Analysis
-
max time kernel
159s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2023 08:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://milesmoresnoreply.firebaseapp.com/
Resource
win10v2004-20231023-en
General
-
Target
https://milesmoresnoreply.firebaseapp.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133444260359893855" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3264 chrome.exe 3264 chrome.exe 4676 chrome.exe 4676 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe Token: SeShutdownPrivilege 3264 chrome.exe Token: SeCreatePagefilePrivilege 3264 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe 3264 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3264 wrote to memory of 2404 3264 chrome.exe 45 PID 3264 wrote to memory of 2404 3264 chrome.exe 45 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 3300 3264 chrome.exe 87 PID 3264 wrote to memory of 4944 3264 chrome.exe 88 PID 3264 wrote to memory of 4944 3264 chrome.exe 88 PID 3264 wrote to memory of 3608 3264 chrome.exe 89 PID 3264 wrote to memory of 3608 3264 chrome.exe 89 PID 3264 wrote to memory of 3608 3264 chrome.exe 89 PID 3264 wrote to memory of 3608 3264 chrome.exe 89 PID 3264 wrote to memory of 3608 3264 chrome.exe 89 PID 3264 wrote to memory of 3608 3264 chrome.exe 89 PID 3264 wrote to memory of 3608 3264 chrome.exe 89 PID 3264 wrote to memory of 3608 3264 chrome.exe 89 PID 3264 wrote to memory of 3608 3264 chrome.exe 89 PID 3264 wrote to memory of 3608 3264 chrome.exe 89 PID 3264 wrote to memory of 3608 3264 chrome.exe 89 PID 3264 wrote to memory of 3608 3264 chrome.exe 89 PID 3264 wrote to memory of 3608 3264 chrome.exe 89 PID 3264 wrote to memory of 3608 3264 chrome.exe 89 PID 3264 wrote to memory of 3608 3264 chrome.exe 89 PID 3264 wrote to memory of 3608 3264 chrome.exe 89 PID 3264 wrote to memory of 3608 3264 chrome.exe 89 PID 3264 wrote to memory of 3608 3264 chrome.exe 89 PID 3264 wrote to memory of 3608 3264 chrome.exe 89 PID 3264 wrote to memory of 3608 3264 chrome.exe 89 PID 3264 wrote to memory of 3608 3264 chrome.exe 89 PID 3264 wrote to memory of 3608 3264 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://milesmoresnoreply.firebaseapp.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbc8129758,0x7ffbc8129768,0x7ffbc81297782⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1872,i,4294743271000784935,15644091437881280232,131072 /prefetch:22⤵PID:3300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1872,i,4294743271000784935,15644091437881280232,131072 /prefetch:82⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1872,i,4294743271000784935,15644091437881280232,131072 /prefetch:82⤵PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3076 --field-trial-handle=1872,i,4294743271000784935,15644091437881280232,131072 /prefetch:12⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3116 --field-trial-handle=1872,i,4294743271000784935,15644091437881280232,131072 /prefetch:12⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4720 --field-trial-handle=1872,i,4294743271000784935,15644091437881280232,131072 /prefetch:12⤵PID:408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4692 --field-trial-handle=1872,i,4294743271000784935,15644091437881280232,131072 /prefetch:82⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3424 --field-trial-handle=1872,i,4294743271000784935,15644091437881280232,131072 /prefetch:82⤵PID:1744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4100 --field-trial-handle=1872,i,4294743271000784935,15644091437881280232,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4676
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD51d76ac8a80e0b9cbe8e34de44fe9a335
SHA11f81ad3fa1f9c81662236d36d348c19c1e4d019d
SHA2568b38409e7d97525a986361a5cb02c04d69bb1b9902d4b3a78aaf5a0301a1fd0a
SHA51255c7343534b3d77e4b3404b9d59b6f09b2aa94f511c7739edea0d09d93405682325e5fdd2771a3c5ba9efdf0af3ae0d3296f00e00e968799afdf8871b7defc73
-
Filesize
2KB
MD5820e755505c5f61744eeb277bea332a6
SHA12d9e34aea19bfa3e87e33c4bca0070493fba1ae9
SHA25653a73b96729fadbb85b1255690521a3759143262470922c37f57941b584420ec
SHA512d722fc1ec2b2966f6c1bb249462e5fe86e7af7f2a4b4ef8690dcd869057676d2198928e114b132f5f0036bc058559155f656ce6d8d369f87d27fc6f2ce211e52
-
Filesize
538B
MD51e7d0b08c2268466c35639cbf6d4b942
SHA1f99d92149750304fb193e3f52be22b75391db9ef
SHA2566f1f866b3b5c06793b83695e66b8eadb5be6557337f2e855316a97729978feda
SHA51229caf80c9bc0ae475c20eaa032eb81e9641523907cdb12d62dfa04a7430df66310bf9da219df7d48b4973396ca3632bc91655cac71f9879b1123dd129db52bd0
-
Filesize
6KB
MD5d3ac00ebfcbc53324029d9428f3eddda
SHA1f83a0988c06f41c49b9646f30e490f13a95dae7a
SHA256d618fb74509eb932374f0ba01ba75b3dfb04e6000cd830a8aab4556b7cfc729a
SHA51221af6e69c65db3bb8cf14279401f1483ad150060d12fc7e9c304fa427c55190c5018f39e971ffee522316575facc5b5f0e37b5c07a9748523a4ff3abaf53d427
-
Filesize
214KB
MD5bb796cd87caa423895ea997c4e499176
SHA1995e8f1997f636af240d48d6af09660f60b6bb20
SHA256426dada792358c0268090360d52d80a309f9339f8105b01216aa8fe14fa4d1b1
SHA51207afa2df61bd49533752b0ac5956ee53b748b1c24246be381b6d85f9e34d8bbf6b2472f2278c2051e63e467d3d2929e0da3c641e2c48f0f45ea2d797da342ea2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd