Analysis
-
max time kernel
601s -
max time network
494s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2023 01:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://filedm.com/download.php?id=8jA2z
Resource
win10-20231020-en
Behavioral task
behavioral2
Sample
https://filedm.com/download.php?id=8jA2z
Resource
win10v2004-20231023-en
General
-
Target
https://filedm.com/download.php?id=8jA2z
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133430156441859581" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3312 chrome.exe 3312 chrome.exe 3004 chrome.exe 3004 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3312 chrome.exe 3312 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe Token: SeShutdownPrivilege 3312 chrome.exe Token: SeCreatePagefilePrivilege 3312 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe 3312 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3312 wrote to memory of 2148 3312 chrome.exe 70 PID 3312 wrote to memory of 2148 3312 chrome.exe 70 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 2100 3312 chrome.exe 91 PID 3312 wrote to memory of 1164 3312 chrome.exe 90 PID 3312 wrote to memory of 1164 3312 chrome.exe 90 PID 3312 wrote to memory of 3344 3312 chrome.exe 92 PID 3312 wrote to memory of 3344 3312 chrome.exe 92 PID 3312 wrote to memory of 3344 3312 chrome.exe 92 PID 3312 wrote to memory of 3344 3312 chrome.exe 92 PID 3312 wrote to memory of 3344 3312 chrome.exe 92 PID 3312 wrote to memory of 3344 3312 chrome.exe 92 PID 3312 wrote to memory of 3344 3312 chrome.exe 92 PID 3312 wrote to memory of 3344 3312 chrome.exe 92 PID 3312 wrote to memory of 3344 3312 chrome.exe 92 PID 3312 wrote to memory of 3344 3312 chrome.exe 92 PID 3312 wrote to memory of 3344 3312 chrome.exe 92 PID 3312 wrote to memory of 3344 3312 chrome.exe 92 PID 3312 wrote to memory of 3344 3312 chrome.exe 92 PID 3312 wrote to memory of 3344 3312 chrome.exe 92 PID 3312 wrote to memory of 3344 3312 chrome.exe 92 PID 3312 wrote to memory of 3344 3312 chrome.exe 92 PID 3312 wrote to memory of 3344 3312 chrome.exe 92 PID 3312 wrote to memory of 3344 3312 chrome.exe 92 PID 3312 wrote to memory of 3344 3312 chrome.exe 92 PID 3312 wrote to memory of 3344 3312 chrome.exe 92 PID 3312 wrote to memory of 3344 3312 chrome.exe 92 PID 3312 wrote to memory of 3344 3312 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://filedm.com/download.php?id=8jA2z1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc89059758,0x7ffc89059768,0x7ffc890597782⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1844,i,2993556530066187358,3438293010419174499,131072 /prefetch:82⤵PID:1164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1844,i,2993556530066187358,3438293010419174499,131072 /prefetch:22⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1844,i,2993556530066187358,3438293010419174499,131072 /prefetch:82⤵PID:3344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2944 --field-trial-handle=1844,i,2993556530066187358,3438293010419174499,131072 /prefetch:12⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2936 --field-trial-handle=1844,i,2993556530066187358,3438293010419174499,131072 /prefetch:12⤵PID:776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 --field-trial-handle=1844,i,2993556530066187358,3438293010419174499,131072 /prefetch:82⤵PID:3952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4916 --field-trial-handle=1844,i,2993556530066187358,3438293010419174499,131072 /prefetch:82⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2660 --field-trial-handle=1844,i,2993556530066187358,3438293010419174499,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3004
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD508bcca48768e3ee2a1ac391445042031
SHA1709750665363a0632c42c95efb75f4332b0f9852
SHA2565de70c17d71f099ccc9dbc1cb30f2d7985ec0d6b9f45a9d4e9fa96366e66281a
SHA512770af5598af4304c0fe13f6d90f230a6ee5d11d9b65a07a83f216d645761515663c95429cf98fde7929de5dc73523a942c9b67de77a8daf045875b229c54a0ab
-
Filesize
1KB
MD5c6c1ec4ac268afa1963a36eb4da8e5f3
SHA1c60895be56f2949a75a93ce2c2bd9a2cf7069658
SHA256e2c8cc353902a25816db6bc3630cfbe98df6c3d77cd93b12bb2e241cf2a1875b
SHA5128cec103c8efc2fe458d9c978b574ad036f23b0f927a3195b4f29a0cd136765f2a56298850a3b255696b0c5809f7762736f0b453a5254b8563433d9f98e2f4717
-
Filesize
2KB
MD5fee87bd7f45a4a089a358a66c76f6799
SHA1d9115ac2776cbc5a3077c3be893c30ab98675ff3
SHA2569353a8ea84bf6db05bdc9bbf2789ac30d7184ec894adaa5343ba3efd1c57677b
SHA51269330c3885550c94ecb71e0d85712b7907acf88df8ee537abb2cea20478c248514139a29eef5bef2cbcd8182d63c5e6007b518ff65b6d92e27d05014eee48049
-
Filesize
539B
MD58ec7512321c71304479f9238736aeb36
SHA136d63dae0a92138865a3054c084944dc75abf8d9
SHA256e12c6aba543c142dd2f61a3dc7da1af6bfad09c77472b45e4c38d2b78698033a
SHA512aa23ef5733609ae49c4e698d04ffc44899604676adde62fb3cea7fa410fe5bdd3d28fbf9bbcb8a2e81d2947f1b1fc0f0d5956af874631bcc80248de4e721a15d
-
Filesize
706B
MD5ab7961cf4e8919d49afeb871ea776964
SHA1b739254d83fc4ed4e7071c066d34fc1b75cbf383
SHA2560f15244c4038640bb9acf22e691f852f592b8ae7d4f74d1b76d352cbf80d118b
SHA512615e72e3c7f5b63c43020b89879f5db5dda4bcddd7bd8e52dd5c05c2d5dcdd96389eeced9c21f99e2bd922be461ce25fb578d2071df1bc3b5d79bfa2774b210b
-
Filesize
6KB
MD5cf4bf14c32330d0ab79b4f32184f0b07
SHA1c07361fa4ce46ce0b53acceb988f7f879f87745e
SHA25645c4047c725e8cfe2c9909c7f2d7dabfc56d109b970c6546dc60a4a90e2d0dce
SHA51280033f0b3471ac6495f06840989104898d90951c1081056a48f0a6708d801cf1e1a4a5efc1275cdd916890a5061e458cf750bff642314295e4091fb2f774b77d
-
Filesize
109KB
MD51947e7064e12331b98819524910d3d6a
SHA1c8c5142aa17211625ab0a1496ac024875d8d72bf
SHA25640612e8dc5d41ff1d8546db1e634ac0fabd92e38e7f4662dbec83d95ae97934c
SHA51255c878cc53f903b8fa10d8f06ce31d05bc64a725f4ec3de62126542ff4ea68f726489119e12f3c8d12b6b4a46424a3f188afcd9add508a93435932ee031f84ba
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd