Analysis
-
max time kernel
14s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
03/10/2023, 12:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://auth-lvysystem.us-southeast-1.linodeobjects.com:443/link-2.html
Resource
win7-20230831-en
General
-
Target
https://auth-lvysystem.us-southeast-1.linodeobjects.com:443/link-2.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2224 chrome.exe 2224 chrome.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeShutdownPrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe Token: SeShutdownPrivilege 2224 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe 2224 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2416 2224 chrome.exe 28 PID 2224 wrote to memory of 2416 2224 chrome.exe 28 PID 2224 wrote to memory of 2416 2224 chrome.exe 28 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2748 2224 chrome.exe 30 PID 2224 wrote to memory of 2488 2224 chrome.exe 31 PID 2224 wrote to memory of 2488 2224 chrome.exe 31 PID 2224 wrote to memory of 2488 2224 chrome.exe 31 PID 2224 wrote to memory of 2492 2224 chrome.exe 32 PID 2224 wrote to memory of 2492 2224 chrome.exe 32 PID 2224 wrote to memory of 2492 2224 chrome.exe 32 PID 2224 wrote to memory of 2492 2224 chrome.exe 32 PID 2224 wrote to memory of 2492 2224 chrome.exe 32 PID 2224 wrote to memory of 2492 2224 chrome.exe 32 PID 2224 wrote to memory of 2492 2224 chrome.exe 32 PID 2224 wrote to memory of 2492 2224 chrome.exe 32 PID 2224 wrote to memory of 2492 2224 chrome.exe 32 PID 2224 wrote to memory of 2492 2224 chrome.exe 32 PID 2224 wrote to memory of 2492 2224 chrome.exe 32 PID 2224 wrote to memory of 2492 2224 chrome.exe 32 PID 2224 wrote to memory of 2492 2224 chrome.exe 32 PID 2224 wrote to memory of 2492 2224 chrome.exe 32 PID 2224 wrote to memory of 2492 2224 chrome.exe 32 PID 2224 wrote to memory of 2492 2224 chrome.exe 32 PID 2224 wrote to memory of 2492 2224 chrome.exe 32 PID 2224 wrote to memory of 2492 2224 chrome.exe 32 PID 2224 wrote to memory of 2492 2224 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://auth-lvysystem.us-southeast-1.linodeobjects.com:443/link-2.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef73e9758,0x7fef73e9768,0x7fef73e97782⤵PID:2416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1180 --field-trial-handle=1252,i,12057937825484819748,10810641493280167842,131072 /prefetch:22⤵PID:2748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1524 --field-trial-handle=1252,i,12057937825484819748,10810641493280167842,131072 /prefetch:82⤵PID:2488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1628 --field-trial-handle=1252,i,12057937825484819748,10810641493280167842,131072 /prefetch:82⤵PID:2492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2292 --field-trial-handle=1252,i,12057937825484819748,10810641493280167842,131072 /prefetch:12⤵PID:1588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2300 --field-trial-handle=1252,i,12057937825484819748,10810641493280167842,131072 /prefetch:12⤵PID:1532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1112 --field-trial-handle=1252,i,12057937825484819748,10810641493280167842,131072 /prefetch:22⤵PID:1644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3688 --field-trial-handle=1252,i,12057937825484819748,10810641493280167842,131072 /prefetch:82⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a31b43d0c3d751fbeedc06eb13d7387c
SHA182733635e165b43ca49ca7c92ed9508bed3d674b
SHA2560a4a330bf71ecbc5fd55e12be04ff0c951f38f53f62435d0eeb57c3704494e0a
SHA5122d70a7ff71614425c0412eb1ce52df7ff892e5532dc8f076a90a3e48323c6787a38ebb76a2ef842e8d96f1908ec44cb45a33395c39adf3b12bf67821b1865a59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5382c38011a6694812bfbbf7c22fe1b38
SHA1b1fd8f79a5185a8f855c27d8ee23aa8b39b14358
SHA2568f86cf44c41f9d731b3aafc14a512169aef4b0d2b5edea9e8533d89876d8d009
SHA5124b07d678bff4f6fe94b1b70a6dd756b0580535e6138b7f8d1694e820220a8f0ae38d25216b4e42e634ff3eb3947aef98f6e6780cc30bb1cd1cfbfa3266d0ec72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518262bba9caf431802a224a350f241ba
SHA1c2585a0c4abf4386edc34baf20f9a05fbb329149
SHA2565c870d117ca761f42300ab08482441f6979a1d966d18838d5685132c63b04038
SHA5122649ae18b568bae688b00f0cffa4106bbe9bcc9df54228be2f6f580ddd56022dc9e784d8a88f41d3ecdfa69b7454c64b18a9f3e1187cbc6dc9c47a82412d72e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5134db7e716128778f923b4e20d4786ad
SHA1d951bf23a3e0ef34fbf7802cf23a83dd88d1b05a
SHA2560a48edaaa9381c2303b807a625bec6e8e16c74f407bcb7f2936d858d40464d8a
SHA5126b933a764a6ce4af6241b6ae5eb36c057cf12eccca9e590d1c0ab240b8d800c952158b0e7f9086f3a6446d9b4250d6949e2550a27f779eb5ea2130ae2e4e590f
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD58d81c867527e872c1f9723fe48fce8f4
SHA18918f27d68a7d528f9370d2fc9c1e3cf56e1ba2d
SHA2562cefcad8935f48ce8274ed93ed27be33017c48784e7d5e47b5ee7368a89821fe
SHA512be943804d328eff7132c6e64380f0779535739d17b8f2aa18c378d2affcbf01f076edc9164663e851e446fac2f0d3ccb9f339bcc383e715e93ab643954c25c37
-
Filesize
4KB
MD5fb809aa53cb4b45938ca1fcf6dfa03b9
SHA15ab3ada9230b02687550ca65c3e049821c426024
SHA256f2c6d13bd1d4d0b5514bc2ebe0544433dd6e38387c86f3b2aa96f04c0579c177
SHA5123871ceaca6cb0aefc001ee60ce6859842c31e8ae283d12df489362bbbe35cd7ed613d99bddbf8cc6306ccd58833de246606bb393b7f134a199a899d2de269b76
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf