Analysis
-
max time kernel
47s -
max time network
49s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2023 15:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://docs.google.com/forms/d/e/1FAIpQLSe8hOmPy-lpUx_jIIPzcL-Tjevw7aB9YgcfXZPCM0l2kKlfPQ/viewform?vc=0&c=0&w=1&flr=0&usp=mail_form_link
Resource
win10v2004-20231020-en
General
-
Target
https://docs.google.com/forms/d/e/1FAIpQLSe8hOmPy-lpUx_jIIPzcL-Tjevw7aB9YgcfXZPCM0l2kKlfPQ/viewform?vc=0&c=0&w=1&flr=0&usp=mail_form_link
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133425494146416677" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-356073083-3299209671-3108880702-1000\{4DCFD677-1DA8-4649-AC8F-D0FDBD831BA2} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2392 chrome.exe 2392 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe Token: SeShutdownPrivilege 2392 chrome.exe Token: SeCreatePagefilePrivilege 2392 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe 2392 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2392 wrote to memory of 320 2392 chrome.exe 38 PID 2392 wrote to memory of 320 2392 chrome.exe 38 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 4700 2392 chrome.exe 87 PID 2392 wrote to memory of 5100 2392 chrome.exe 88 PID 2392 wrote to memory of 5100 2392 chrome.exe 88 PID 2392 wrote to memory of 4476 2392 chrome.exe 89 PID 2392 wrote to memory of 4476 2392 chrome.exe 89 PID 2392 wrote to memory of 4476 2392 chrome.exe 89 PID 2392 wrote to memory of 4476 2392 chrome.exe 89 PID 2392 wrote to memory of 4476 2392 chrome.exe 89 PID 2392 wrote to memory of 4476 2392 chrome.exe 89 PID 2392 wrote to memory of 4476 2392 chrome.exe 89 PID 2392 wrote to memory of 4476 2392 chrome.exe 89 PID 2392 wrote to memory of 4476 2392 chrome.exe 89 PID 2392 wrote to memory of 4476 2392 chrome.exe 89 PID 2392 wrote to memory of 4476 2392 chrome.exe 89 PID 2392 wrote to memory of 4476 2392 chrome.exe 89 PID 2392 wrote to memory of 4476 2392 chrome.exe 89 PID 2392 wrote to memory of 4476 2392 chrome.exe 89 PID 2392 wrote to memory of 4476 2392 chrome.exe 89 PID 2392 wrote to memory of 4476 2392 chrome.exe 89 PID 2392 wrote to memory of 4476 2392 chrome.exe 89 PID 2392 wrote to memory of 4476 2392 chrome.exe 89 PID 2392 wrote to memory of 4476 2392 chrome.exe 89 PID 2392 wrote to memory of 4476 2392 chrome.exe 89 PID 2392 wrote to memory of 4476 2392 chrome.exe 89 PID 2392 wrote to memory of 4476 2392 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://docs.google.com/forms/d/e/1FAIpQLSe8hOmPy-lpUx_jIIPzcL-Tjevw7aB9YgcfXZPCM0l2kKlfPQ/viewform?vc=0&c=0&w=1&flr=0&usp=mail_form_link1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff960159758,0x7ff960159768,0x7ff9601597782⤵PID:320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1908,i,10479216172414885929,13903449408269188276,131072 /prefetch:22⤵PID:4700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1908,i,10479216172414885929,13903449408269188276,131072 /prefetch:82⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1908,i,10479216172414885929,13903449408269188276,131072 /prefetch:82⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2984 --field-trial-handle=1908,i,10479216172414885929,13903449408269188276,131072 /prefetch:12⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3016 --field-trial-handle=1908,i,10479216172414885929,13903449408269188276,131072 /prefetch:12⤵PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3840 --field-trial-handle=1908,i,10479216172414885929,13903449408269188276,131072 /prefetch:12⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4708 --field-trial-handle=1908,i,10479216172414885929,13903449408269188276,131072 /prefetch:82⤵
- Modifies registry class
PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4736 --field-trial-handle=1908,i,10479216172414885929,13903449408269188276,131072 /prefetch:82⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 --field-trial-handle=1908,i,10479216172414885929,13903449408269188276,131072 /prefetch:82⤵PID:3260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3952 --field-trial-handle=1908,i,10479216172414885929,13903449408269188276,131072 /prefetch:82⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5036 --field-trial-handle=1908,i,10479216172414885929,13903449408269188276,131072 /prefetch:12⤵PID:4120
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109KB
MD5960a2d68f184ab9e470ff01f7c919300
SHA13b3968da739901b904fb0c21a9edec111cfc317c
SHA2568a59c2591be909d50ac83c14dd061a75577a1ed608705eddc78c3f9fe709d02e
SHA5125491a7d7bd194b7f66ac784ba06677f8dcb12936636326c77e7651564861ff8a2dee416fbd1b3f88c3d53b2414ccc5175da612231716719f0200cc980c17f9c2
-
Filesize
312B
MD56dd5b36d98251ce0ab7b0900106df838
SHA1853594b7014a701c8a90bcad00017a11ee4a58cc
SHA256d24c3bfe2b76792e2a5d63dd1537c157d34ec658090219d9d69ca5d2cc9c5a85
SHA5124597479fcc0b997d5b457b97e88bda82d7a5b5c33435ae7de6eb3f4a299ca49885d7abe71ac76aa49081e82a91889a35744e1d7f0ab0130983f2d7ff1e8a98d4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\8ba9da20-5267-4ed4-9c7d-61805feaa6a9.tmp
Filesize371B
MD5e4e4e5530af8b65fd2fc28356579fa1a
SHA14d10a23690e12350dc38f162de0759ad5e6e47e5
SHA256ca04849c946958f94a43282b4dac11e0a2fa3e8f2f2f4f644c52f3097de71a1e
SHA51239e4e16a716c00f9832391cc85c685b7992c16dbf33b59eac66e354ac25b3d512849053f3bcc46ef40ad5fcb40a069e1d68c428829fad7eca3f35849d515c45d
-
Filesize
371B
MD5a57f7e57d535a3e90103e9e10933e889
SHA1b41682d0f9e2910372757fa66bf6e3390dbda24e
SHA25613051c7c8c5454807eaae69c12da7c22e6438b5852bb18373d533084cc4cd80a
SHA51207869bc86c248a119447c35b0c2a6624da08969c74c6f3ec11a360eec2175dd53aff94ee343d46335c73c756b520ebd55d295e8569890a405f3347fd2e60be2a
-
Filesize
1KB
MD5a39f5024a0fb59975e38d55fbe516462
SHA1110cbfa6d22a13a79b7ac6b27c1443aff1bdf689
SHA2565d32ca3cfde2533a0369dbf3f862586da8b3c3fe7c803df92ec58cc60baa12dd
SHA5123533049b0c884ec929011c7b7b96fe2363cb7aeae8a4aa8cea95af35ebf037fb83961f96692567cf083058afe0c5d48f83fc992757df03682ba23a0242b96de3
-
Filesize
6KB
MD503db6038e986c30431f5153e24627b01
SHA163952b689ad266c382c1727177072c80802d1c03
SHA256ba5ef4d229ac0e72dc66a37bcc2a8cd528c27533f0fac6c2330ea2a22914d2c0
SHA51230103637b7982f5378bd9b3eaf4cdb94662fc26859afe9340f7b55e035d5520d9de759f62bd4e94733f7811d40c67811b429d7a8c13a2d3c354ad27a4773249f
-
Filesize
6KB
MD556f35793e611f6ff34a2e7bce3c16d45
SHA1969ba91b5ddc1524e4795e626c8426ce91a56d45
SHA256ffed42283eddd9f1586d119e54426b2e41bd0b948361bd5b1dfb41bac937861a
SHA51243a368cea3ef2f219dd2d0473065dd736788b4154ec461b4fd20aa2fa7b7d2e7351517e68e305ea21d6d8c4dbf3f05c7882f1cc1b608fd02c905e985453d498a
-
Filesize
109KB
MD587d232618db9c93c8d74ef13899abd73
SHA11f907a2f00c666f89a6427d3880b43cbcb698902
SHA2565bacc2d98f532eb8eaceafb31711bfe8d1261398823699b8cb0efb9fee72936a
SHA512daa25185188becd50687411e8d9fbeba2607f5c03e66b85bd4f7a4a53c5e5ed2cd43504e8d2e5624d1d44416442eee03bd443f8a1227873c04685d4866ee4968
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd