Analysis
-
max time kernel
1799s -
max time network
1689s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2023, 00:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://bing.com
Resource
win10v2004-20231023-en
General
-
Target
http://bing.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133437922404785618" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4416 chrome.exe 4416 chrome.exe 4724 chrome.exe 4724 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe Token: SeShutdownPrivilege 4416 chrome.exe Token: SeCreatePagefilePrivilege 4416 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe 4416 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4416 wrote to memory of 4400 4416 chrome.exe 57 PID 4416 wrote to memory of 4400 4416 chrome.exe 57 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 1316 4416 chrome.exe 89 PID 4416 wrote to memory of 3040 4416 chrome.exe 88 PID 4416 wrote to memory of 3040 4416 chrome.exe 88 PID 4416 wrote to memory of 4056 4416 chrome.exe 90 PID 4416 wrote to memory of 4056 4416 chrome.exe 90 PID 4416 wrote to memory of 4056 4416 chrome.exe 90 PID 4416 wrote to memory of 4056 4416 chrome.exe 90 PID 4416 wrote to memory of 4056 4416 chrome.exe 90 PID 4416 wrote to memory of 4056 4416 chrome.exe 90 PID 4416 wrote to memory of 4056 4416 chrome.exe 90 PID 4416 wrote to memory of 4056 4416 chrome.exe 90 PID 4416 wrote to memory of 4056 4416 chrome.exe 90 PID 4416 wrote to memory of 4056 4416 chrome.exe 90 PID 4416 wrote to memory of 4056 4416 chrome.exe 90 PID 4416 wrote to memory of 4056 4416 chrome.exe 90 PID 4416 wrote to memory of 4056 4416 chrome.exe 90 PID 4416 wrote to memory of 4056 4416 chrome.exe 90 PID 4416 wrote to memory of 4056 4416 chrome.exe 90 PID 4416 wrote to memory of 4056 4416 chrome.exe 90 PID 4416 wrote to memory of 4056 4416 chrome.exe 90 PID 4416 wrote to memory of 4056 4416 chrome.exe 90 PID 4416 wrote to memory of 4056 4416 chrome.exe 90 PID 4416 wrote to memory of 4056 4416 chrome.exe 90 PID 4416 wrote to memory of 4056 4416 chrome.exe 90 PID 4416 wrote to memory of 4056 4416 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://bing.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe51dd9758,0x7ffe51dd9768,0x7ffe51dd97782⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=1672,i,5290286824160805304,17644867404770459306,131072 /prefetch:82⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1672,i,5290286824160805304,17644867404770459306,131072 /prefetch:22⤵PID:1316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1672,i,5290286824160805304,17644867404770459306,131072 /prefetch:82⤵PID:4056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2740 --field-trial-handle=1672,i,5290286824160805304,17644867404770459306,131072 /prefetch:12⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2732 --field-trial-handle=1672,i,5290286824160805304,17644867404770459306,131072 /prefetch:12⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4592 --field-trial-handle=1672,i,5290286824160805304,17644867404770459306,131072 /prefetch:12⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3728 --field-trial-handle=1672,i,5290286824160805304,17644867404770459306,131072 /prefetch:12⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4912 --field-trial-handle=1672,i,5290286824160805304,17644867404770459306,131072 /prefetch:12⤵PID:3488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3964 --field-trial-handle=1672,i,5290286824160805304,17644867404770459306,131072 /prefetch:82⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3924 --field-trial-handle=1672,i,5290286824160805304,17644867404770459306,131072 /prefetch:82⤵PID:344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3488 --field-trial-handle=1672,i,5290286824160805304,17644867404770459306,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4724
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5aeebc1fc4b1c147988785eea587dfc91
SHA16a50f8bb2e5a6b4ae03155e51af03b67834204f2
SHA25605b94d873c5f5b7fb320690d9e53b344b864073e4ffef9840aa076ae0db4cb03
SHA5122b056ccde241398946cf11fff6b4e2a903f018d3fcf19e3aa2c2c296828fe40a1431f36a2e8de86eec2854ad7c0c107e1cea585dce16bbee48cab0560f3f829e
-
Filesize
2KB
MD58e6f276ceae053e9757b1bbfbb106ebb
SHA1ed459519590277d8f4789cb056514f264f6db74e
SHA256e6c6b3fdaf13bdb176abaf2da7bca69f6052f2aa153f2d08b87a0e82967a173a
SHA512552f09f09644fe4281228a098ac430ecbbe85b4bbd1de5ca63be9fbfb04caf9c6822eeee7d548eccb1c0cf07d6c00b0d3c8ec69364c70b765e2c5e6ac4f041ef
-
Filesize
1KB
MD5a96dcc79247de1d79f38465e29764ac2
SHA11f117fd619aa36a2b4f58c8763c141df523bc4dc
SHA256b7daa3a9067ffbc5a91dc95189c20c0c3f6c2428dd540e15f4ef9e7dec78234c
SHA512e8f0759d5d6c2d68799cdf76e509b0017f5aeb0a4d746485b68ea4dd259317ef47a391ccc0babfa59836eec630334ef989a510f44f8279eb7e9f9a8075a929b6
-
Filesize
1KB
MD5959c3877e1b0387036114991752e22b2
SHA1cbcb90612018c3a3d58952a9e09a2f8f26959e85
SHA2566eebcab98e474b43e5555dd1231ebeb6d0c948af9285c6f8e5f6ed667c1a1700
SHA512dba7392d8a8a323639b2c6afbabfbaaae091b221e4ff4f914df4c2f863cb8c75dd8493354751af0a552e388ea217cdc7eb54e9ae2c3c311b5269d23d55fdc07d
-
Filesize
6KB
MD5ec1bb96cf88637b9ef19d6ecf5c56300
SHA18e1ea606f77af55c6eb948b8681918766617ac11
SHA2569684e22ce71db5b8047517f6805581f55193066085623a2af833e64de6d09ab3
SHA512882dabc833154439f6db432cfee3f483f3e296c2584eb673954883448dfff1e07b19d440f0bf865a7dbfd3eb48601249f41df2cdd42e1a48912c07ad8df10e0a
-
Filesize
6KB
MD5274092796e3dfeb223d197852897d319
SHA108962e75d506e535c777f4298c67b01a30fc816e
SHA2564c86b0912920a0d3025ceaa15cc02dfd9f2233ef831e1016776bbe1988ee416f
SHA5123919544421778c277eb53c21be4108a9c07c5c296d877302447d2f737618086ed9cb809cb93a41493c86aca9b0f8280189a944ada12a63f6c1c9d1632de926be
-
Filesize
109KB
MD5a7772505be2432c01bddbbbff8561895
SHA1df3be1b4dc286aff4438649a7e6050c284c65ddb
SHA256e8d3c8975b2364f813009346faa0537aa5dbb7d1cd103a5c616a12a5545e6968
SHA51232c1105c5a22f3c3479cf39f6c6b6225c9e6067ffafb920636271bee5f8888887ebe94f724ad80e23a9c925873b55b8785960db44c818dc9bbbe327b87daac2d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd