Analysis
-
max time kernel
158s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2023 20:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://platform-qtil.linkedin.cn
Resource
win10v2004-20231020-en
General
-
Target
http://platform-qtil.linkedin.cn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133434321290177978" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1864 chrome.exe 1864 chrome.exe 1444 chrome.exe 1444 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe Token: SeShutdownPrivilege 1864 chrome.exe Token: SeCreatePagefilePrivilege 1864 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1864 wrote to memory of 1116 1864 chrome.exe 26 PID 1864 wrote to memory of 1116 1864 chrome.exe 26 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 3044 1864 chrome.exe 88 PID 1864 wrote to memory of 4220 1864 chrome.exe 89 PID 1864 wrote to memory of 4220 1864 chrome.exe 89 PID 1864 wrote to memory of 220 1864 chrome.exe 90 PID 1864 wrote to memory of 220 1864 chrome.exe 90 PID 1864 wrote to memory of 220 1864 chrome.exe 90 PID 1864 wrote to memory of 220 1864 chrome.exe 90 PID 1864 wrote to memory of 220 1864 chrome.exe 90 PID 1864 wrote to memory of 220 1864 chrome.exe 90 PID 1864 wrote to memory of 220 1864 chrome.exe 90 PID 1864 wrote to memory of 220 1864 chrome.exe 90 PID 1864 wrote to memory of 220 1864 chrome.exe 90 PID 1864 wrote to memory of 220 1864 chrome.exe 90 PID 1864 wrote to memory of 220 1864 chrome.exe 90 PID 1864 wrote to memory of 220 1864 chrome.exe 90 PID 1864 wrote to memory of 220 1864 chrome.exe 90 PID 1864 wrote to memory of 220 1864 chrome.exe 90 PID 1864 wrote to memory of 220 1864 chrome.exe 90 PID 1864 wrote to memory of 220 1864 chrome.exe 90 PID 1864 wrote to memory of 220 1864 chrome.exe 90 PID 1864 wrote to memory of 220 1864 chrome.exe 90 PID 1864 wrote to memory of 220 1864 chrome.exe 90 PID 1864 wrote to memory of 220 1864 chrome.exe 90 PID 1864 wrote to memory of 220 1864 chrome.exe 90 PID 1864 wrote to memory of 220 1864 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://platform-qtil.linkedin.cn1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd0ba89758,0x7ffd0ba89768,0x7ffd0ba897782⤵PID:1116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1676 --field-trial-handle=1912,i,17354055468878219922,7702279878480822017,131072 /prefetch:22⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1912,i,17354055468878219922,7702279878480822017,131072 /prefetch:82⤵PID:4220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2264 --field-trial-handle=1912,i,17354055468878219922,7702279878480822017,131072 /prefetch:82⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3036 --field-trial-handle=1912,i,17354055468878219922,7702279878480822017,131072 /prefetch:12⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=1912,i,17354055468878219922,7702279878480822017,131072 /prefetch:12⤵PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4668 --field-trial-handle=1912,i,17354055468878219922,7702279878480822017,131072 /prefetch:12⤵PID:3168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3300 --field-trial-handle=1912,i,17354055468878219922,7702279878480822017,131072 /prefetch:82⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3760 --field-trial-handle=1912,i,17354055468878219922,7702279878480822017,131072 /prefetch:82⤵PID:3672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2784 --field-trial-handle=1912,i,17354055468878219922,7702279878480822017,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5673f42c7320c3df0c2ad258fddd8a2c8
SHA1f25ebec31d0dda7825a5c8f29b23e0b78581aa74
SHA25601aba70097f8e8bd6f82b8f7a8925265594fdbf02961ef6d043ff9d5758d35e0
SHA5121c210ea75a8ff8bdf11058e21b81ce4c814a87de882d06341e6535ddaa90cc358050bfb51c0105271a261f21b8155692fcca81ff2f1a475493ff39a04dc1b286
-
Filesize
1KB
MD5e4585f100c56ff4956569ec49d855f74
SHA19543462e29b7cf242e5c2a6f863fe5ae60b30e0f
SHA256c42868427aaf21afcca3686b7e5609a9af5b22da11fc6030f2cae07ed8cc8410
SHA512eaaac139d914ae5e54879035399ff948b3b67ad019ff478aac36c6c56c40d859e10684f6380901ad4dd189efe63a475e07b3c7d332e1502aaf74d2ce18bf2468
-
Filesize
6KB
MD527f61dfae62cf58ac2cead246cb5ed30
SHA12acd33f65fef77f9f80a19907871528a90e9ee47
SHA2567ecfab2e3cbd379cd1b890c20714ac716cd04f3428d54c47659641d3fed905c8
SHA5120a022eea0fb402c92e58f1dd77879ab161aee80041d69f800f4409310365fb4a8fabc8cae5cb4dc68dd6314c9a1ea3320212bc14e6f6324404387ce409d7b11d
-
Filesize
109KB
MD5e9e105a6e5069ab634986171060d1ec2
SHA14712d9afb7b9011d7b7709e53549c4d7126e9a93
SHA2563c1443f7b9494ea1e3d100c2ad782eb273d79e22872bcb03b2af8fbf16dd6f81
SHA512db5eb113d06d3063f309380c7849882f0cb1d3b6273c867cc6ec8f3b93a9a841e5ef3601c83761a2640f4dd7afc20a0c6cc35055309ad5fa732ce28c1f7dd9ac
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd