Analysis
-
max time kernel
300s -
max time network
270s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2023, 17:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://weixin.qq.com/r/pXVBWW7EaTMWrSo69yC3
Resource
win10v2004-20231023-en
General
-
Target
https://weixin.qq.com/r/pXVBWW7EaTMWrSo69yC3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133449759776536342" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4764 chrome.exe 4764 chrome.exe 1408 chrome.exe 1408 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4764 wrote to memory of 4404 4764 chrome.exe 33 PID 4764 wrote to memory of 4404 4764 chrome.exe 33 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 5088 4764 chrome.exe 88 PID 4764 wrote to memory of 3584 4764 chrome.exe 90 PID 4764 wrote to memory of 3584 4764 chrome.exe 90 PID 4764 wrote to memory of 5012 4764 chrome.exe 89 PID 4764 wrote to memory of 5012 4764 chrome.exe 89 PID 4764 wrote to memory of 5012 4764 chrome.exe 89 PID 4764 wrote to memory of 5012 4764 chrome.exe 89 PID 4764 wrote to memory of 5012 4764 chrome.exe 89 PID 4764 wrote to memory of 5012 4764 chrome.exe 89 PID 4764 wrote to memory of 5012 4764 chrome.exe 89 PID 4764 wrote to memory of 5012 4764 chrome.exe 89 PID 4764 wrote to memory of 5012 4764 chrome.exe 89 PID 4764 wrote to memory of 5012 4764 chrome.exe 89 PID 4764 wrote to memory of 5012 4764 chrome.exe 89 PID 4764 wrote to memory of 5012 4764 chrome.exe 89 PID 4764 wrote to memory of 5012 4764 chrome.exe 89 PID 4764 wrote to memory of 5012 4764 chrome.exe 89 PID 4764 wrote to memory of 5012 4764 chrome.exe 89 PID 4764 wrote to memory of 5012 4764 chrome.exe 89 PID 4764 wrote to memory of 5012 4764 chrome.exe 89 PID 4764 wrote to memory of 5012 4764 chrome.exe 89 PID 4764 wrote to memory of 5012 4764 chrome.exe 89 PID 4764 wrote to memory of 5012 4764 chrome.exe 89 PID 4764 wrote to memory of 5012 4764 chrome.exe 89 PID 4764 wrote to memory of 5012 4764 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://weixin.qq.com/r/pXVBWW7EaTMWrSo69yC31⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff912e69758,0x7ff912e69768,0x7ff912e697782⤵PID:4404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1860,i,9021242372576680112,10545188006852054009,131072 /prefetch:22⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1860,i,9021242372576680112,10545188006852054009,131072 /prefetch:82⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1860,i,9021242372576680112,10545188006852054009,131072 /prefetch:82⤵PID:3584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2996 --field-trial-handle=1860,i,9021242372576680112,10545188006852054009,131072 /prefetch:12⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1860,i,9021242372576680112,10545188006852054009,131072 /prefetch:12⤵PID:716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4052 --field-trial-handle=1860,i,9021242372576680112,10545188006852054009,131072 /prefetch:12⤵PID:3024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5060 --field-trial-handle=1860,i,9021242372576680112,10545188006852054009,131072 /prefetch:12⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 --field-trial-handle=1860,i,9021242372576680112,10545188006852054009,131072 /prefetch:82⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 --field-trial-handle=1860,i,9021242372576680112,10545188006852054009,131072 /prefetch:82⤵PID:4752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3816 --field-trial-handle=1860,i,9021242372576680112,10545188006852054009,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1408
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD5d9f9c47e207eca139e7dd47d17fad2fa
SHA1293417bcc7b0e1724e8628f3169155a40726c9b9
SHA256319000591ab682da8189775beae24e250df3312e86debea28e5c0775b3c2bd5e
SHA512b5ca61e74a729c6bd6b5e156ca1fb3f056770acd7e2a0002dc991eb1d610601997e26ee1a6288f3054ac89a9ba2fc11d23731a1d66af0cc0262567a23d8d1201
-
Filesize
1KB
MD5c4fef83bd01980616e44e2a7170c4ecf
SHA1d49e4beb2df83443fab4f482fafad3d8c438f800
SHA256ec972f76aba5478953bd2d51b15814f1a99326b3ea642d07107f60327472b1d5
SHA51251a5dc7c4db1c938419a6e44fcc3298826029c633aaede16ee4edf53eb94f000a3c3f317205a6eb35ff103185b23f5cb2876fc6498df5bd6f7f00640b6e0266b
-
Filesize
707B
MD571c346f78df89320b062a53627614c76
SHA16859eaf37e67e28d48290e45d5e04897eb78fcec
SHA25620277e71b9031b9e745f4825c7f33abe558fa710f61e24b7c029e352507ca821
SHA512188be681c7a24a57d3d8787f1a0abe2d82ef8f33f10ab2a472fcf662a3be61545f7574a62a34551852b9a50ae4bda59917b523ee45348c5a6c5263a7574f327a
-
Filesize
6KB
MD57250f6142744225323acc09ff74f282b
SHA1181b33096141c129a8149a755d64b68f17671347
SHA2560dc3e3acdb85caf1d10b5bb4b737b626c92128a7a9536a1cc71aadda79665d8d
SHA512bbdfc8baad5796c816e27bc76ceea60e1f7b487368f1559d2564ec99268c3ca83eb9a21b9447a56c45dfbee8021f0a1cfc0edc0f2aff2614545c8bc9130df357
-
Filesize
109KB
MD505e2c8eb201a5a5ab36c1ce639c3f3a1
SHA1e188a74b0b2fe579a0d53065402cdc0c68c8d185
SHA2567845fef5f661491d6c6b510a3cd164a6269c143979d5f740f2bfcd05eeac3eb3
SHA51275f69219b4b128841b8aba0802e29b246088a701205cd3756501f03b304c655549ff9cdae978d42ba27f337fcafc5d0f18b0c99a3c3cb4e73eb061693fc2abf3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd