Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 16:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://downloads211.s3.amazonaws.com
Resource
win10v2004-20230915-en
General
-
Target
http://downloads211.s3.amazonaws.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133416022951595066" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 2732 chrome.exe 2732 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4664 chrome.exe 4664 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe Token: SeShutdownPrivilege 4664 chrome.exe Token: SeCreatePagefilePrivilege 4664 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe 4664 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4664 wrote to memory of 4960 4664 chrome.exe 40 PID 4664 wrote to memory of 4960 4664 chrome.exe 40 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 3264 4664 chrome.exe 84 PID 4664 wrote to memory of 936 4664 chrome.exe 85 PID 4664 wrote to memory of 936 4664 chrome.exe 85 PID 4664 wrote to memory of 2936 4664 chrome.exe 88 PID 4664 wrote to memory of 2936 4664 chrome.exe 88 PID 4664 wrote to memory of 2936 4664 chrome.exe 88 PID 4664 wrote to memory of 2936 4664 chrome.exe 88 PID 4664 wrote to memory of 2936 4664 chrome.exe 88 PID 4664 wrote to memory of 2936 4664 chrome.exe 88 PID 4664 wrote to memory of 2936 4664 chrome.exe 88 PID 4664 wrote to memory of 2936 4664 chrome.exe 88 PID 4664 wrote to memory of 2936 4664 chrome.exe 88 PID 4664 wrote to memory of 2936 4664 chrome.exe 88 PID 4664 wrote to memory of 2936 4664 chrome.exe 88 PID 4664 wrote to memory of 2936 4664 chrome.exe 88 PID 4664 wrote to memory of 2936 4664 chrome.exe 88 PID 4664 wrote to memory of 2936 4664 chrome.exe 88 PID 4664 wrote to memory of 2936 4664 chrome.exe 88 PID 4664 wrote to memory of 2936 4664 chrome.exe 88 PID 4664 wrote to memory of 2936 4664 chrome.exe 88 PID 4664 wrote to memory of 2936 4664 chrome.exe 88 PID 4664 wrote to memory of 2936 4664 chrome.exe 88 PID 4664 wrote to memory of 2936 4664 chrome.exe 88 PID 4664 wrote to memory of 2936 4664 chrome.exe 88 PID 4664 wrote to memory of 2936 4664 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://downloads211.s3.amazonaws.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8edd9758,0x7ffd8edd9768,0x7ffd8edd97782⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1876,i,8381219921698767568,13720053926908997639,131072 /prefetch:22⤵PID:3264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1876,i,8381219921698767568,13720053926908997639,131072 /prefetch:82⤵PID:936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3036 --field-trial-handle=1876,i,8381219921698767568,13720053926908997639,131072 /prefetch:12⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2888 --field-trial-handle=1876,i,8381219921698767568,13720053926908997639,131072 /prefetch:12⤵PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1876,i,8381219921698767568,13720053926908997639,131072 /prefetch:82⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4364 --field-trial-handle=1876,i,8381219921698767568,13720053926908997639,131072 /prefetch:82⤵PID:736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4512 --field-trial-handle=1876,i,8381219921698767568,13720053926908997639,131072 /prefetch:82⤵PID:3448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4492 --field-trial-handle=1876,i,8381219921698767568,13720053926908997639,131072 /prefetch:82⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4488 --field-trial-handle=1876,i,8381219921698767568,13720053926908997639,131072 /prefetch:82⤵PID:1408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2716 --field-trial-handle=1876,i,8381219921698767568,13720053926908997639,131072 /prefetch:82⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2368 --field-trial-handle=1876,i,8381219921698767568,13720053926908997639,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD580135ed657fdba4624bbc041aff6914d
SHA171e18b5e531ca94bddae8828ecca39d0f614e56f
SHA25605603f068c3275f8cf2e74062f38edd3f4d20c5f069e8dce9a4f0e3138e7f485
SHA512bcc583814b91b9efd2f273ccfda9384c83f6a495b111eec774a3692d0fec61f2c967325168896d8d8adf5ae1d481fc30b726872535b2074ed3a81b540e91d318
-
Filesize
5KB
MD56120b460f42746bd8b3d830c57963cad
SHA16fee685b0df4702b6cbd6010d6040bb7d00f9cc0
SHA2564e84d87d12c3ad1f17bf166b70043669d033a64e05c60986fbcbb71dbb7a324d
SHA512b1027d2f26d48841ba765ddc43ed967bf23a2ab2c9075728f545ec3fac5f4fa65b30fd5076e57b09b4a801dfd944088ea8c8faecef819739c1cd4890a4251fc9
-
Filesize
6KB
MD5be3c7d6b3bf6a3485651213bd1ceec35
SHA1473270479f64e98dc9902b658447cae0e38fd10b
SHA256dcb40ee3bc30ac26b5d9ef973a8d0ddd30949624ea87bf938bb1cfabe7dc7537
SHA51278ad87eac39b5837382965e694774b7c12beff29b056b7a4cf6594ccc91feaaf31c18b919e43e215c4ab57b4a8d5b8803c9c54fdfb1ec5b6a5b2bd4d14bee493
-
Filesize
103KB
MD566a3776ef2c030cfb4d44f7c642845f4
SHA1acf6cd390aa63a66e1a72d9f4b4d0bc5a3ee4a8a
SHA2567a4c732c037c1ce93914a64398144e74d5f1fc09eaeadfad358a4a7b7a074d48
SHA512fe8b9e24885480732d2d25ce02250318e66a75f582cec89f371bb6f3198f32091ee5b5deb47c671a3b88efbe3bb010f43702a3ce67c36cfb4bc2b5e32abeede7
-
Filesize
104KB
MD58050ffa74c0f7969289b2eaa1831cf46
SHA1b1420f98c1297d573302fbdc8238a00bbd46d317
SHA25689983ac8feb9c22d0d1e1b6b9202ab760286a60b5ce48b1033a81c9d44c51a45
SHA51291723049cee4f4fba41c9a886be4b1a404315b5471c8e46e2f2d1371e2267f50448fec77fd6b241443a1fdfd2007571f9cfe083b520c1e90dcf8d940091c9efc
-
Filesize
97KB
MD581d971052b7d77e0d4d1d2e6726675b7
SHA1332d86ff7957551091c2988afdb549a99ab9f73d
SHA2565f40056cca1b5b540b0027d5044cffc7b665f537dbaf3da109a3f11224c0cf38
SHA512688bd770a49f38926abec8c4cbb624f6262bd004b6944f170d360a66596a45d48376209ab12759f00a37578eed0d6b7ef0127217994603da39dda28121aa1714
-
Filesize
95KB
MD50c79e2fa42b8dc297d6bd50200189e78
SHA12e2d3dc26bb477a1f248731307bed70379bd3dfb
SHA256af83c8eb4afb1a17937e3e0a3aaa930fbaedf929428c282b033ec20f3f912b12
SHA512f9cc1c051780ba3a50bc12b06a1dc81f2324ad0eb798fa86de4fe06232c40ec6393f854e558cf8ae3287a95e5d45bd5d504065fdc44a3d0c71b541e24039c188
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd