Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2023, 00:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://availink.tech
Resource
win10v2004-20231020-en
Behavioral task
behavioral2
Sample
https://availink.tech
Resource
android-x64-arm64-20231023-en
General
-
Target
https://availink.tech
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133445684543192244" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 832 chrome.exe 832 chrome.exe 2340 chrome.exe 2340 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 832 chrome.exe 832 chrome.exe 832 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe Token: SeShutdownPrivilege 832 chrome.exe Token: SeCreatePagefilePrivilege 832 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe 832 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 832 wrote to memory of 1808 832 chrome.exe 30 PID 832 wrote to memory of 1808 832 chrome.exe 30 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 404 832 chrome.exe 88 PID 832 wrote to memory of 3564 832 chrome.exe 89 PID 832 wrote to memory of 3564 832 chrome.exe 89 PID 832 wrote to memory of 4768 832 chrome.exe 90 PID 832 wrote to memory of 4768 832 chrome.exe 90 PID 832 wrote to memory of 4768 832 chrome.exe 90 PID 832 wrote to memory of 4768 832 chrome.exe 90 PID 832 wrote to memory of 4768 832 chrome.exe 90 PID 832 wrote to memory of 4768 832 chrome.exe 90 PID 832 wrote to memory of 4768 832 chrome.exe 90 PID 832 wrote to memory of 4768 832 chrome.exe 90 PID 832 wrote to memory of 4768 832 chrome.exe 90 PID 832 wrote to memory of 4768 832 chrome.exe 90 PID 832 wrote to memory of 4768 832 chrome.exe 90 PID 832 wrote to memory of 4768 832 chrome.exe 90 PID 832 wrote to memory of 4768 832 chrome.exe 90 PID 832 wrote to memory of 4768 832 chrome.exe 90 PID 832 wrote to memory of 4768 832 chrome.exe 90 PID 832 wrote to memory of 4768 832 chrome.exe 90 PID 832 wrote to memory of 4768 832 chrome.exe 90 PID 832 wrote to memory of 4768 832 chrome.exe 90 PID 832 wrote to memory of 4768 832 chrome.exe 90 PID 832 wrote to memory of 4768 832 chrome.exe 90 PID 832 wrote to memory of 4768 832 chrome.exe 90 PID 832 wrote to memory of 4768 832 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://availink.tech1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7a9d9758,0x7ffe7a9d9768,0x7ffe7a9d97782⤵PID:1808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1868,i,709094025510646272,9032638004347266695,131072 /prefetch:22⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1868,i,709094025510646272,9032638004347266695,131072 /prefetch:82⤵PID:3564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1868,i,709094025510646272,9032638004347266695,131072 /prefetch:82⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2992 --field-trial-handle=1868,i,709094025510646272,9032638004347266695,131072 /prefetch:12⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=1868,i,709094025510646272,9032638004347266695,131072 /prefetch:12⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4616 --field-trial-handle=1868,i,709094025510646272,9032638004347266695,131072 /prefetch:12⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 --field-trial-handle=1868,i,709094025510646272,9032638004347266695,131072 /prefetch:82⤵PID:3916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 --field-trial-handle=1868,i,709094025510646272,9032638004347266695,131072 /prefetch:82⤵PID:3832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4756 --field-trial-handle=1868,i,709094025510646272,9032638004347266695,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2340
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD5f6a8aeaed7cdcc9ad2836b8035e3f782
SHA1b837ee826cabbd5754bbd7c1f203de73f85b44e5
SHA256a8ae98b34e73eaeeb52ee4ee972823850807bc9fa06c3505bf6591f495246af7
SHA5127d72b88a725a90cbc3fd2076480568d0621b75d13b81b9d0f7c87afeb21a5d4e375f4b06644e921a99f7f9b68e39d387d1f88a55c01d37ebf61e8479af1396f0
-
Filesize
1KB
MD5ee6b58f6d9543254a3e34c28c039ce72
SHA1dc611940d827504a7dad7e8b9d899b6f770158f6
SHA256ae1ac85613e362322915602b302911c738e6e3d625272a62f9008ba31e42eab2
SHA5126cb1c8ec37491755f9acaf712c263d94b09324b2c1de7c31a56c678607a5be59c14482f7475ab030ac074f90e62d802b693aed48809bc19a330279e2e38bebf4
-
Filesize
539B
MD5facfd231ce8e8e06735eafd99e4a49a8
SHA115f0dbd7e5452c7992ad5b61588455bf80845214
SHA256384b6b810ca7a77feafd1acfe82497885bafbe0b71a3933bb9df7cc97607a43e
SHA512b096f4fdd9d8faa7bf97b8be0b47868ad384d3a166ef54dd34555982b87376122fb5bc1e7d55e5aa0115702f7ab5bd560e389746e2623f91a1f535e95da852f5
-
Filesize
6KB
MD5d48bb5bd9e0eed8da9c2d738daa28ef4
SHA1b9f5f251303731de212e5dce018cc8f7efbad2c4
SHA256479677f98f92cea7e2ad499489c3a0a7f0822b01f5d1290c6fece12badd62f68
SHA5124814097c9ddfafaead7888e62dc07f960f4b9dffb8935cfb39e6dda7ed4618ab2194e4dba18586f908c1e75d2e6d23dfa5132af9867e679159e8420139886fff
-
Filesize
109KB
MD50a20b8d26927304fdd029683eaf4d046
SHA1f24a183114849a615497a3d2a8bf44a8e85ea846
SHA2568f78dcc065ad3191773a0196b0cb0feceac36367faff68e17dffbe0f6944250d
SHA512ba0f0364ed6f376c2bbf956f5f41320da49d8e6ce8a4b25a6047b0f5da76cff262bb1057b23c3b238717944c228af440c5f6472bf68278e41719d1bc2c4f9afd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd