Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2023 05:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://prioms.one/FUPzp
Resource
win10v2004-20230915-en
General
-
Target
https://prioms.one/FUPzp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133409583048144320" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3152 chrome.exe 3152 chrome.exe 2712 chrome.exe 2712 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe Token: SeShutdownPrivilege 3152 chrome.exe Token: SeCreatePagefilePrivilege 3152 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe 3152 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3152 wrote to memory of 3436 3152 chrome.exe 85 PID 3152 wrote to memory of 3436 3152 chrome.exe 85 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 460 3152 chrome.exe 87 PID 3152 wrote to memory of 1624 3152 chrome.exe 89 PID 3152 wrote to memory of 1624 3152 chrome.exe 89 PID 3152 wrote to memory of 4380 3152 chrome.exe 88 PID 3152 wrote to memory of 4380 3152 chrome.exe 88 PID 3152 wrote to memory of 4380 3152 chrome.exe 88 PID 3152 wrote to memory of 4380 3152 chrome.exe 88 PID 3152 wrote to memory of 4380 3152 chrome.exe 88 PID 3152 wrote to memory of 4380 3152 chrome.exe 88 PID 3152 wrote to memory of 4380 3152 chrome.exe 88 PID 3152 wrote to memory of 4380 3152 chrome.exe 88 PID 3152 wrote to memory of 4380 3152 chrome.exe 88 PID 3152 wrote to memory of 4380 3152 chrome.exe 88 PID 3152 wrote to memory of 4380 3152 chrome.exe 88 PID 3152 wrote to memory of 4380 3152 chrome.exe 88 PID 3152 wrote to memory of 4380 3152 chrome.exe 88 PID 3152 wrote to memory of 4380 3152 chrome.exe 88 PID 3152 wrote to memory of 4380 3152 chrome.exe 88 PID 3152 wrote to memory of 4380 3152 chrome.exe 88 PID 3152 wrote to memory of 4380 3152 chrome.exe 88 PID 3152 wrote to memory of 4380 3152 chrome.exe 88 PID 3152 wrote to memory of 4380 3152 chrome.exe 88 PID 3152 wrote to memory of 4380 3152 chrome.exe 88 PID 3152 wrote to memory of 4380 3152 chrome.exe 88 PID 3152 wrote to memory of 4380 3152 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://prioms.one/FUPzp1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb86329758,0x7ffb86329768,0x7ffb863297782⤵PID:3436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1876,i,581820317621099331,2946146738073457503,131072 /prefetch:22⤵PID:460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1876,i,581820317621099331,2946146738073457503,131072 /prefetch:82⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1876,i,581820317621099331,2946146738073457503,131072 /prefetch:82⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3004 --field-trial-handle=1876,i,581820317621099331,2946146738073457503,131072 /prefetch:12⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3012 --field-trial-handle=1876,i,581820317621099331,2946146738073457503,131072 /prefetch:12⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4552 --field-trial-handle=1876,i,581820317621099331,2946146738073457503,131072 /prefetch:12⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3352 --field-trial-handle=1876,i,581820317621099331,2946146738073457503,131072 /prefetch:82⤵PID:1664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3348 --field-trial-handle=1876,i,581820317621099331,2946146738073457503,131072 /prefetch:82⤵PID:1336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=932 --field-trial-handle=1876,i,581820317621099331,2946146738073457503,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2712
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD579332888b5c7b279d74a9cbaae1bb07c
SHA11f398ea5aec90044e009ed539d43ffe3aa2bd441
SHA25653b2b2f4b633fdbb4f7093afc748c24f59cc03180e9bdfbe4fbcb5a18d98b9d5
SHA51229d84d00d58b0ba9525c4d28a32f19dd26420c31ed9d21f6301ad834c3991957efc357c9acf9844ac4bd63449a278963e56d2d77f5368c4ac3b8f5af55d1911e
-
Filesize
6KB
MD5ceb6ad5ab2bcc3740be0cd63b66a8ddc
SHA162570d03afacfcd2b1f3cc4379bea4e5ad62d157
SHA2567ab5e1ea2583627b3f944b7e74ce84bb0901a4a087c65742fc03d35a8eef6320
SHA512f9a1b80f6af72be7eaa97f990cd526d6506609a1cc8529ee813f8112673c57249a353d694c2f5bd3bc847ebf55e407ad11cc19194feafcf0aeb573756efc057b
-
Filesize
6KB
MD5587c525d61b47bbc508241a5d387a94c
SHA195eea43e5b0b5c5ca11444db8afe88131dec50c2
SHA2562da728b2d53220e2d9836dcbd7599b7e49b72a506d74834acc92ded7d2570a5f
SHA51236ff113da9ed00c30fe705d62e0965d01e2f4ebdc1ed8dd27a19b666e55377bad49faf7803f39a23e73a5d3e6ff3e8b335105f5e503c698d23b53fafb0d62601
-
Filesize
101KB
MD589bf76395189f258cb1f5da7be586ded
SHA1c225ba094a523e5a78ff053204d9dc0db3a00ba7
SHA25621d3e24f3192c7880c4f12e6e81742f0ddbfa2d573d00c48c7c1dcc5753757ca
SHA512b5c1f2418f356c2608237c205fa0729a9bad4a8e36b7893db4d4dae370cc22d13491d939f5eeaa346920c1e75fec240c00877836a63c7d39c6e4d43c85a61bd1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd