Analysis
-
max time kernel
1s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 15:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://a.co/d/hs7wl5G
Resource
win10v2004-20230915-en
General
-
Target
https://a.co/d/hs7wl5G
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3376 wrote to memory of 2136 3376 chrome.exe 17 PID 3376 wrote to memory of 2136 3376 chrome.exe 17
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://a.co/d/hs7wl5G1⤵
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc13ff9758,0x7ffc13ff9768,0x7ffc13ff97782⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1832,i,5022492873895339669,15117667267587872799,131072 /prefetch:22⤵PID:4080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1832,i,5022492873895339669,15117667267587872799,131072 /prefetch:82⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1832,i,5022492873895339669,15117667267587872799,131072 /prefetch:82⤵PID:4348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3164 --field-trial-handle=1832,i,5022492873895339669,15117667267587872799,131072 /prefetch:12⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3136 --field-trial-handle=1832,i,5022492873895339669,15117667267587872799,131072 /prefetch:12⤵PID:3592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4756 --field-trial-handle=1832,i,5022492873895339669,15117667267587872799,131072 /prefetch:12⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 --field-trial-handle=1832,i,5022492873895339669,15117667267587872799,131072 /prefetch:82⤵PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 --field-trial-handle=1832,i,5022492873895339669,15117667267587872799,131072 /prefetch:82⤵PID:3932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4688 --field-trial-handle=1832,i,5022492873895339669,15117667267587872799,131072 /prefetch:12⤵PID:2388
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
701B
MD50af8a16e9cfc47f00272809d4ee7bdca
SHA16d2b91c931a53b852f189f19643432a58c05c752
SHA25660418722d5c2436ddc8c7d08f35811029d4443ed4df8dde50a1a6dace52f8502
SHA5124b3f0df11e6542fff9eaf3fb74e43344daaf77749c51dbb19d5da7741fd50e963a0db9aba8c2dc6bf27ed64e414cb7c4d6884d1d83cbbae2a6f0c0dc827c9338
-
Filesize
5KB
MD5d92afe211f9f85d7328605b20a0863b6
SHA1d51b4f6efb6a46c1f05ddc44ec5d647a0630bf97
SHA256db27ee6615ee05e25dc442bc917e38a7598795d8b5483204d998936d0702580e
SHA51224f50facd97dac3cf0e9ce90867991931ce53c4f553d6f1b421c8692a6db4afd0332cf76e1681fe74a9c57e16e466eab42e42ce88b56a6db7075f032c588eb85
-
Filesize
103KB
MD554d144b27df6dda007dea87b78bb0f41
SHA1977b796cfb00abc52165699a8a76218ba98966fd
SHA2567adc84da9f836f89b1d2be783bccc49b2b3c74dcfb5d80e5846c08239eaf0e14
SHA5124d03192eba71fcc05c2361bb26852920c5b302ecaa6d4dfdbaca40ffcdc8f3bb82b9c52b5eb7557da35b0320a46e8f37eefcb239601602959702191a8cf49a53
-
Filesize
104KB
MD5d128c8866554f68dc574ebb9e48abefc
SHA1caf571804cddcbf97f22b3bce81162f86ddd3578
SHA256b5a735aad69428feb495867413a3209a8a97420171e6c4e0df8d321e62528440
SHA512fbfbfd1d8a771bff58d1ba4ad1c66550eb88c9cc91cfcf23dbc0d662f4658f8b9199eae05db83faec0f52d3501c2a7a0c3a7ac9e6bfa41e322c6227b300c5c8e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd