Resubmissions
16/11/2023, 19:16
231116-xyz7yagb5v 116/11/2023, 19:13
231116-xw5pmseg98 116/11/2023, 19:10
231116-xvh49agb4s 716/11/2023, 19:07
231116-xs3e4sgb3z 516/11/2023, 19:05
231116-xrvc4seg87 116/11/2023, 19:03
231116-xqvx9aeg85 116/11/2023, 19:01
231116-xn8fkagb3s 116/11/2023, 18:58
231116-xmqt5aeg72 816/11/2023, 18:55
231116-xk3qxaga9x 116/11/2023, 18:55
231116-xkskyaeg63 1Analysis
-
max time kernel
31s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2023, 19:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://a.com
Resource
win10v2004-20231020-en
General
-
Target
http://a.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133446351622593934" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5104 chrome.exe 5104 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe Token: SeShutdownPrivilege 5104 chrome.exe Token: SeCreatePagefilePrivilege 5104 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe 5104 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5104 wrote to memory of 4628 5104 chrome.exe 34 PID 5104 wrote to memory of 4628 5104 chrome.exe 34 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 3684 5104 chrome.exe 90 PID 5104 wrote to memory of 4564 5104 chrome.exe 91 PID 5104 wrote to memory of 4564 5104 chrome.exe 91 PID 5104 wrote to memory of 3828 5104 chrome.exe 92 PID 5104 wrote to memory of 3828 5104 chrome.exe 92 PID 5104 wrote to memory of 3828 5104 chrome.exe 92 PID 5104 wrote to memory of 3828 5104 chrome.exe 92 PID 5104 wrote to memory of 3828 5104 chrome.exe 92 PID 5104 wrote to memory of 3828 5104 chrome.exe 92 PID 5104 wrote to memory of 3828 5104 chrome.exe 92 PID 5104 wrote to memory of 3828 5104 chrome.exe 92 PID 5104 wrote to memory of 3828 5104 chrome.exe 92 PID 5104 wrote to memory of 3828 5104 chrome.exe 92 PID 5104 wrote to memory of 3828 5104 chrome.exe 92 PID 5104 wrote to memory of 3828 5104 chrome.exe 92 PID 5104 wrote to memory of 3828 5104 chrome.exe 92 PID 5104 wrote to memory of 3828 5104 chrome.exe 92 PID 5104 wrote to memory of 3828 5104 chrome.exe 92 PID 5104 wrote to memory of 3828 5104 chrome.exe 92 PID 5104 wrote to memory of 3828 5104 chrome.exe 92 PID 5104 wrote to memory of 3828 5104 chrome.exe 92 PID 5104 wrote to memory of 3828 5104 chrome.exe 92 PID 5104 wrote to memory of 3828 5104 chrome.exe 92 PID 5104 wrote to memory of 3828 5104 chrome.exe 92 PID 5104 wrote to memory of 3828 5104 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://a.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff7cce9758,0x7fff7cce9768,0x7fff7cce97782⤵PID:4628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1832,i,3422439791054809973,1447286599521201271,131072 /prefetch:22⤵PID:3684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1832,i,3422439791054809973,1447286599521201271,131072 /prefetch:82⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1832,i,3422439791054809973,1447286599521201271,131072 /prefetch:82⤵PID:3828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2952 --field-trial-handle=1832,i,3422439791054809973,1447286599521201271,131072 /prefetch:12⤵PID:1672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2944 --field-trial-handle=1832,i,3422439791054809973,1447286599521201271,131072 /prefetch:12⤵PID:3196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4072 --field-trial-handle=1832,i,3422439791054809973,1447286599521201271,131072 /prefetch:12⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3348 --field-trial-handle=1832,i,3422439791054809973,1447286599521201271,131072 /prefetch:12⤵PID:876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 --field-trial-handle=1832,i,3422439791054809973,1447286599521201271,131072 /prefetch:82⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4012 --field-trial-handle=1832,i,3422439791054809973,1447286599521201271,131072 /prefetch:82⤵PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3396 --field-trial-handle=1832,i,3422439791054809973,1447286599521201271,131072 /prefetch:12⤵PID:2204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4008 --field-trial-handle=1832,i,3422439791054809973,1447286599521201271,131072 /prefetch:12⤵PID:1908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3064 --field-trial-handle=1832,i,3422439791054809973,1447286599521201271,131072 /prefetch:12⤵PID:1288
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD55006c2a171ac714b66806c9f7fc8e6bb
SHA1f4a00add4757c6643640a83ce3eabc7e7e2dccb7
SHA25632b74d155ab4332a373dd6f63175abf25935b32587550c35acc8f999b4936847
SHA5128bc3e650649869983f7b6f4d6a46b94d0ebb74b41b5b2f9af86b25bcb7e30a311684b9b1a03c880c7b4e1c4bd655fe5f88558371b91f771b6004c9ee25d7091a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe580f1e.TMP
Filesize120B
MD558d5bf2ae283c3c226d898fb1bcba7ab
SHA1aad72e3615c12610e827b1eceaf00d5c53a271b5
SHA25649ff85ea845e77a4019dac5afdf53dc6abce2f0282ba33c64e2f53b990182488
SHA5126220c18d011583f5fd3b89945601c32f9add22db27560914052dd9491398436d5b0ab1dd27ac83a8c5001671390f1c8a8b3150a02459b2c66f1e42ec7d5dc70d
-
Filesize
109KB
MD5534bc5c92de994d990fae405733d4554
SHA1fa1c750a558000ce86d0bf3a916a80b7d7a0b041
SHA25643f8cd7525a5fd263b235a59a4dee3bba1bce76896800ff092b9917228582d2d
SHA51289c64bbde508537d19493f69d502e27a7e08089885e84e2b39a7f0f92d442ad3fbbdb27c7478eb50873a4db8e5dfb224a82c9c9d63b2c876d6c7c3da747da43c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd