Analysis
-
max time kernel
36s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2023 05:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://r20.rs6.net/tn.jsp?f=001N7XKcDtLl8dEhMaMbmXbZkDn6pHXZtJDChlcuKwdNXmGkKiYQx5DEi4RQ3rtmirFBajazjC_EmxCO2FElRXJ06HwrhCI_cK11JXVWFLvBTkkFveVI7AHG6aTH4gCrAFKDtt32-eA_0ZWdi8qc8y75wTHmMHLZypWahTbipiLfA-V0ld5EPRO5Q==&c=zwiJTkwrUzK5RvIB9rARt-zWy0oHs8gxG1cs5NcSHPcbe_bFi865BA==&ch=dZ0yGo5rucSPLYK1tSE8dfLOT7woMrPwk6IkutM1qM5Q87Xj0QXPmw==
Resource
win10v2004-20231023-en
General
-
Target
https://r20.rs6.net/tn.jsp?f=001N7XKcDtLl8dEhMaMbmXbZkDn6pHXZtJDChlcuKwdNXmGkKiYQx5DEi4RQ3rtmirFBajazjC_EmxCO2FElRXJ06HwrhCI_cK11JXVWFLvBTkkFveVI7AHG6aTH4gCrAFKDtt32-eA_0ZWdi8qc8y75wTHmMHLZypWahTbipiLfA-V0ld5EPRO5Q==&c=zwiJTkwrUzK5RvIB9rARt-zWy0oHs8gxG1cs5NcSHPcbe_bFi865BA==&ch=dZ0yGo5rucSPLYK1tSE8dfLOT7woMrPwk6IkutM1qM5Q87Xj0QXPmw==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133433771560848328" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2660 chrome.exe 2660 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeCreatePagefilePrivilege 2660 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2660 wrote to memory of 676 2660 chrome.exe 58 PID 2660 wrote to memory of 676 2660 chrome.exe 58 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 1576 2660 chrome.exe 90 PID 2660 wrote to memory of 4664 2660 chrome.exe 91 PID 2660 wrote to memory of 4664 2660 chrome.exe 91 PID 2660 wrote to memory of 1464 2660 chrome.exe 92 PID 2660 wrote to memory of 1464 2660 chrome.exe 92 PID 2660 wrote to memory of 1464 2660 chrome.exe 92 PID 2660 wrote to memory of 1464 2660 chrome.exe 92 PID 2660 wrote to memory of 1464 2660 chrome.exe 92 PID 2660 wrote to memory of 1464 2660 chrome.exe 92 PID 2660 wrote to memory of 1464 2660 chrome.exe 92 PID 2660 wrote to memory of 1464 2660 chrome.exe 92 PID 2660 wrote to memory of 1464 2660 chrome.exe 92 PID 2660 wrote to memory of 1464 2660 chrome.exe 92 PID 2660 wrote to memory of 1464 2660 chrome.exe 92 PID 2660 wrote to memory of 1464 2660 chrome.exe 92 PID 2660 wrote to memory of 1464 2660 chrome.exe 92 PID 2660 wrote to memory of 1464 2660 chrome.exe 92 PID 2660 wrote to memory of 1464 2660 chrome.exe 92 PID 2660 wrote to memory of 1464 2660 chrome.exe 92 PID 2660 wrote to memory of 1464 2660 chrome.exe 92 PID 2660 wrote to memory of 1464 2660 chrome.exe 92 PID 2660 wrote to memory of 1464 2660 chrome.exe 92 PID 2660 wrote to memory of 1464 2660 chrome.exe 92 PID 2660 wrote to memory of 1464 2660 chrome.exe 92 PID 2660 wrote to memory of 1464 2660 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://r20.rs6.net/tn.jsp?f=001N7XKcDtLl8dEhMaMbmXbZkDn6pHXZtJDChlcuKwdNXmGkKiYQx5DEi4RQ3rtmirFBajazjC_EmxCO2FElRXJ06HwrhCI_cK11JXVWFLvBTkkFveVI7AHG6aTH4gCrAFKDtt32-eA_0ZWdi8qc8y75wTHmMHLZypWahTbipiLfA-V0ld5EPRO5Q==&c=zwiJTkwrUzK5RvIB9rARt-zWy0oHs8gxG1cs5NcSHPcbe_bFi865BA==&ch=dZ0yGo5rucSPLYK1tSE8dfLOT7woMrPwk6IkutM1qM5Q87Xj0QXPmw==1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc89819758,0x7ffc89819768,0x7ffc898197782⤵PID:676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1876,i,5480264804483376917,12201077185340372441,131072 /prefetch:22⤵PID:1576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1876,i,5480264804483376917,12201077185340372441,131072 /prefetch:82⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1876,i,5480264804483376917,12201077185340372441,131072 /prefetch:82⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1876,i,5480264804483376917,12201077185340372441,131072 /prefetch:12⤵PID:3276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1876,i,5480264804483376917,12201077185340372441,131072 /prefetch:12⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4592 --field-trial-handle=1876,i,5480264804483376917,12201077185340372441,131072 /prefetch:12⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 --field-trial-handle=1876,i,5480264804483376917,12201077185340372441,131072 /prefetch:82⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 --field-trial-handle=1876,i,5480264804483376917,12201077185340372441,131072 /prefetch:82⤵PID:4452
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384B
MD5e18c6a913d3d4a1208515e3d66b963b7
SHA132dfa2c7bd6cc65c95bca0f6bb995e9375f29244
SHA256ffedf9f8a8ad11f18a1f2ac43916b4bb48b5a952aa6a0e67f913c5ff25d40ce8
SHA512d3cfde2e1ceeecc893534a09431a610495647d9b28fea45ba47bd7311e4f13531bc2757190d448f3e1a830e5d0bf52466ca3f746635cf32a74aae0e06a931214
-
Filesize
875B
MD55b2cc803e57564b71eeec80340a004c2
SHA1014ae49c0420062b5e43b755b25beb6e74e1a7a3
SHA2565ca05a050691f2454011a84f1b44522c0e61f4a137bdf17b0705e520d5447693
SHA512bb35ae19537741d610b54e993c6a011f9b3073acc110df42099036f82687ea692732c4538ae43479d41c8cba5637ec3ddb04ef0e8532f7ed203f7377ee45ba99
-
Filesize
707B
MD5354275ede52e7853f62d3a23ad0203c1
SHA1029d7c9666c6e13c01e9b07c5d40de0bf810a9fb
SHA256ed76cef928009977a9776b47c49eb495f40cd554b5732978f12b033c70ab5ac9
SHA512d729159d3ed2158dd57ae37cd4287377f6cab2526cca901043c2cf728afdde5fd1e1269cfe7355839aa03b7ffcbcc5fb0a0267129f40785568e0dc456ffead6b
-
Filesize
6KB
MD563dc6ae4591c590b59af3b8908886e2a
SHA1c0b0089c329c386faf2e44c59b22e7b3b747d844
SHA25636bcbd98bf7f3d47cccfdfc4cf5a36a37686fb4dc7bcff1fa3172a7f7d4f7df4
SHA512902da7c7dfd19ac3f9c62e84f89dc1c191cc3ef2dcedddc1257b23299d65698a895014a7acaa382fcaabcb93c72668481d384e256116c848432a81594d419d8d
-
Filesize
109KB
MD54d43fb53a080aecfcb942e2eac61d08d
SHA1b2c9c977865de0e9da82e5ff36d116f42396711b
SHA2564385aed09c07f8d47df9a954d97446dcbe5722f4d0ad6b410d2c3e150948ff38
SHA512c4205cfbef725a3c88364e9007ea2639aac857aa089bf7bc3240e714c2f85e1ac60bd7585f83cb9f5a4fae8a9481cf6e5a387d011518b9ec6ca05c54cba47364
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd