Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2023, 23:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://t.ly/sXxUH
Resource
win10v2004-20231023-en
General
-
Target
https://t.ly/sXxUH
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133431818422738273" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2212 chrome.exe 2212 chrome.exe 4076 chrome.exe 4076 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe Token: SeShutdownPrivilege 2212 chrome.exe Token: SeCreatePagefilePrivilege 2212 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe 2212 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2976 2212 chrome.exe 72 PID 2212 wrote to memory of 2976 2212 chrome.exe 72 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 2928 2212 chrome.exe 85 PID 2212 wrote to memory of 3940 2212 chrome.exe 84 PID 2212 wrote to memory of 3940 2212 chrome.exe 84 PID 2212 wrote to memory of 2456 2212 chrome.exe 86 PID 2212 wrote to memory of 2456 2212 chrome.exe 86 PID 2212 wrote to memory of 2456 2212 chrome.exe 86 PID 2212 wrote to memory of 2456 2212 chrome.exe 86 PID 2212 wrote to memory of 2456 2212 chrome.exe 86 PID 2212 wrote to memory of 2456 2212 chrome.exe 86 PID 2212 wrote to memory of 2456 2212 chrome.exe 86 PID 2212 wrote to memory of 2456 2212 chrome.exe 86 PID 2212 wrote to memory of 2456 2212 chrome.exe 86 PID 2212 wrote to memory of 2456 2212 chrome.exe 86 PID 2212 wrote to memory of 2456 2212 chrome.exe 86 PID 2212 wrote to memory of 2456 2212 chrome.exe 86 PID 2212 wrote to memory of 2456 2212 chrome.exe 86 PID 2212 wrote to memory of 2456 2212 chrome.exe 86 PID 2212 wrote to memory of 2456 2212 chrome.exe 86 PID 2212 wrote to memory of 2456 2212 chrome.exe 86 PID 2212 wrote to memory of 2456 2212 chrome.exe 86 PID 2212 wrote to memory of 2456 2212 chrome.exe 86 PID 2212 wrote to memory of 2456 2212 chrome.exe 86 PID 2212 wrote to memory of 2456 2212 chrome.exe 86 PID 2212 wrote to memory of 2456 2212 chrome.exe 86 PID 2212 wrote to memory of 2456 2212 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://t.ly/sXxUH1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd96fa9758,0x7ffd96fa9768,0x7ffd96fa97782⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1868,i,16695226535556840425,8059612599483880443,131072 /prefetch:82⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1868,i,16695226535556840425,8059612599483880443,131072 /prefetch:22⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2184 --field-trial-handle=1868,i,16695226535556840425,8059612599483880443,131072 /prefetch:82⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2756 --field-trial-handle=1868,i,16695226535556840425,8059612599483880443,131072 /prefetch:12⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2748 --field-trial-handle=1868,i,16695226535556840425,8059612599483880443,131072 /prefetch:12⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4568 --field-trial-handle=1868,i,16695226535556840425,8059612599483880443,131072 /prefetch:12⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 --field-trial-handle=1868,i,16695226535556840425,8059612599483880443,131072 /prefetch:82⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 --field-trial-handle=1868,i,16695226535556840425,8059612599483880443,131072 /prefetch:82⤵PID:3792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2876 --field-trial-handle=1868,i,16695226535556840425,8059612599483880443,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4076
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3252
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:6108
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:3344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD55c92bbc07fc2c7ed239be80adef78d6f
SHA1605bdf05f343386e7ddaf18d60c188c1ace00625
SHA256e8c6661e73b3dcbe3a4c909bfebea91b6fd5054ad09a528da5bec8b490048c46
SHA51292f8bb63df0461dba8d35100705068f64f72ad842a625d218a03d4477c0719f4dc66b14e4567928c017e0c1c327fb1f65ea1b1d4f7c1def12a9d961434550fb1
-
Filesize
72B
MD5fad0912ec534e54856d604a97ad5aefd
SHA1d3f6ed3dcb8da0b19c514b44817accbf118af520
SHA256046dffdb53ff8bcdb722c8fc0cafb16bb2257c13119318735f875c09b78c5bf1
SHA5126aa00c1a3414e2fb508383a4252a298f3f77d6f44f094b32277210b0d55cf7d4bf8a0a5482b04f11aa8a939c4d92bd8eb9ebf964cacf6a10d821b0230926894c
-
Filesize
2KB
MD541a37dfc3225d4116141fd9dfb9bb083
SHA10dba434a08c2f832ac37452e27c051b01730d48d
SHA25634021ae340bc9eaf39434edbb48b5cec9814e6b5de384b017b7d748b04c2a049
SHA51295d75d7b5fb84716f10157c6c2ea18981ec8f47582574dc0e3bc0ed6f8ebe2614cefb26cbb666fae74bab97304a53664533cb6a800e73ad60417ef3c6d041e1d
-
Filesize
706B
MD5baf2bb68f734310e9afd9fcfb5affc60
SHA1230cac3a2b0ad7211af41bb68de57c014c860b96
SHA256d0e7e0515f7c6792c491a0b6b22783225bcaf56d3bfe0726a903ce8c75cf39b4
SHA512c935d1e8f236c59eb3ed11265bd2825713df986eb0cdcb4b49dbfc5678a44c2413240476ca37b05a0fc448a3046cbeeb13a5112c5f779849f530edc2ac8d1270
-
Filesize
6KB
MD500b534c764191c797fa57d04ea1ccd58
SHA1f5ad996636653d5182ac6b087731d0edd274db89
SHA2566634b002d08007dd2309739a508ab657c9b7fb343fe18e00f94355f22e2c2d67
SHA512b19a611ad059ade23e0fb90f4275c3dcc206ee19ab99c23f47894151b8a3016285a26ff08429033beb620a82eada6cf8023f963a24478775c63d3ee68e92c881
-
Filesize
109KB
MD5ac1bc8e307052517a773e18b70b54d65
SHA10f60825c671b9772f9c5d59293902e5507a313d5
SHA2563c96f904ce5376329a393ae39dae21fb73abc6e44b60632ed8454b276b0231ae
SHA512488c081bfbd1e884c4c1b505d0e1efc4233c3a03d6e5bd2310ac140976bc91764a70c15c4d0ab92d8bd60cd5ec7a12da34b185a7e5ef12af38d243bd6a9f65c3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd