵PID:2488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1880,i,4790944207663825941,5254690171669287614,131072 /prefetch:22⤵PID:3344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1880,i,4790944207663825941,5254690171669287614,131072 /prefetch:82⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1880,i,4790944207663825941,5254690171669287614,131072 /prefetch:82⤵PID:4020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2856 --field-trial-handle=1880,i,4790944207663825941,5254690171669287614,131072 /prefetch:12⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2840 --field-trial-handle=1880,i,4790944207663825941,5254690171669287614,131072 /prefetch:12⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4520 --field-trial-handle=1880,i,4790944207663825941,5254690171669287614,131072 /prefetch:12⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 --field-trial-handle=1880,i,4790944207663825941,5254690171669287614,131072 /prefetch:82⤵PID:740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 --field-trial-handle=1880,i,4790944207663825941,5254690171669287614,131072 /prefetch:82⤵PID:1332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3896 --field-trial-handle=1880,i,4790944207663825941,5254690171669287614,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3684
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD5d4de37944ad84ca5a89dfdb2dbbb8154
SHA178a6a1ac52c0ecc85da15cf2cbce145487a263b4
SHA25644ac5cb9780d0e19fee54c7bae17d5fddddcd2539e2795956aae4ec2fd0717d6
SHA51292fcf4073e623232cd5eb31b3e17aaca0a200003e75a281731ec54483da8826d473a979e7db30d4e018905327a3218a9dfc09a2e23300d8281fcf22ed1aa5c07
-
Filesize
384B
MD5ff59a7ef1438d62849b06e7f4bea5b96
SHA12bc1b65de16832374ecffc34494d88d53158bdd4
SHA256cd484a2416a484fdf56345627b8ca6c48a1bb57aa6c6ad336bf179a54622b96a
SHA512d7235c90c9b1c4623d9e62ccc5c2d75766a6831261e98301f93b2e22673c2fefd6a55da37cd1abc51c043ad83a5ae421ff12740771a51db313c7c42928556c63
-
Filesize
2KB
MD57cb01c73817202fde500d64be29ac184
SHA10be06ca2c128bfb0d23b21c7df1098921a9dc6a3
SHA25698c7f3e1a38ac880d3e15f91122d0b2037e3f2c41808aae4869087ae516acfec
SHA512424eb54b13d1daef1748136e5261321b0c03cfcef3c213d13cc4b034483250c57f39183faaefae3dfc4cc13c81b9a601e60f41143e1c20c25e9d8f1b2bfba130
-
Filesize
2KB
MD56aea1dcfd3b19d8fe7c1fe74f551c2d5
SHA1bfa381b5a3762aba19b6068698e9094b4d41c1f3
SHA256bb224a984dd0d7cb7376f7f585a9cec076de5946a35f3ca03e9a286ffd6b8611
SHA512d9b9f894eb0fa2aa2b1dd9c29e4d4021a5ea7c5a91fc3169afe2468b5dfa3144e23eae0c37da2b0b350cc07f7ef0b31c89952138408637a6ee0bf8b1517ec309
-
Filesize
2KB
MD5f62f86a015da9de8fa80e5a374c688a1
SHA1cd18c49c15d3c24b36be2958b4fa42aa2cc85c74
SHA256a3aca62a49d276a818325943ee8f490500e93195b03edde0978f519e870740f2
SHA51243bb9aeec5366c70d73d17da858d6f1467daaca3c44d0be4cdb215ca90b7e62df72c9e78ae8be934b2a96589aac10a50326f2f6ed527dc23a063589078dbf9fa
-
Filesize
2KB
MD51df2c3ce614e267e7d85d44a5535345e
SHA1cec9811df3693cb88e45731d648883f8a9f448be
SHA256da185d9523482e0a51d77237ab6425c0b36714c16da6ccec8ab112ff205bd148
SHA51288085a0e48c4bb311cb8833df383a9327229b9440eafbc9a2edfb7667c707e59500afb86ea6c7f73bd6f3f98d18cbf9a17b2ff0d76c6a21749c5011f0a2a35de
-
Filesize
539B
MD5ec1c68aaafea845867f59ee50f65241a
SHA18de806409eb9c71a751505aa71a6b3260ced89db
SHA256ff2b4cce5def7211a8bec822267e659a5ec07da231a75428f6a50ecc1430f661
SHA512cad9009747ceeca8fa897ad7e9a83ae5b65f5ace04b4013490085c8974ea77507724fd0e806fa4787c5cc48778f38a1e0cab2298738820fad96de367f68b2545
-
Filesize
6KB
MD5eb72dc42d512f28bac0c96ab1f64ac17
SHA1d8690feb5e906bd754367a21d2ca1f436196c883
SHA256143478ec97459b6d2e54a75e4e3e904bffb782b9ff04911cb9fa4fad26f96ef9
SHA512eb4e6acc658ccc2bf034d6e3fd0b9032acf608c72c6875f7fc091da963affc53b0f3c03c92f25724152ec461e4854a3b7e3510ee7bd7b4540898982567c468f9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd