Analysis
-
max time kernel
30s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 18:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://sync-privacy.com/rnicrosoftwaresync.html
Resource
win10v2004-20231023-en
General
-
Target
https://sync-privacy.com/rnicrosoftwaresync.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133444585359423122" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5024 chrome.exe 5024 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe -
Suspicious use of AdjustPrivilegeToken 56 IoCs
description pid Process Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5024 wrote to memory of 3500 5024 chrome.exe 86 PID 5024 wrote to memory of 3500 5024 chrome.exe 86 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 4796 5024 chrome.exe 88 PID 5024 wrote to memory of 60 5024 chrome.exe 89 PID 5024 wrote to memory of 60 5024 chrome.exe 89 PID 5024 wrote to memory of 5048 5024 chrome.exe 90 PID 5024 wrote to memory of 5048 5024 chrome.exe 90 PID 5024 wrote to memory of 5048 5024 chrome.exe 90 PID 5024 wrote to memory of 5048 5024 chrome.exe 90 PID 5024 wrote to memory of 5048 5024 chrome.exe 90 PID 5024 wrote to memory of 5048 5024 chrome.exe 90 PID 5024 wrote to memory of 5048 5024 chrome.exe 90 PID 5024 wrote to memory of 5048 5024 chrome.exe 90 PID 5024 wrote to memory of 5048 5024 chrome.exe 90 PID 5024 wrote to memory of 5048 5024 chrome.exe 90 PID 5024 wrote to memory of 5048 5024 chrome.exe 90 PID 5024 wrote to memory of 5048 5024 chrome.exe 90 PID 5024 wrote to memory of 5048 5024 chrome.exe 90 PID 5024 wrote to memory of 5048 5024 chrome.exe 90 PID 5024 wrote to memory of 5048 5024 chrome.exe 90 PID 5024 wrote to memory of 5048 5024 chrome.exe 90 PID 5024 wrote to memory of 5048 5024 chrome.exe 90 PID 5024 wrote to memory of 5048 5024 chrome.exe 90 PID 5024 wrote to memory of 5048 5024 chrome.exe 90 PID 5024 wrote to memory of 5048 5024 chrome.exe 90 PID 5024 wrote to memory of 5048 5024 chrome.exe 90 PID 5024 wrote to memory of 5048 5024 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://sync-privacy.com/rnicrosoftwaresync.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe55f19758,0x7ffe55f19768,0x7ffe55f197782⤵PID:3500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1920,i,15234734370363659306,8434993368582546229,131072 /prefetch:22⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1920,i,15234734370363659306,8434993368582546229,131072 /prefetch:82⤵PID:60
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1920,i,15234734370363659306,8434993368582546229,131072 /prefetch:82⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3032 --field-trial-handle=1920,i,15234734370363659306,8434993368582546229,131072 /prefetch:12⤵PID:4112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1920,i,15234734370363659306,8434993368582546229,131072 /prefetch:12⤵PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4628 --field-trial-handle=1920,i,15234734370363659306,8434993368582546229,131072 /prefetch:12⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3044 --field-trial-handle=1920,i,15234734370363659306,8434993368582546229,131072 /prefetch:12⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5092 --field-trial-handle=1920,i,15234734370363659306,8434993368582546229,131072 /prefetch:12⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3888 --field-trial-handle=1920,i,15234734370363659306,8434993368582546229,131072 /prefetch:82⤵PID:436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5452 --field-trial-handle=1920,i,15234734370363659306,8434993368582546229,131072 /prefetch:82⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5060 --field-trial-handle=1920,i,15234734370363659306,8434993368582546229,131072 /prefetch:12⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5012 --field-trial-handle=1920,i,15234734370363659306,8434993368582546229,131072 /prefetch:12⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3108 --field-trial-handle=1920,i,15234734370363659306,8434993368582546229,131072 /prefetch:12⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4880 --field-trial-handle=1920,i,15234734370363659306,8434993368582546229,131072 /prefetch:12⤵PID:656
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
874B
MD554b1bf0087089c0226c4fa254abd0268
SHA185cb02ea1738b09b04b60128c77dd4683d1611b9
SHA256019520e2d69ffcfad5dc903a22c507848dfe05c909682e3a54e055081a139479
SHA5123ef3ac70262c87fe5937f391f80017d1f51b61ab5cb0cf0844deffc63fb0586386723d2515bb1249b2e3a9a41e5fa215bd6ef54ee09e6d7dc3c4ddb8e2dede49
-
Filesize
6KB
MD575d9468efe0b981c08733f8dee0a449e
SHA1a05aaa7db3974e8887e6c37512b6a17ca796f233
SHA256abe6c67534bfaa7988c88d31c995fe78a06d3c2cda2e27c199f40c235c0bbc4d
SHA512e46d4b4bef88ae5706053e58a21c020496cb8d919563e82a04bb01767a37f14352bc2611ffeda70083ab8d15aed83473fea8041fef4974b9a0abe4ccf7c3526b
-
Filesize
5KB
MD591b5af231ce6ec3264e6cfe1d92f371e
SHA14edbb3a911f0a3ea2d09b31c243fcb3fd1145c0d
SHA25694474877aed08d962e6611cfef2a1400a1ba895054b93c41814547d6bcc6582c
SHA512d01c91e7d0483a2c57e1c7b4b5afdf047c0b0696d44be90718d6003d47ca6244c13bf95bf96621336c3b2e5c98aa41c5155449bd65b8af7b6d9fc0487617d264
-
Filesize
109KB
MD5271fd4aa91faa558b1743b1daeec1a99
SHA1f1b6be406e00ffbf72c372d3ee3ac0dae2f29a04
SHA2566dba6eaf35d37c3cf71222832b5c43d37e87f71baae6cb21c756c6c8eafa9bbb
SHA51207aa7fe828ee80991737b3a03ff99a11e00df2c03a1d41d79830bd6158103612a9eef326995287c1c56c792e07236be1cce2f5f5e192b1c13ff484f587bcfca7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd