Analysis
-
max time kernel
602s -
max time network
610s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2023 22:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://r20.rs6.net/tn.jsp?f=001sX2SIe5x0Ijh0D0F8OV7J_nfCvX0ckUkr4SfUdWzzb7kCHet5WttPob4fxufq92a1GRObPxYhkBFpy1KZ2d4mtXcyCkFDqq4jvokpi_pdyC3xfHmEZL_EMdTDwQe_d6fRS4OPImBj2WEQmTF78b98iVmvPl6dc1oywAZom3UO_eR2PFqeo64B6wblbjqO5Fl4E4p-US702O9aZzxq_uqvBHBPCWkuP3D&c=1Wf7Bf78vqgYO1Qiyl1yz5h7CElVfSBRRCd1BGSJdrmBuaaRMTqh7A==&ch=zu-Zgnmkg0DXpDEKm33gj8RdE39lefNzqE7leG3FjltuKo0WwtzfsQ==c2FuZHkuam9obnNAbWlsd2F1a2VldG9vbC5jb20=
Resource
win10v2004-20231020-en
General
-
Target
https://r20.rs6.net/tn.jsp?f=001sX2SIe5x0Ijh0D0F8OV7J_nfCvX0ckUkr4SfUdWzzb7kCHet5WttPob4fxufq92a1GRObPxYhkBFpy1KZ2d4mtXcyCkFDqq4jvokpi_pdyC3xfHmEZL_EMdTDwQe_d6fRS4OPImBj2WEQmTF78b98iVmvPl6dc1oywAZom3UO_eR2PFqeo64B6wblbjqO5Fl4E4p-US702O9aZzxq_uqvBHBPCWkuP3D&c=1Wf7Bf78vqgYO1Qiyl1yz5h7CElVfSBRRCd1BGSJdrmBuaaRMTqh7A==&ch=zu-Zgnmkg0DXpDEKm33gj8RdE39lefNzqE7leG3FjltuKo0WwtzfsQ==c2FuZHkuam9obnNAbWlsd2F1a2VldG9vbC5jb20=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133446457447396476" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 944 chrome.exe 944 chrome.exe 3632 chrome.exe 3632 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 944 chrome.exe 944 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 944 wrote to memory of 4072 944 chrome.exe 32 PID 944 wrote to memory of 4072 944 chrome.exe 32 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 2780 944 chrome.exe 90 PID 944 wrote to memory of 3520 944 chrome.exe 91 PID 944 wrote to memory of 3520 944 chrome.exe 91 PID 944 wrote to memory of 228 944 chrome.exe 92 PID 944 wrote to memory of 228 944 chrome.exe 92 PID 944 wrote to memory of 228 944 chrome.exe 92 PID 944 wrote to memory of 228 944 chrome.exe 92 PID 944 wrote to memory of 228 944 chrome.exe 92 PID 944 wrote to memory of 228 944 chrome.exe 92 PID 944 wrote to memory of 228 944 chrome.exe 92 PID 944 wrote to memory of 228 944 chrome.exe 92 PID 944 wrote to memory of 228 944 chrome.exe 92 PID 944 wrote to memory of 228 944 chrome.exe 92 PID 944 wrote to memory of 228 944 chrome.exe 92 PID 944 wrote to memory of 228 944 chrome.exe 92 PID 944 wrote to memory of 228 944 chrome.exe 92 PID 944 wrote to memory of 228 944 chrome.exe 92 PID 944 wrote to memory of 228 944 chrome.exe 92 PID 944 wrote to memory of 228 944 chrome.exe 92 PID 944 wrote to memory of 228 944 chrome.exe 92 PID 944 wrote to memory of 228 944 chrome.exe 92 PID 944 wrote to memory of 228 944 chrome.exe 92 PID 944 wrote to memory of 228 944 chrome.exe 92 PID 944 wrote to memory of 228 944 chrome.exe 92 PID 944 wrote to memory of 228 944 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://r20.rs6.net/tn.jsp?f=001sX2SIe5x0Ijh0D0F8OV7J_nfCvX0ckUkr4SfUdWzzb7kCHet5WttPob4fxufq92a1GRObPxYhkBFpy1KZ2d4mtXcyCkFDqq4jvokpi_pdyC3xfHmEZL_EMdTDwQe_d6fRS4OPImBj2WEQmTF78b98iVmvPl6dc1oywAZom3UO_eR2PFqeo64B6wblbjqO5Fl4E4p-US702O9aZzxq_uqvBHBPCWkuP3D&c=1Wf7Bf78vqgYO1Qiyl1yz5h7CElVfSBRRCd1BGSJdrmBuaaRMTqh7A==&ch=zu-Zgnmkg0DXpDEKm33gj8RdE39lefNzqE7leG3FjltuKo0WwtzfsQ==c2FuZHkuam9obnNAbWlsd2F1a2VldG9vbC5jb20=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff08279758,0x7fff08279768,0x7fff082797782⤵PID:4072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1772,i,12835055334246874240,14425854040073705340,131072 /prefetch:22⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=1772,i,12835055334246874240,14425854040073705340,131072 /prefetch:82⤵PID:3520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1772,i,12835055334246874240,14425854040073705340,131072 /prefetch:82⤵PID:228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3156 --field-trial-handle=1772,i,12835055334246874240,14425854040073705340,131072 /prefetch:12⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3168 --field-trial-handle=1772,i,12835055334246874240,14425854040073705340,131072 /prefetch:12⤵PID:3600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5040 --field-trial-handle=1772,i,12835055334246874240,14425854040073705340,131072 /prefetch:82⤵PID:1428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 --field-trial-handle=1772,i,12835055334246874240,14425854040073705340,131072 /prefetch:82⤵PID:3096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2424 --field-trial-handle=1772,i,12835055334246874240,14425854040073705340,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3632
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD53b704ce89346c10e0c10988cdca8a0b2
SHA1103428376b9b73a34a879f55d07cec44ac2e89fd
SHA25636f60bb2b8f14a8bb95c08d85f0fb26eac36f34025d729e1395ded71537eeacb
SHA512c7a988a3c3c41d812e81d9f5c5998151a15edc6185b83def9aa801ddeaad37012883164902d0d5beba1ccab7e65dda8d7c5339adf5587d50781314223e84bfff
-
Filesize
1KB
MD59107c4ef6d76c7ce5db8710f6ca4dc20
SHA14c248dcf4aad9ad2c7f4e9278dc2c60899c66930
SHA256ab0a1bd3d44776fb1d2a90562fdb8472f1fbbf4fd78ce6d0bb9dead02161e765
SHA512e77dd12331da41d8fe909e7599c4893bae043dae4230878c3556fd50eff7d661a8aed69b9ece99774dbe032ee52735c872708b71d9e7d9c570059d73e112224a
-
Filesize
707B
MD5dabdeb090e34a0fdd453008ddebdec91
SHA13ff13d5451f52d313b51e26affc3096f69dd0783
SHA2564130e2cce33437fca809e1f87ea96f9ad9ba14694eac7fb7c3a90a644ceff25c
SHA512cf90aa77b283b936f569fa2eca8f5f7e8b63503684004f99fa89719fbca6fd4e4ccec10ea3631b7c2c491d2199ba6ece8f703da362f3708aa207716f61f74109
-
Filesize
6KB
MD56494440562d10c1e397bde7cb5fb7255
SHA1d62af8a523b4e21efb2da980e1c1cf4a40fdd38e
SHA256ba7296f48d5ec539fe070ce7deb87d67db5c2dbb95fdba8aaeb4f401f5cdcbfb
SHA51257f8413d3c97fbc18c696265539905f68437b30129aa0cdf4c466ef681ab4bb1b2e8aa3d609983b4cb103f611c80bc5a956d0b3e892b1825f4115bd7a4923ad7
-
Filesize
109KB
MD5ed5784cdbf7b1d2431d4ee125445761c
SHA17b2cb93ac0d4eb926e85c198884b9cb0d32f6ddc
SHA25663a2b5cbac14644b81abb1ff79bf8b3236114e1067acdae70cba925dd35cc4a5
SHA5122660ba1f809ca1afc112514781b52851659d3da817eba080516c7a583688a371437dd13ccabcab590144c205d690e4c64c67de67c0673fc9e2835d3805c6f095
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd