Analysis
-
max time kernel
95s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2023 18:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://go.redirectingat.com/?id=92X363&xcust=trdpro_us_1541938487208509200&xs=1&url=http://3cloudsoft.com/[email protected]
Resource
win10v2004-20230915-en
General
-
Target
https://go.redirectingat.com/?id=92X363&xcust=trdpro_us_1541938487208509200&xs=1&url=http://3cloudsoft.com/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133408300737061716" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1184 chrome.exe 1184 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe Token: SeShutdownPrivilege 1184 chrome.exe Token: SeCreatePagefilePrivilege 1184 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe 1184 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1184 wrote to memory of 5068 1184 chrome.exe 31 PID 1184 wrote to memory of 5068 1184 chrome.exe 31 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 4284 1184 chrome.exe 87 PID 1184 wrote to memory of 1620 1184 chrome.exe 88 PID 1184 wrote to memory of 1620 1184 chrome.exe 88 PID 1184 wrote to memory of 4452 1184 chrome.exe 89 PID 1184 wrote to memory of 4452 1184 chrome.exe 89 PID 1184 wrote to memory of 4452 1184 chrome.exe 89 PID 1184 wrote to memory of 4452 1184 chrome.exe 89 PID 1184 wrote to memory of 4452 1184 chrome.exe 89 PID 1184 wrote to memory of 4452 1184 chrome.exe 89 PID 1184 wrote to memory of 4452 1184 chrome.exe 89 PID 1184 wrote to memory of 4452 1184 chrome.exe 89 PID 1184 wrote to memory of 4452 1184 chrome.exe 89 PID 1184 wrote to memory of 4452 1184 chrome.exe 89 PID 1184 wrote to memory of 4452 1184 chrome.exe 89 PID 1184 wrote to memory of 4452 1184 chrome.exe 89 PID 1184 wrote to memory of 4452 1184 chrome.exe 89 PID 1184 wrote to memory of 4452 1184 chrome.exe 89 PID 1184 wrote to memory of 4452 1184 chrome.exe 89 PID 1184 wrote to memory of 4452 1184 chrome.exe 89 PID 1184 wrote to memory of 4452 1184 chrome.exe 89 PID 1184 wrote to memory of 4452 1184 chrome.exe 89 PID 1184 wrote to memory of 4452 1184 chrome.exe 89 PID 1184 wrote to memory of 4452 1184 chrome.exe 89 PID 1184 wrote to memory of 4452 1184 chrome.exe 89 PID 1184 wrote to memory of 4452 1184 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://go.redirectingat.com/?id=92X363&xcust=trdpro_us_1541938487208509200&xs=1&url=http://3cloudsoft.com/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffb64949758,0x7ffb64949768,0x7ffb649497782⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1900,i,3829088348319459743,5244570018207635282,131072 /prefetch:22⤵PID:4284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1900,i,3829088348319459743,5244570018207635282,131072 /prefetch:82⤵PID:1620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1900,i,3829088348319459743,5244570018207635282,131072 /prefetch:82⤵PID:4452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1900,i,3829088348319459743,5244570018207635282,131072 /prefetch:12⤵PID:1304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3032 --field-trial-handle=1900,i,3829088348319459743,5244570018207635282,131072 /prefetch:12⤵PID:4048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4564 --field-trial-handle=1900,i,3829088348319459743,5244570018207635282,131072 /prefetch:12⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4776 --field-trial-handle=1900,i,3829088348319459743,5244570018207635282,131072 /prefetch:12⤵PID:788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4840 --field-trial-handle=1900,i,3829088348319459743,5244570018207635282,131072 /prefetch:12⤵PID:4040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 --field-trial-handle=1900,i,3829088348319459743,5244570018207635282,131072 /prefetch:82⤵PID:988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 --field-trial-handle=1900,i,3829088348319459743,5244570018207635282,131072 /prefetch:82⤵PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1696 --field-trial-handle=1900,i,3829088348319459743,5244570018207635282,131072 /prefetch:12⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5567ecb862036290f0a1e62d50e7d1019
SHA1490ef0d2c3998d743be4194496b02c20edf9ba99
SHA25667f51a273cd6b37c02aef0c9efe36b1f14216d5c260c138db2a32c175b0767de
SHA512d6a49933ba52b06939246065b73cbb6a07cb758e5ab1660d9c45a84397017fd534ca5d7d5dd0f6565f02bb5ca74a56fd6cd7259639fbcc20c7de0788049a3b95
-
Filesize
216B
MD5c1ed103f7078d209e1c2183b72dee583
SHA18654e45ca6e31384e767c8ccc249b54f912d109f
SHA2564eee805cd75450d12a1fa51855321f0a91294c8f59813650372690d8498c72db
SHA512a66508cc022de0d77f62d67107820c1e5fbffe265566733991b836fbbbde6141dc2237fbaeebb093c51a399101df5667b998f6bb47a52107fcd5f2880d49a9d2
-
Filesize
120B
MD51b5c5791eace8f0c8057a744850fd51c
SHA19f6daa460e26e9323cf2c16db51884af03bf32ab
SHA25670cd1e1058580841f3807595aa0b05c9b51691242cbde8f459eed2beaf39056a
SHA512535b31aeba1eecfa5e5ba4692694fc0f6c730e8d67eb56f9bf5b2077f1ccd90a5c6462eb5eb0d6e086b23913618a4eaf82c3d13fff77bccefab79bee0040640a
-
Filesize
1KB
MD51d30c52ea45b1bd3dcd915f53d20da55
SHA1401d9062b0be6cab6b8aff115553c0b967181aa2
SHA256567e7519ed28cab4d0aaca6483a4f30f0d5c99ca83661a89449d86c30c3d21c8
SHA512b0e6e0ab47d6b19a63db822dfe1a29705c489563349fd0bda68589acee2dd191f0f2fd9e7310f692e79279695591e26caaaa1abc160a409cec1fb43037127699
-
Filesize
539B
MD500fe5da2d0009aa71318af9375032f8d
SHA18bf039f38741615398b319e8b8daa6917f13194f
SHA2564ddf068924c8922348a21f9381ead33f12f0242c2ca6d586dea35dec109ac993
SHA5126d70d77118919c1c3d5f1b26a8e384f467568f3c2c93dbb87f6d322efa1fa3fae2d665b497f62bdcc1ba2d6209f442e255602c5e176b20c4daf8d4ab0b1876a2
-
Filesize
706B
MD5593e5bbf3e93c64e9b73a51ed2c2ffce
SHA16c71eae9dc74db3329034dca13f1d3521184fff2
SHA256e8dfd682cc971b284afd8b57ba68b08f22da2a84d58c8a90433f22a7d4108717
SHA512f05e0ff94b8699c1b741813db06d5f2524235826f0a2ba1be288d4748e7727bbc731c63601c3a0b6c01968af035fd8006093b908442a527974ca9cbe3e4c377f
-
Filesize
6KB
MD5bb5c75b1331cc1af99999fd5ad099b8b
SHA1a42d52242b2144a89b27bf6a856991bad033433c
SHA256c530d6f6d97b6eff94cf235f54f4c8d5eb133df726a449cccbd823adb1594950
SHA51278dd0727233c38715395687588c7aa12853263f0919d27f19a3d509814090e11bdf1562ec5639c023195842cc83e190fa5a9a7db5fb7d620c28ecb65667c4b38
-
Filesize
6KB
MD5500b8a161294ddf40bf5921d75c43856
SHA1436139c10eba81e83abd9924bea1d23aa195ca60
SHA256a2c976bd44228cab12a5c124b2747f878fb3c67165701ca08d0a0ee88b72a929
SHA5121b2f8ea0018acd9d0e79888179f21a517cd8116b444e36a1eb7d44e73685690ce08a0417b920a57dd99d197a8d27cc8e5321dbe67963b5fe00ddfbed1ffb390b
-
Filesize
6KB
MD5aff7aca0899df6cfe9589be00e950006
SHA11fe551fb33d2c5043d83cfdeb86db6b41530e265
SHA256373a25495f7195d8e60284b262e281e9dc21f5e4b3b73dcaf5d5c01b476bd3b7
SHA512552cd05d0573cdd6b386a3f27734371ce74540524bcca78c20de1da2fe82dc3116dddb084ea58682e49d3acf1a18fdcc9b7ef66da2164663d1caa841ee59ba07
-
Filesize
101KB
MD5257e21353226b7470ef575b84055ee3c
SHA1501253a88b415a35b2ab799b05801e14c013a346
SHA2569cd292f254b92379d1400fb4d352b738dcc776eddfd977c916e8a21a48c0961a
SHA512935a05d56ba9c187612eda46c957a2d930fe819f1d198052b108c3faa896a5893856deaab340055cc4e0fec1e74c11dd628bcb50b2434256d6ecceed366e0b25
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd