Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2023 22:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://llink.to/?u=https%3A%2F%2Flosgiordano.org%23YWJAbWFudWxpZmVhbS5jb20=
Resource
win10v2004-20231025-en
General
-
Target
https://llink.to/?u=https%3A%2F%2Flosgiordano.org%23YWJAbWFudWxpZmVhbS5jb20=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133436962273898796" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4516 chrome.exe 4516 chrome.exe 2708 chrome.exe 2708 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4516 wrote to memory of 4508 4516 chrome.exe 35 PID 4516 wrote to memory of 4508 4516 chrome.exe 35 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 3888 4516 chrome.exe 88 PID 4516 wrote to memory of 4128 4516 chrome.exe 90 PID 4516 wrote to memory of 4128 4516 chrome.exe 90 PID 4516 wrote to memory of 3644 4516 chrome.exe 89 PID 4516 wrote to memory of 3644 4516 chrome.exe 89 PID 4516 wrote to memory of 3644 4516 chrome.exe 89 PID 4516 wrote to memory of 3644 4516 chrome.exe 89 PID 4516 wrote to memory of 3644 4516 chrome.exe 89 PID 4516 wrote to memory of 3644 4516 chrome.exe 89 PID 4516 wrote to memory of 3644 4516 chrome.exe 89 PID 4516 wrote to memory of 3644 4516 chrome.exe 89 PID 4516 wrote to memory of 3644 4516 chrome.exe 89 PID 4516 wrote to memory of 3644 4516 chrome.exe 89 PID 4516 wrote to memory of 3644 4516 chrome.exe 89 PID 4516 wrote to memory of 3644 4516 chrome.exe 89 PID 4516 wrote to memory of 3644 4516 chrome.exe 89 PID 4516 wrote to memory of 3644 4516 chrome.exe 89 PID 4516 wrote to memory of 3644 4516 chrome.exe 89 PID 4516 wrote to memory of 3644 4516 chrome.exe 89 PID 4516 wrote to memory of 3644 4516 chrome.exe 89 PID 4516 wrote to memory of 3644 4516 chrome.exe 89 PID 4516 wrote to memory of 3644 4516 chrome.exe 89 PID 4516 wrote to memory of 3644 4516 chrome.exe 89 PID 4516 wrote to memory of 3644 4516 chrome.exe 89 PID 4516 wrote to memory of 3644 4516 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://llink.to/?u=https%3A%2F%2Flosgiordano.org%23YWJAbWFudWxpZmVhbS5jb20=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff837149758,0x7ff837149768,0x7ff8371497782⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1856,i,6692508567211003696,16626442774995439955,131072 /prefetch:22⤵PID:3888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1856,i,6692508567211003696,16626442774995439955,131072 /prefetch:82⤵PID:3644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1856,i,6692508567211003696,16626442774995439955,131072 /prefetch:82⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3220 --field-trial-handle=1856,i,6692508567211003696,16626442774995439955,131072 /prefetch:12⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3096 --field-trial-handle=1856,i,6692508567211003696,16626442774995439955,131072 /prefetch:12⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4812 --field-trial-handle=1856,i,6692508567211003696,16626442774995439955,131072 /prefetch:12⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4652 --field-trial-handle=1856,i,6692508567211003696,16626442774995439955,131072 /prefetch:12⤵PID:3812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5088 --field-trial-handle=1856,i,6692508567211003696,16626442774995439955,131072 /prefetch:12⤵PID:4968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4636 --field-trial-handle=1856,i,6692508567211003696,16626442774995439955,131072 /prefetch:12⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 --field-trial-handle=1856,i,6692508567211003696,16626442774995439955,131072 /prefetch:82⤵PID:3700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5040 --field-trial-handle=1856,i,6692508567211003696,16626442774995439955,131072 /prefetch:82⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4760 --field-trial-handle=1856,i,6692508567211003696,16626442774995439955,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2708
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD59e9b7c98cf660e965039599553ef2117
SHA11dfe4f734a3d4ed8d6018bf7b287a5c40d9ff424
SHA25640b44459c7079d160c115d7c0f083e38627633b4eb1c3364c2ad7b5a4368e438
SHA51207ac4367adf88efab0aabad240901f23d56a420b470236392521825271bcc6be9110acc3fe7c6733d603b32eb6f9c41a199822527af7bb4e731c59dd44ec26a6
-
Filesize
3KB
MD5077eec765b872f031cf15f034590855f
SHA179d4df7533727526f491daf2dd2b3be692a1790b
SHA2565382a09e8bd051de9cbf97fa272878d70ad941d1497f54848ca2d1d3f97f8ca5
SHA512e1fbf134ec66d6e0be63cc9a1860d0f1f71cb03292c45852173cb923cc055c1a2acb3f3677747cdb19fc0735c744e0de5e1d739e52eda66f93fcd4168d8a0bd3
-
Filesize
1KB
MD5cd090cf9e9cbf580fa0fd14c4cbdbea6
SHA1e294c4c4803aef03d2de044d1845321db4ad874e
SHA256886a09b4293e00d982cbb94073c547cd154eac2a3d9afef40f333ff7c3936e42
SHA512161eeac6e4b52b595fa19e9fa01371d525af7ed75a917e0dd081ba3577b2d9f4f647a7b8badb947c70114c53a1d1dab86bd76c01d2b435adceda298ff6b91412
-
Filesize
6KB
MD54df9552b1d712a6b3a30a7d17dab6461
SHA1722a5586fa56b370e99245a087d9765da00f039a
SHA256cec1b138b8ad2470f19d9eba00e7196292271f7c2328d1f7ee2d24eaad179898
SHA512d2908ae67f934a2246b25b874f5135624256241481f0db7580932d91e9a10c01559e752299d1f96c2f883341e83258c2b30034e3ebf15bae3f95572b9dd06f46
-
Filesize
215KB
MD5456b534a22d289a59b18fa118622dd94
SHA126c8ba81f485ffcb6e47aecbb7110698245a0f33
SHA256b4a1a01f9526c54c966f79aae35e199a82ac7bb0979d65b8462011e98a75812a
SHA5122daab35001b829bd36cd12b225e5c0038e860c5ebfa2d7b5529d99072d0295770268b551c3af900093276bdb28a5125927a00aedecd7ddcd3a2ea074ca1686ad
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd