Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 01:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bit.ly/3QuCRGv
Resource
win10v2004-20231020-en
General
-
Target
https://bit.ly/3QuCRGv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133444007828454450" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4296 chrome.exe 4296 chrome.exe 4180 chrome.exe 4180 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe Token: SeShutdownPrivilege 4296 chrome.exe Token: SeCreatePagefilePrivilege 4296 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe 4296 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4296 wrote to memory of 456 4296 chrome.exe 72 PID 4296 wrote to memory of 456 4296 chrome.exe 72 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 4088 4296 chrome.exe 91 PID 4296 wrote to memory of 748 4296 chrome.exe 92 PID 4296 wrote to memory of 748 4296 chrome.exe 92 PID 4296 wrote to memory of 2420 4296 chrome.exe 93 PID 4296 wrote to memory of 2420 4296 chrome.exe 93 PID 4296 wrote to memory of 2420 4296 chrome.exe 93 PID 4296 wrote to memory of 2420 4296 chrome.exe 93 PID 4296 wrote to memory of 2420 4296 chrome.exe 93 PID 4296 wrote to memory of 2420 4296 chrome.exe 93 PID 4296 wrote to memory of 2420 4296 chrome.exe 93 PID 4296 wrote to memory of 2420 4296 chrome.exe 93 PID 4296 wrote to memory of 2420 4296 chrome.exe 93 PID 4296 wrote to memory of 2420 4296 chrome.exe 93 PID 4296 wrote to memory of 2420 4296 chrome.exe 93 PID 4296 wrote to memory of 2420 4296 chrome.exe 93 PID 4296 wrote to memory of 2420 4296 chrome.exe 93 PID 4296 wrote to memory of 2420 4296 chrome.exe 93 PID 4296 wrote to memory of 2420 4296 chrome.exe 93 PID 4296 wrote to memory of 2420 4296 chrome.exe 93 PID 4296 wrote to memory of 2420 4296 chrome.exe 93 PID 4296 wrote to memory of 2420 4296 chrome.exe 93 PID 4296 wrote to memory of 2420 4296 chrome.exe 93 PID 4296 wrote to memory of 2420 4296 chrome.exe 93 PID 4296 wrote to memory of 2420 4296 chrome.exe 93 PID 4296 wrote to memory of 2420 4296 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://bit.ly/3QuCRGv1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff89e329758,0x7ff89e329768,0x7ff89e3297782⤵PID:456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1896,i,7827919409225110654,17360743473708835545,131072 /prefetch:22⤵PID:4088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1896,i,7827919409225110654,17360743473708835545,131072 /prefetch:82⤵PID:748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1896,i,7827919409225110654,17360743473708835545,131072 /prefetch:82⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1896,i,7827919409225110654,17360743473708835545,131072 /prefetch:12⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3024 --field-trial-handle=1896,i,7827919409225110654,17360743473708835545,131072 /prefetch:12⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 --field-trial-handle=1896,i,7827919409225110654,17360743473708835545,131072 /prefetch:82⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 --field-trial-handle=1896,i,7827919409225110654,17360743473708835545,131072 /prefetch:82⤵PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 --field-trial-handle=1896,i,7827919409225110654,17360743473708835545,131072 /prefetch:82⤵PID:3196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4020 --field-trial-handle=1896,i,7827919409225110654,17360743473708835545,131072 /prefetch:12⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3900 --field-trial-handle=1896,i,7827919409225110654,17360743473708835545,131072 /prefetch:12⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3932 --field-trial-handle=1896,i,7827919409225110654,17360743473708835545,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4180
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a896fc3d79c67d3ad80fdef41a034ce8
SHA1c9a96b55253cd315a5691e5930a985051fa389cd
SHA25667a1e840f9b0b6c4ffce35e5c7c660623bd3f924791fcd004c758a74a330aefc
SHA512c05dbe49453ae3056eccc4123a1bfe36ec1de100bcba1a31f4db2e38b4dd4cb56696c237b4edcbfb68e170899a8cd65b1717a0fe18d41a3d78e7c71ce6b47703
-
Filesize
1KB
MD5d5dbe67202e5dddf1273ed4be9bcbf05
SHA153bee6f14f2ba8081cf3133c8def3a7e22ca0a49
SHA25660fdbc3876fa17d9d0af2bc2d1a603d0b453c30b246ec840ef75f5b524cd6f93
SHA512e132586a3bf89affdac659659ba6a7cc972462202916bb5313822b317095ca1736e24ea8fc9ff5e9297beff993d401cb53cee41109728d867483757e4d985c41
-
Filesize
8KB
MD5668ca7171c4ab4c97d6cfd4546255511
SHA102fd92cfce8337337568267351d733d49cad768c
SHA2563efc92226fb5137b48bc4c03d91b7f2701762650b8dbf0f485bd3a8cb118a3b0
SHA512bde53b7a94bb84c6e8670ea5ec9f106b1d2180c8eafbca74d07b23790e1a405ed24129cb1eb16829b61cfe9c8455c67447611e4ed44c8d87d28d2079a4afe1b1
-
Filesize
9KB
MD5c41be470a193aae1d17ed4af288a69ff
SHA1c0ab92da837003531d93952a001f51a7ce333d33
SHA2562ea5c51b30af60dc0a12e4214a3ed7a5bbc187310e41aa75908d346f745db051
SHA51218a742b375dc37ea28eb58cba14511ed6ef1480b40913daa0ce62bb59b2c704fd1d96810fb6e85a2cebdaf7aa4fd0ea653d85c24a09169094572979e79d193eb
-
Filesize
6KB
MD53e92bc95b85dd82ee1dfc4289f5ebbca
SHA12d8e70f10bcc8791d953e97440e24cda765ade18
SHA256fbcd145a91cffb15c7d8c5d6d031e81a8b00eadc5419d645201795cdcc2ebb04
SHA512067c13977d45436d0eaf343c61c3462ea16148c268519aae1ec0a5f0be81d8075849ccc66bd4925208e3cffdd0dc8dc287d2099f529f007a9556573db94252e9
-
Filesize
109KB
MD5bb0aa701e59fec14e9d3c59f67afa921
SHA194c38bed1fc8c9c30478324229572522f93289f2
SHA256724325edfe075a36e3fdcbf5cae5414afe2ae7d6ec4aef6cfd026979c1e4c98d
SHA51206d8018f231883dc704a41a0215617256817d80b73d58d79a7e007c48cdc87d3b16a1fb6b001e2cf02897219005d93ab9de7ccdb3c48f08eafd992be0c9b47ca
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd