Resubmissions
24-11-2023 21:02
231124-zveg6sfa5y 124-11-2023 21:00
231124-ztrq4sfa5t 124-11-2023 20:56
231124-zrc5yafa2x 1Analysis
-
max time kernel
23s -
max time network
26s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2023 21:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://docs.google.com/drawings/d/1EqOh5yIttLejR3FMx8VDfteOKOn18MpVDdJaHlg8RuE/preview#L7EngXXlklu0R8PaJy1yT2E
Resource
win10v2004-20231023-en
General
-
Target
https://docs.google.com/drawings/d/1EqOh5yIttLejR3FMx8VDfteOKOn18MpVDdJaHlg8RuE/preview#L7EngXXlklu0R8PaJy1yT2E
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133453332761980928" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4556 chrome.exe 4556 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4556 wrote to memory of 1716 4556 chrome.exe 83 PID 4556 wrote to memory of 1716 4556 chrome.exe 83 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 3132 4556 chrome.exe 87 PID 4556 wrote to memory of 1700 4556 chrome.exe 88 PID 4556 wrote to memory of 1700 4556 chrome.exe 88 PID 4556 wrote to memory of 3984 4556 chrome.exe 89 PID 4556 wrote to memory of 3984 4556 chrome.exe 89 PID 4556 wrote to memory of 3984 4556 chrome.exe 89 PID 4556 wrote to memory of 3984 4556 chrome.exe 89 PID 4556 wrote to memory of 3984 4556 chrome.exe 89 PID 4556 wrote to memory of 3984 4556 chrome.exe 89 PID 4556 wrote to memory of 3984 4556 chrome.exe 89 PID 4556 wrote to memory of 3984 4556 chrome.exe 89 PID 4556 wrote to memory of 3984 4556 chrome.exe 89 PID 4556 wrote to memory of 3984 4556 chrome.exe 89 PID 4556 wrote to memory of 3984 4556 chrome.exe 89 PID 4556 wrote to memory of 3984 4556 chrome.exe 89 PID 4556 wrote to memory of 3984 4556 chrome.exe 89 PID 4556 wrote to memory of 3984 4556 chrome.exe 89 PID 4556 wrote to memory of 3984 4556 chrome.exe 89 PID 4556 wrote to memory of 3984 4556 chrome.exe 89 PID 4556 wrote to memory of 3984 4556 chrome.exe 89 PID 4556 wrote to memory of 3984 4556 chrome.exe 89 PID 4556 wrote to memory of 3984 4556 chrome.exe 89 PID 4556 wrote to memory of 3984 4556 chrome.exe 89 PID 4556 wrote to memory of 3984 4556 chrome.exe 89 PID 4556 wrote to memory of 3984 4556 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://docs.google.com/drawings/d/1EqOh5yIttLejR3FMx8VDfteOKOn18MpVDdJaHlg8RuE/preview#L7EngXXlklu0R8PaJy1yT2E1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8b389758,0x7ffd8b389768,0x7ffd8b3897782⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1796,i,15748926611923183240,9601248805228694352,131072 /prefetch:22⤵PID:3132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1796,i,15748926611923183240,9601248805228694352,131072 /prefetch:82⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1796,i,15748926611923183240,9601248805228694352,131072 /prefetch:82⤵PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3056 --field-trial-handle=1796,i,15748926611923183240,9601248805228694352,131072 /prefetch:12⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1796,i,15748926611923183240,9601248805228694352,131072 /prefetch:12⤵PID:2428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=1796,i,15748926611923183240,9601248805228694352,131072 /prefetch:82⤵PID:900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4564 --field-trial-handle=1796,i,15748926611923183240,9601248805228694352,131072 /prefetch:82⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3436 --field-trial-handle=1796,i,15748926611923183240,9601248805228694352,131072 /prefetch:12⤵PID:3772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5240 --field-trial-handle=1796,i,15748926611923183240,9601248805228694352,131072 /prefetch:12⤵PID:1076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5372 --field-trial-handle=1796,i,15748926611923183240,9601248805228694352,131072 /prefetch:12⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186KB
MD59f61d7b1098e9a21920cf7abd68ca471
SHA1c2a75ba9d5e426f34290ebda3e7b3874a4c26a50
SHA2562c209fbd64803b50d0275cfd977c57965ee91410ecf0cafa70d9f249d6357c71
SHA5123d4f945783809a88e717f583f8805da1786770d024897c8a21d758325bcd4743ff48e32a275fe2f04236248393e580d40ae5caf5d3258054ea94d20b65b2c029
-
Filesize
705B
MD5ea658d5ace8284b9bb315ada7f986707
SHA1d629c17943eb4fd540fa4b44383ab19c6d8d5b3c
SHA256246634a9c0c2801cb612ee53216c6c79a45f5cdf13651704774547086ff11237
SHA512cd403bf06b8a4803740a10e90810fa7ca89f9bc6e33c96fd3377e11ff398508a0f429ac05e4bc6108bb7133d0d60eaafa0becb98e77b0587e8eb6fc1a0967ce3
-
Filesize
6KB
MD5075ad90bfd121c1453240d1330d95a31
SHA1a4fb41a51a5dc41da6c7fef32e65be67659c0117
SHA25694d7a566db091c04351530a19ec15e44ed1a33442c0a2a494c6c8b536d02989f
SHA5128234cc6c0b2c44db0b192aaa53350587c5423177e6157e78ab8909a3470c251214d61b5635cb1d9ad90d8d3030065798c5e16706b6d5ab9d28f876aa0b8bf810
-
Filesize
5KB
MD5bbb2226550e65611e508c8912839ce60
SHA1caf098a7c1f55745575c77a22db22a43ec220f3a
SHA25629eb05824a249977b4996b3976d28fd77522d851bd78d0d2005adf2cdc516e99
SHA512e8edb46d60c811939849b3955297aebe9c16d1f15ca782d69a5194979672dde399583876fd84d001f6c431d542e12c10d2d64963f147e99a3993914c7054c897
-
Filesize
109KB
MD5e1a0a3cace7cfa94bbce2ee945d03f84
SHA1e57ad4d3172a06f7b2a1e9fc8f58101d99c29691
SHA2569abee93271f8227af5c569a7bcf084c1479f164b8565383242ef7cc891ae4b89
SHA5127856456eca11ad5a5ffe1be9c4a7c46a052e2203b5cdf7d098200c40ec836edb066ab7d0b192234c595e4a7315b26cecbdd0a02e0a9d6e00de3242aadf347e77
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd