Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2023, 12:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://files.catbox.moe/g3slin.png
Resource
win10v2004-20230915-en
General
-
Target
https://files.catbox.moe/g3slin.png
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133413275408552414" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 1824 chrome.exe 1824 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4392 chrome.exe 4392 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4392 wrote to memory of 4236 4392 chrome.exe 82 PID 4392 wrote to memory of 4236 4392 chrome.exe 82 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 3032 4392 chrome.exe 85 PID 4392 wrote to memory of 2080 4392 chrome.exe 86 PID 4392 wrote to memory of 2080 4392 chrome.exe 86 PID 4392 wrote to memory of 3848 4392 chrome.exe 87 PID 4392 wrote to memory of 3848 4392 chrome.exe 87 PID 4392 wrote to memory of 3848 4392 chrome.exe 87 PID 4392 wrote to memory of 3848 4392 chrome.exe 87 PID 4392 wrote to memory of 3848 4392 chrome.exe 87 PID 4392 wrote to memory of 3848 4392 chrome.exe 87 PID 4392 wrote to memory of 3848 4392 chrome.exe 87 PID 4392 wrote to memory of 3848 4392 chrome.exe 87 PID 4392 wrote to memory of 3848 4392 chrome.exe 87 PID 4392 wrote to memory of 3848 4392 chrome.exe 87 PID 4392 wrote to memory of 3848 4392 chrome.exe 87 PID 4392 wrote to memory of 3848 4392 chrome.exe 87 PID 4392 wrote to memory of 3848 4392 chrome.exe 87 PID 4392 wrote to memory of 3848 4392 chrome.exe 87 PID 4392 wrote to memory of 3848 4392 chrome.exe 87 PID 4392 wrote to memory of 3848 4392 chrome.exe 87 PID 4392 wrote to memory of 3848 4392 chrome.exe 87 PID 4392 wrote to memory of 3848 4392 chrome.exe 87 PID 4392 wrote to memory of 3848 4392 chrome.exe 87 PID 4392 wrote to memory of 3848 4392 chrome.exe 87 PID 4392 wrote to memory of 3848 4392 chrome.exe 87 PID 4392 wrote to memory of 3848 4392 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://files.catbox.moe/g3slin.png1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffee0919758,0x7ffee0919768,0x7ffee09197782⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1908,i,13400286613495330304,205457860829756437,131072 /prefetch:22⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1908,i,13400286613495330304,205457860829756437,131072 /prefetch:82⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1908,i,13400286613495330304,205457860829756437,131072 /prefetch:82⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3136 --field-trial-handle=1908,i,13400286613495330304,205457860829756437,131072 /prefetch:12⤵PID:228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3084 --field-trial-handle=1908,i,13400286613495330304,205457860829756437,131072 /prefetch:12⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 --field-trial-handle=1908,i,13400286613495330304,205457860829756437,131072 /prefetch:82⤵PID:3840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 --field-trial-handle=1908,i,13400286613495330304,205457860829756437,131072 /prefetch:82⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 --field-trial-handle=1908,i,13400286613495330304,205457860829756437,131072 /prefetch:82⤵PID:3752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 --field-trial-handle=1908,i,13400286613495330304,205457860829756437,131072 /prefetch:82⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2324 --field-trial-handle=1908,i,13400286613495330304,205457860829756437,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1824
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD585b6de622e60a1963a3f29f37f081f18
SHA1f304850313a4d1b43fd7c0442d9e719937676070
SHA2562c1a2caa8a80ec8a2fa42e94403a80ab15466ded34c4079b74d2b8849d6e734b
SHA51289c962f774f3056e810ef0e8ee680055331b03df9a24075e431a2f7c82dcc990c125f9fd7ca6609b035396b0346f195598b568fd7462b15c405a864e0166dea3
-
Filesize
6KB
MD5c19e8412e5802642db125584ce16e8b6
SHA197d78cbaad534e96d519dbf7f7182c0bb6dc0a03
SHA2568963a3f0a548655d47bbd5bee6e4cb15cecaa1ea427c1a6826c9ae11e3f42ec2
SHA5127a382e2e124393d0fd4cb11b688196ad29d54b2ee80a0048c01d30251d4a048fd902a4ca17e505c8e04bf83632acb6db6300204e5049efcb29a424d09ea107c1
-
Filesize
5KB
MD5eb497057d8f250965a342d196cc724b7
SHA1bbcc96b2740e489a15d2144af6c3e8ed91a29460
SHA256eaeeb8d7393a61c17c1c85a692b3af2b0d34ae8eea91e4988b75e59c0e571616
SHA512bab02e20330495cff0350a3b6c36f1d56652810d02be4e3b8a9322937fd29d857bbf7cb6c0a88f80ce38f11241a85fbe52ee3e3128c222d27c112b82fd24db77
-
Filesize
5KB
MD587043d3f0a2e19f3b75e72cdeaffbfbf
SHA17f890739fbaf5079a1b82a4585e708e8650a9be7
SHA25695e98e8145c0322ab854460db071cbba6f0555815c33c6d526b4370ce9b0c842
SHA5123f6ed170e92f0df2a1a1b5f228d54b4ec972823877e22755177ef3c1a6943882f4700a1d4e090b366be68c04000510cede136b81aec6d5a24a60a23a0928094f
-
Filesize
122KB
MD50344e62bd2d540afefa621831489bc42
SHA157d390b25c00a60bbe0397f8f55269266150eb50
SHA256498c357a20c44b6027d538b49267349242d06e786475f60be078908268d4bcde
SHA51241042119535cf4b4b6b3ffff5588a010f858fa1009a77e214256922de77d5bc302a9cca90947ebfcfbfe9da900dcd4faa134e7303665d9f6e8cc46900a52154a
-
Filesize
103KB
MD5211e14b5a66312feee44bf94829168bb
SHA10b6ace7fda144031f0689222b1c21a4dc29a79f0
SHA256f51e6395f4271a6ec1ad5003000d161328d50c5960385b252f19fbd6ac43b0d3
SHA512e924c211713536c1e3787de62fd8db4af67fd1e1cf7ecfc1096c4ecfcd5ec08eed811cbe95a7f19f39f485101dd02a9c6ef447c41aed1d0b1fd224623fe46b78
-
Filesize
103KB
MD50bf27b02ac530819fd341efb18c211ec
SHA14ea85b353ff88d332430f144601fe0aca7905175
SHA256f63fc0923a74e02ae28a8ecb3ecee68fb831e5d959637291f59495ab0628d4c8
SHA512cfe9b6679b284e9eeb8ee18a2539e8e016fbc730fad541e46988eaa74122f785ddd68cfab5bdb9575414bf30cd86d93eb3fe1a76d0e25cd7d572db5769417d13
-
Filesize
104KB
MD5a16b9a7301a3b148e653a8610f6123b7
SHA1eff14b9c424d80f39f803e15e12924113eae0576
SHA25689dfd6474b011b2fcbb3a4814e84fcaff420f00b3ed33a84d1720f6fdc0a89b5
SHA512bbd66db22cf562b0e8e2bb31d9abdedee21ee31d5e7fcb8be6a80aa3cde615c08f52e5f22a134678785fdfca808edad53363750b4c59f9791c251f924461f610
-
Filesize
121KB
MD50b0538696d27ee86c6cba3acccbef31e
SHA1fa073a7afe7967274dfc67e021f5c63acddd20c6
SHA256b8faf2c3adfd620a5a83eaa69dd7e93173732a1e3fd7cd809b77e3be67713563
SHA512bdbf9ffa1f558daa617bc8752fc78255ffd14d266b957e38dfc1ed817736668931520d8309cf3849bb38d69b4ad3719f2cc7aec94dec31c6b4c133fc960b3b76
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd